SODA : Service-On-Demand Architecture for Application Service Hosting Utility Platforms Dongyan Xu, Xuxian Jiang Lab FRIENDS (For Research In Emerging.

Slides:



Advertisements
Similar presentations
PlanetLab: An Overlay Testbed for Broad-Coverage Services Bavier, Bowman, Chun, Culler, Peterson, Roscoe, Wawrzoniak Presented by Jason Waddle.
Advertisements

The Case for Enterprise Ready Virtual Private Clouds Timothy Wood, Alexandre Gerber *, K.K. Ramakrishnan *, Jacobus van der Merwe *, and Prashant Shenoy.
Cybersecurity Training in a Virtual Environment By Chinedum Irrechukwu.
PlanetLab Operating System support* *a work in progress.
Xen , Linux Vserver , Planet Lab
Fundamentals of Computer Security Geetika Sharma Fall 2008.
A Case for Virtualizing Nodes on Network Experimentation Testbeds Konrad Lorincz Harvard University June 1, 2015June 1, 2015June 1, 2015.
1 Virtual Machine Resource Monitoring and Networking of Virtual Machines Ananth I. Sundararaj Department of Computer Science Northwestern University July.
NanoHUB.org online simulations and more Network for Computational Nanotechnology 1 Autonomic Live Adaptation of Virtual Computational Environments in a.
1 In VINI Veritas: Realistic and Controlled Network Experimentation Jennifer Rexford with Andy Bavier, Nick Feamster, Mark Huang, and Larry Peterson
Towards Virtual Networks for Virtual Machine Grid Computing Ananth I. Sundararaj Peter A. Dinda Prescience Lab Department of Computer Science Northwestern.
Protection Mechanisms for Application Service Hosting Platforms Xuxian Jiang, Dongyan Xu, Rudolf Eigenmann Department of Computer Sciences, Center for.
Automatic Run-time Adaptation in Virtual Execution Environments Ananth I. Sundararaj Advisor: Peter A. Dinda Prescience Lab Department of Computer Science.
Increasing Application Performance In Virtual Environments Through Run-time Inference and Adaptation Ananth I. Sundararaj Ashish Gupta Peter A. Dinda Prescience.
Towards an Integrated Multimedia Service Hosting Overlay Dongyan Xu, Xuxian Jiang Department of Computer Sciences Center for Education and Research in.
© 2008 AT&T Intellectual Property. All rights reserved. CloudNet: Where VPNs Meet Cloud Computing Flexibly and Dynamically Timothy Wood Kobus van der Merwe,
Microsoft Virtual Server 2005 Product Overview Mikael Nyström – TrueSec AB MVP Windows Server – Setup/Deployment Mikael Nyström – TrueSec AB MVP Windows.
Rob Jaeger, University of Maryland, Department of Computer Science 1 Active Networking “ The active network provides a platform on which network services.
VIOLIN: A Network Virtualization Middleware for Virtual Networked Computing Dongyan Xu Lab FRIENDS (For Research In Emerging Network and Distributed Services)
An Out-of-the-Box Approach to High Assurance Computer System Monitoring and Integrity Protection Cyber Defense Conference, Rome, NY, May 12-14, 2008 Assistant.
Hands-On Microsoft Windows Server 2003 Networking Chapter 1 Windows Server 2003 Networking Overview.
Virtual Machine approach to Security Gautam Prasad and Sudeep Pradhan 10/05/2010 CS 239 UCLA.
Process Coloring: an Information Flow-Preserving Approach to Malware Investigation Eugene Spafford, Dongyan Xu Department of Computer Science and Center.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Virtualization for Cloud Computing
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
+ Virtualization in Clusters and Grids Dr. Lizhe Wang.
5205 – IT Service Delivery and Support
Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access.
Microsoft Desktop Virtualization Migrating to Windows 7 With MED-V.
1 Integrating a Network IDS into an Open Source Cloud Computing Environment 1st International Workshop on Security and Performance in Emerging Distributed.
Data Center Network Redesign using SDN
Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access.
Virtual Infrastructure in the Grid Kate Keahey Argonne National Laboratory.
Morteza Yousefi University of Science & Technology of Mazandaran Network Virtualization 1 of 22 Network Virtualization.
Building service testbeds on FIRE D5.2.5 Virtual Cluster on Federated Cloud Demonstration Kit August 2012 Version 1.0 Copyright © 2012 CESGA. All rights.
Hosting Virtual Networks on Commodity Hardware VINI Summer Camp.
Virtualization Lab 3 – Virtualization Fall 2012 CSCI 6303 Principles of I.T.
A Cloud is a type of parallel and distributed system consisting of a collection of inter- connected and virtualized computers that are dynamically provisioned.
Virtualization. Virtualization  In computing, virtualization is a broad term that refers to the abstraction of computer resources  It is "a technique.
Copyright © 2011 EMC Corporation. All Rights Reserved. MODULE – 6 VIRTUALIZED DATA CENTER – DESKTOP AND APPLICATION 1.
Honeypot and Intrusion Detection System
Xen Overview for Campus Grids Andrew Warfield University of Cambridge Computer Laboratory.
Presented by: Sanketh Beerabbi University of Central Florida COP Cloud Computing.
Virtual Machine Security Systems Presented by Long Song 08/01/2013 Xin Zhao, Kevin Borders, Atul Prakash.
The Open Source Virtual Lab: a Case Study Authors: E. Damiani, F. Frati, D. Rebeccani, M. Anisetti, V. Bellandi and U. Raimondi University of Milan Department.
608D CloudStack 3.0 Omer Palo Readiness Specialist, WW Tech Support Readiness May 8, 2012.
SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG.
COMS E Cloud Computing and Data Center Networking Sambit Sahu
1Of 25. 2Of 25  Definition  Advantages & Disadvantages  Types  Level of interaction  Honeyd project: A Virtual honeypot framework  Honeynet project:
Server Virtualization
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
Virtual Workspaces Kate Keahey Argonne National Laboratory.
VMware vSphere Configuration and Management v6
System Center Lesson 4: Overview of System Center 2012 Components System Center 2012 Private Cloud Components VMM Overview App Controller Overview.
Virtualization Technology and Microsoft Virtual PC 2007 YOU ARE WELCOME By : Osama Tamimi.
CoreGRID Workpackage 5 Virtual Institute on Grid Information and Monitoring Services Michał Jankowski, Paweł Wolniewicz, Jiří Denemark, Norbert Meyer,
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
1 Agility in Virtualized Utility Computing Hangwei Qian, Elliot Miller, Wei Zhang Michael Rabinovich, Craig E. Wills {EECS Department, Case Western Reserve.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Cloud Computing Lecture 5-6 Muhammad Ahmad Jan.
Group # 14 Dhairya Gala Priyank Shah. Introduction to Grid Appliance The Grid appliance is a plug-and-play virtual machine appliance intended for Grid.
Towards an integrated multimedia service hosting overlay Dongyan Xu Xuxian Jiang Proceedings of the 12th annual ACM international conference on Multimedia.
Container-based Operating System Virtualization: A scalable, High-performance Alternative to Hypervisors Stephen Soltesz, Herbert Potzl, Marc E. Fiuczynski,
Network+ Guide to Networks 6th Edition
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Virtualization Layer Virtual Hardware Virtual Networking
Ananth I. Sundararaj Ashish Gupta Peter A. Dinda Prescience Lab
Presentation transcript:

SODA : Service-On-Demand Architecture for Application Service Hosting Utility Platforms Dongyan Xu, Xuxian Jiang Lab FRIENDS (For Research In Emerging Network and Distributed Services) Department of Computer Sciences Center for Education and Research in Information Assurance and Security (CERIAS) Purdue University

Outline  Motivations and goals  Related work  Research components of SODA  Summary and on-going work

Motivations  Vision of utility computing  Computation utility  Storage utility  Application service hosting  Conference management  e-Campaign  Digital government  Serving the underserved communities  IT function shadowing for disaster recovery  Virtual enterprise, collaboratory, and community

Our Goal  To build a value-added application service hosting platform based on shared infrastructure, achieving:  On-demand creation and provisioning  Virtualization  Isolation  Protection  Accountability  Privacy

 Utility computing architectures  VERITAS, HP UDC, IBM Oceano  Grid platforms  Computation: Globus, Condor, Legion, NetSolve, Harness, Cactus  Storage and data: SRB, NeST, Data Grid, OceanStore  Shared infrastructure  PlanetLab, Emulab  Active services  Active Service Grid, Berkeley Active Service Framework, CANS (NYU), Darwin, WebOS Related Work

 Resource isolation  GARA, QLinux (UMass), Virtual service (UMich), Resource Container, Cluster Reserves (Rice)  Virtualization technologies  Virtual super computer (aggregation): NOW, HPVM  Virtual OS, isolation kernel (slicing): VMWare, Xen (Cambridge), Denali (UW), UML, UMLinux, Virtual Private Server (Ensim)  Grid computing on VM: Virtuoso (Northwestern), Entropia  Virtual cluster: Cluster-on-Demand (Duke) Related Work

SODA  Service-On-Demand Architecture for application service hosting utility platforms  Research components of SODA  General architecture  Protection, intrusion detection, logging  Confined and VM-based overlay  Market-driven planning and management

Outline  Research components of SODA:  General architecture  Security and protection  Confined VM-based overlay  ‘Property’ planning and management

Detailed Information  Xuxian Jiang, Dongyan Xu, "SODA: a Service-On-Demand Architecture for Application Service Hosting Utility Platforms", Proceedings of The 12th IEEE International Symposium on High Performance Distributed Computing (HPDC-12), Seattle, WA, June 2003."SODA: a Service-On-Demand Architecture for Application Service Hosting Utility Platforms"HPDC-12

Overview of SODA SODA Host (physical) AS AS’ Virtual service node

Virtualization: Key Technique  Two-level OS structure  Host OS  Guest OS  Strong isolation  Administration isolation  Installation isolation  Fault / attack Isolation  Recovery, migration, and forensics  Virtual service node  Application service (AS)  Guest OS  Internetworking enabled One SODA host Host OS … Guest OS AS 1 AS n

SODA Master SODA Agent Host OS Guest OS Service S SODA Daemon Host OS Guest OS Service S SODA Daemon Host OS Guest OS Service S’ SODA Daemon Guest OS Service S’ Service Switch for S Service Switch for S’ Service Requests From Clients Service Creation Requests From ASP Virtual service node

On the Same SODA Host WWW service Honeypot

Host OS and Guest OS  Guest OS: based on User-Mode Linux (UML), an open-source virtual OS ( different from UMLinux and VServer )  By Jeff Dike,  Running in user space of host OS  Separate kernel address space  Physical memory usage limit  Host OS: Linux (linux , enhanced)  CPU fair share scheduler (for CPU isolation between virtual service nodes)

Experiment: CPU Isolation Original Linux SchedulerEnhanced Linux Scheduler VM 1 : CPU-intensive VM 2 : IO-intensive VM 3 : Web

On-Demand Service Priming  Performed by SODA Daemon  Customization of guest OS (“cook to order” )  Active service image downloading  Automatic bootstrapping of virtual service node

Service Bootstrapping Time Linux Configuration Image size Time (seattle) Time (tacoma) Rootfs_tomrtbt_ MB2.0 sec.3.0 sec. Rootfs_base_ MB3.0 sec.4.0 sec. Root_fs_lfs_ MB4.0 sec.16.0 sec. Root_fs.rh-7.2- server.pristine MB22.0 sec.42.0 sec.

Slow-Down (w/o optimization) 1,368 37,004 gettimeofday 1,200 27,044 munmap 1,208 27,864 mmap 1,084 26,904 dup2 1,064 26,648 geteuid 1,208 27,276 getpid Linux UMLSystem call System call level (clock cycles) Application level

Outline  Research components of SODA:  General architecture  Security and protection  Confined VM-based overlay  ‘Property’ planning and management

Detailed Information  Xuxian Jiang, Dongyan Xu, Rudolf Eigenmann, "Protection Mechanisms for Application Service Hosting Platforms", Proceedings of IEEE/ACM Int'l Symposium on Cluster Computing and the Grid (CCGrid 2004), Chicago, IL, April 2004."Protection Mechanisms for Application Service Hosting Platforms"CCGrid 2004  Xuxian Jiang, Dongyan Xu, "Collapsar: A VM-Based Architecture for Network Attack Detention Center", to appear in Proceedings of the 13 th USENIX Security Symposium (Security '04), San Diego, CA, August 2004."Collapsar: A VM-Based Architecture for Network Attack Detention Center"Security '04

Security and Protection  Virtual switching and firewalling  IDS in guest OS kernel  Untamperable logging (‘blackbox’-ing) Host OS … Guest OS AS 1 AS n

Virtual Switching and Firewalling Virtual machine (with IP addr.) SODA host (Invisible on Internet) Guest OS Host OSFirewall

Kernort: IDS in Guest OS Kernel  Problems with traditional IDS  Encrypted traffic (e.g. ssh) makes NIDS less effective  App-level IDS process will be “killed”, once a machine is compromised  Log may be tampered with  Fail-open  Related projects  Backtracker (Michigan)  VMM-based retrospection (Stanford)  Forensix (OHSU)  ESP (Purdue CERIAS)  Open-source projects: Snort, Saint Jude

Kernort  VM-based IDS  Deployed in each VM  Inside guest OS kernel: a unique vista point  Customizable without affecting host OS  Clearer view  Untamperable logging (saved to SODA host)  Renewable signature (read from SODA host)  Fail-close instead of fail-open

Kernort: IDS in Guest OS Kernel Guest OS

Kernort  Components  Kernort sensor  Event-driven (system call and packet reception)  Renewable signature set  Matching against a small signature set (“Top 20 most wanted”)  Kernort blackbox  Untamperable logging  Privacy preservation of ASes  Analyzer  Exhaustive signature matching  Detection of complex attack patterns  Session replay

Kernort Virtual machine Host OS Kernort (shaded areas: logs)

Real-Time Alert

Session Re-play

Impact on Performance

Outline  Research components of SODA:  General architecture  Security and protection  Confined VM-based overlay  ‘Property’ planning and management

Detailed Information  Xuxian Jiang, Dongyan Xu, "vBET: a VM-Based Emulation Testbed", Proceedings of ACM Workshop on Models, Methods and Tools for Reproducible Network Research (MoMeTools, in conjunction with ACM SIGCOMM 2003), Karlsruhe, Germany, August 2003."vBET: a VM-Based Emulation Testbed"MoMeToolsACM SIGCOMM 2003  Xuxian Jiang, Dongyan Xu, "VIOLIN: Virtual Internetworking on OverLay INfrastructure", Department of Computer Sciences Technical Report CSD TR , Purdue University, July 2003."VIOLIN: Virtual Internetworking on OverLay INfrastructure"  Xuxian Jiang, Dongyan Xu, “A Middleware Architecture for Confined Virtual Machine Overlays", in preparation, March 2004.“A Middleware Architecture for Confined Virtual Machine Overlays"

Traditional Overlay Network  Problems with traditional overlays:  Open for attacks  Attacks from the outside (i.e. Internet) against overlay nodes  Attacks from an overlay node against the outside  Difficult to manage  An overlay across multiple administration domains  A host participate in multiple overlays  Difficult to enforce overlay topology and traffic volume  VPN does not solve the problems

Traditional Overlay Network Firewall

VM-based Overlay  The case for VM-based overlay  Multiple overlays on shared infrastructure  On-demand creation  Confinement and isolation  VM introduces new network administration complexity  “What is this new machine that has suddenly appeared in my domain?”  “Where is the machine that was in my domain yesterday?”  “How much network connectivity should a VM have?”  “How many IP addresses for VMs?”

Confined VM-based Overlay  In addition to VM, we need VN for VMs  VN: a highly overloaded term (VPN, X-bone…)  What is new: Confined and VM-based overlays  Applications  Multi-institutional collaborations  Philanthropic (volunteer) computing systems  Network emulations

Confined VM-based Overlay Firewall VM ≤1Mbps ≤2Mbps Virtual infrastructure

Key Properties  Confined overlay topology and traffic  No attack possible from inside the overlay to the outside world  Virtual IP address space  No need for application modification and re-compilation

A More Generic Picture VIOLIN: Virtual Internetworking on OverLay INfrastructure

vBET: an Example of Confined Overlays on Demand  An education tool for network and distributed system emulation  Fidelity-preserving setup  Maneuverable network entities  Real-world network software  Strict confinement (network security experiment)  Flexible configuration  Not constrained by device/port availability  No manual cable re-wiring or hardware setup  Simultaneous experiments  Cost-effective

vBETvBET Features  Can be deployed in n ≥ 1 vBET servers  Efficient startup and tear-down of emulated entities  Strong network virtualization  IP address space  Virtual routers, switches, firewalls, end-hosts, links  Communications confined by virtual topology  Dynamic addition, deletion, migration, configuration of network entities

vBET GUI

Sample Emulation: OSPF Routing

Emulation of OSPF Routing Demo video clip at:

Sample Emulation: Distributed Firewalls

Screenshot

Sample Emulation: Chord P2P Network

Screenshot

Outline  Research components of SODA:  General architecture  Security and protection  Confined VM-based overlay  ‘Property’ planning and management

Property Planning and Management  Tenant selection:  Among a set of potential tenants (ASes), which ones to host? (for maximum revenue, resource utilization, security…)  SODA provider selection:  Among a set of SODA providers, which one should be chosen to host an AS?

 Examples of bad planning:  Many PDA transcoding ASes in an area with a small PDA user population  AS not requiring client registration and log-in (potential DDoS attacks)  Majority of ASes exhibiting similar demand characteristics such as: Property Planning and Management Load Time

Property Planning and Management  AS profiling  Resource requirement  Security/authentication  Demand characteristics  Market analysis  Competing ASes, market size/growth/expected share  ASes correlation (“80% of clients requesting AS X also request AS Y” )  Trading/pricing of SODA machine slices

Property Planning and Management  Forming alliance of SODA providers

Property Planning and Management  Forming alliance of SODA providers

Summary  Virtualization: a key enabling technology in realizing utility computing vision  Hosting utility is more complex than computation utility (host – tenants – clients)  SODA achieves:  On-demand service creation  Service virtualization, isolation and confinement  Protection, accountability, privacy  Overlay isolation and confinement

Ongoing Work  VM/service migration, shadowing, recovery  Service profiling, accounting, auditing (resources, security)  Market-driven planning, provisioning, and management (SODA ecology)  Deployment and evaluation (Purdue Bindley Bioscience Center)

Thank you. For more information: {dxu, AOL keywords “Purdue SODA Friends”