VIOLIN: A Network Virtualization Middleware for Virtual Networked Computing Dongyan Xu Lab FRIENDS (For Research In Emerging Network and Distributed Services)

Slides:



Advertisements
Similar presentations
Network Monitoring System In CSTNET Long Chun China Science & Technology Network.
Advertisements

All rights reserved © 2006, Alcatel Grid Standardization & ETSI (May 2006) B. Berde, Alcatel R & I.
Condor use in Department of Computing, Imperial College Stephen M c Gough, David McBride London e-Science Centre.
Jennifer Rexford Princeton University MW 11:00am-12:20pm Network Virtualization COS 597E: Software Defined Networking.
Supercharging PlanetLab : a high performance, Multi-Application, Overlay Network Platform Written by Jon Turner and 11 fellows. Presented by Benjamin Chervet.
Virtualization and Cloud Computing. Definition Virtualization is the ability to run multiple operating systems on a single physical system and share the.
CCSE NETWORK STRUCTURE. CCSE NETWORK OUTLINE Mid-sized Building Network spanning over Building 22 and Building 23. Autonomous from ITC’s KFUPM Domain.
IS Network and Telecommunications Risks
NanoHUB.org online simulations and more Network for Computational Nanotechnology 1 Autonomic Live Adaptation of Virtual Computational Environments in a.
Dec, Honeyd Virtual Honeypot Frame Work Niels Provos Presented by: Fadi MohsenSupervised by: Dr. Chow CS591 Research Project Presented by: Fadi Mohsen.
1 In VINI Veritas: Realistic and Controlled Network Experimentation Jennifer Rexford with Andy Bavier, Nick Feamster, Mark Huang, and Larry Peterson
Towards Virtual Networks for Virtual Machine Grid Computing Ananth I. Sundararaj Peter A. Dinda Prescience Lab Department of Computer Science Northwestern.
Protection Mechanisms for Application Service Hosting Platforms Xuxian Jiang, Dongyan Xu, Rudolf Eigenmann Department of Computer Sciences, Center for.
Automatic Run-time Adaptation in Virtual Execution Environments Ananth I. Sundararaj Advisor: Peter A. Dinda Prescience Lab Department of Computer Science.
Increasing Application Performance In Virtual Environments Through Run-time Inference and Adaptation Ananth I. Sundararaj Ashish Gupta Peter A. Dinda Prescience.
Criticisms of I3 Jack Lange. General Issues ► Design ► Performance ► Practicality.
SODA : Service-On-Demand Architecture for Application Service Hosting Utility Platforms Dongyan Xu, Xuxian Jiang Lab FRIENDS (For Research In Emerging.
Towards an Integrated Multimedia Service Hosting Overlay Dongyan Xu, Xuxian Jiang Department of Computer Sciences Center for Education and Research in.
Enabling Worm and Malware Investigation Using Virtualization (Demo and poster this afternoon) Dongyan Xu, Xuxian Jiang CERIAS and Department of Computer.
Collapsar: A VM-Based Architecture for Network Attack Detention Center Xuxian Jiang, Dongyan Xu Department of Computer Sciences Center for Education and.
Process Coloring: an Information Flow-Preserving Approach to Malware Investigation Eugene Spafford, Dongyan Xu (Presenter) Department of Computer Science.
An Out-of-the-Box Approach to High Assurance Computer System Monitoring and Integrity Protection Cyber Defense Conference, Rome, NY, May 12-14, 2008 Assistant.
1 Sonia Fahmy Ness Shroff Students: Roman Chertov Rupak Sanjel Center for Education and Research in Information Assurance and Security (CERIAS) Purdue.
Process Coloring: an Information Flow-Preserving Approach to Malware Investigation Eugene Spafford, Dongyan Xu Department of Computer Science and Center.
Jennifer Rexford Princeton University MW 11:00am-12:20pm Data-Center Traffic Management COS 597E: Software Defined Networking.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Data Center Network Redesign using SDN
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
Edge Based Cloud Computing as a Feasible Network Paradigm(1/27) Edge-Based Cloud Computing as a Feasible Network Paradigm Joe Elizondo and Sam Palmer.
Introduction to Honeypot, Botnet, and Security Measurement
Networking Virtualization Using FPGAs Russell Tessier, Deepak Unnikrishnan, Dong Yin, and Lixin Gao Reconfigurable Computing Group Department of Electrical.
Intranet, Extranet, Firewall. Intranet and Extranet.
Hosting Virtual Networks on Commodity Hardware VINI Summer Camp.
An Experimental Testbed for Building Service-Based Media Applications (Outline of paper draft to be submitted in TridentCom 2010 as testbed practices.
Cloud Computing 1. Outline  Introduction  Evolution  Cloud architecture  Map reduce operation  Platform 2.
HoneyD (Part 2) Small Business NIDS This presentation demonstrates the ability for Small Businesses to emulate virtual operating systems and conduct.
PCGRID ‘08 Workshop, Miami, FL April 18, 2008 Preston Smith Implementing an Industrial-Strength Academic Cyberinfrastructure at Purdue University.
N. GSU Slide 1 Chapter 02 Cloud Computing Systems N. Xiong Georgia State University.
1.  PRAGMA Grid test-bed : Shares clusters which managed by multiple sites Realizes a large-scale computational environment. › Expects as a platform.
Honeypot and Intrusion Detection System
การติดตั้งและทดสอบการทำคลัสเต อร์เสมือนบน Xen, ROCKS, และไท ยกริด Roll Implementation of Virtualization Clusters based on Xen, ROCKS, and ThaiGrid Roll.
Virtual Machine Security Systems Presented by Long Song 08/01/2013 Xin Zhao, Kevin Borders, Atul Prakash.
Stealthy Malware Detection Through VMM-based “Out-of-the-Box” Semantic View Reconstruction CCS’07, Alexandria, VA, Oct 29 – Nov 2, 2007 Xuxian Jiang, Xinyuan.
The Open Source Virtual Lab: a Case Study Authors: E. Damiani, F. Frati, D. Rebeccani, M. Anisetti, V. Bellandi and U. Raimondi University of Milan Department.
Resisting Denial-of-Service Attacks Using Overlay Networks Ju Wang Advisor: Andrew A. Chien Department of Computer Science and Engineering, University.
Application of Content Computing in Honeyfarm Introduction Overview of CDN (content delivery network) Overview of honeypot and honeyfarm New redirection.
An Analysis of Location-Hiding Using Overlay Networks Ju Wang and Andrew A. Chien Department of Computer Science and Engineering, University of California.
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
Presented by Spiros Antonatos Distributed Computing Systems Lab Institute of Computer Science FORTH.
A VIRTUAL HONEYPOT FRAMEWORK Author : Niels Provos Publication: Usenix Security Symposium Presenter: Hiral Chhaya for CAP6103.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
“Trusted Passages”: Meeting Trust Needs of Distributed Applications Mustaque Ahamad, Greg Eisenhauer, Jiantao Kong, Wenke Lee, Bryan Payne and Karsten.
EVGM081 Multi-Site Virtual Cluster: A User-Oriented, Distributed Deployment and Management Mechanism for Grid Computing Environments Takahiro Hirofuchi,
SDN Management Layer DESIGN REQUIREMENTS AND FUTURE DIRECTION NO OF SLIDES : 26 1.
Full and Para Virtualization
Module 10: Windows Firewall and Caching Fundamentals.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab Security aspects.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
Group # 14 Dhairya Gala Priyank Shah. Introduction to Grid Appliance The Grid appliance is a plug-and-play virtual machine appliance intended for Grid.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
MicroGrid Update & A Synthetic Grid Resource Generator Xin Liu, Yang-suk Kee, Andrew Chien Department of Computer Science and Engineering Center for Networked.
Towards an integrated multimedia service hosting overlay Dongyan Xu Xuxian Jiang Proceedings of the 12th annual ACM international conference on Multimedia.
CernVM and Volunteer Computing Ivan D Reid Brunel University London Laurence Field CERN.
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CLOUD COMPUTING
Aled Edwards, Anna Fischer, Antonio Lain HP Labs
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Cluster Computers.
Presentation transcript:

VIOLIN: A Network Virtualization Middleware for Virtual Networked Computing Dongyan Xu Lab FRIENDS (For Research In Emerging Network and Distributed Services) Department of Computer Sciences Center for Education and Research in Information Assurance and Security (CERIAS) Purdue University

The Team  Lab FRIENDS  Xuxian Jiang (Ph.D. student)  Paul Ruth (Ph.D. student)  Dongyan Xu (faculty)  Supported in part by NSF Middleware Initiative (NMI)

Outline  Motivations and goals  Architecture of VIOLIN  Applications of VIOLIN  Network system emulation  Scientific computing  Honeyfarm (network attack aggregation)  On-going work

Motivations  Formation of wide-area shared cyber-infrastructure  Multiple domains  Heterogeneous platforms  Large number of users  Need for mutually isolated distributed environments  Customized system administration and configuration  Consistent and binary-compatible runtime support  Un-trusted or malfunctioning applications  Known vulnerabilities in KaZaa, and Condor  Un-trusted network traffic control

Potential Applications  Multi-institutional collaboratories  Large-scale distributed emulations  Cyber-systems  Real-world systems  Parallel/distributed scientific applications  Philanthropic (volunteer) computing services  Content distribution networks

VM (Virtual Machine): a Solution?  Achieves single node isolation (SODA*)  Administration  Resource  Runtime services/libraries  Fault/attack impact  However, does not achieve network isolation  VMs addressable from/to any Internet hosts  Cannot control traffic volume between VMs  Cannot have overlapping address spaces * X. Jiang, D. Xu, “SODA: Service-on-Demand Architecture for Service Hosting Utility Platforms”, IEEE HPDC-12, 2003.

VIOLIN: Proposed Solution  VIOLIN: A VN (Virtual Network) for VMs *  Independent IP address space  Invisible from Internet and vice versa  Un-tamperable topology and traffic control  Value-added network services (e.g., IP multicast)  Binary and IP compatible runtime environment * X. Jiang, D. Xu, “VIOLIN: Virtual Internetworking on OverLay INfrastructure”, Springer LNCS Vol (ISPA 2004). * D. Xu, X. Jiang, “Towards an Integrated Multimedia Service Hosting Overlay”, ACM Multimedia 2004.

VIOLIN: the Big Picture Internet NMINMI NMINMI NMINMI NMINMI NMINMI NMINMI NMINMI Physical infrastructure NMI-based Grid infrastructure Two mutually Isolated VIOLINs VM

Key Ideas in VIOLIN  One level of indirection between VIOLIN and real Internet  “All problems in Computer Science can be solved by another level of indirection ” – Butler Lampson  A middleware-level underlay network serving as “intelligent carrier” of a VIOLIN  Traffic tunneling  Topology control  Traffic volume control  Traffic encryption  Network service virtualization

VIOLIN Architecture Host OS Guest OS App 1 Guest OS App 2 VIOLIN daemon … Existing NMI Middleware VMs Physical host

VIOLIN Architecture Host OS Guest OS App 1 VIOLIN daemon Virtual NIC Host OS Guest OS App 1 VIOLIN daemon Virtual NIC Message (e.g.,MPI) TCP, UDP, … IP Ethernet frame via UDP tunneling Between two VIOLIN nodes (VMs) planetlab6.csail.mit.eduplanetlab6.millennium.berkeley.edu

VIOLIN Network Performance TCP throughput measurement on PlanetLab planetlab6.csail.mit.edu → planetlab6.millennium.berkeley.edu

VIOLIN Network Performance ICMP latency measurement on PlanetLab planetlab6.csail.mit.edu → planetlab6.millennium.berkeley.edu

Application I: Network System Emulation  vBET: an education toolkit for network emulation *  “Create your own IP network ” on a shared platform  IP address space and network topology  Routers, switches, firewalls, end-hosts, links  Real-world network software (OSPF, BGP…)  Strict confinement (network security experiments)  Flexible configuration  Not constrained by device/port availability  No manual cable re-wiring or hardware setup * X. Jiang, D. Xu, “vBET: a VM-Based Emulation Testbed”, ACM SIGCOMM Workshop on Models, Methods, and Tools for Reproducible Network Research (ACM MoMeTools), 2003

vBET GUI

Sample Emulation: OSPF Routing

Emulation of OSPF Routing Demo video clip:

Sample Emulation: Critical Server Protection

Screenshot: Distributed Firewall

Sample Emulation: Chord P2P Network

Screenshot

Sample Emulation: Internet Worms * X. Jiang, D. Xu, H. J. Wang, E. H. Spafford, “Virtual Playgrounds for Worm Behavior Investigation”, 8 th International Symposium on Recent Advances in Intrusion Detection (RAID’05), A shared infrastructure (e.g. PlanetLab) A worm playground Virtual Physical

Application II: Scientific Computing *  Virtual clusters leveraging idle CPU cycles  Long running parallel/distributed jobs  Complicated communication patterns between nodes (different from Condor)  Runtime adaptation  Resource re-allocation  Migration/re-location  Scale adjustment * P. Ruth, X. Jiang, D. Xu, S. Goasguen, “Towards Virtual Distributed Environments in a Shared Infrastructure”, IEEE Computer, May 2005.

Experiment Setup Physical Cluster (ITaP) Two mutually isolated virtual clusters VM Physical Switch VS

VIOLIN vs. Physical Hosts (running HPL benchmark)  Physical host: dual processor 1.2 GHz Athlon, 1GB memory  VM: running one per host, ≤512MB memory

Multiple VIOLINs Sharing Physical Hosts (running HPL benchmark)  Aggregate performance remains stable (up to 16 VIOLINs)  In this example, 16 VIOLINs exhaust memory

VM Communication Pattern 7MB/s 6MB/s MB/s 6MB/s 5MB/s 7MB/s 5MB/s 3MB/s

Application III: Honeyfarm  Collapsar: a network attack aggregation center *  Achieving two (seemingly) conflicting goals  Distributed honeypot presence  Centralized honeypot operation  Key ideas  Leveraging unused IP addresses in each network  Diverting corresponding traffic to a “detention” center (transparently), by VIOLIN  Creating VM-based honeypots in the center * X. Jiang, D. Xu, “Collapsar: a VM-Based Architecture for Network Attack Detention Center”, 13 th USENIX Security Symposium (Security’04), 2004.

Collapsar Architecture VM-based Honeypot Collapsar Architecture Redirector Correlation Engine Management Station Production Network Collapsar Center Attacker Front-End

Real-Time Worm Alert * X. Jiang, D. Xu, R. Eigenmann, “Protection Mechanisms for Application Service Hosting Platforms”, IEEE/ACM CCGrid’04, 2004.

Log Correlation: Stepping Stone iii.jjj.kkk.11 compromised a honeypot & installed a rootkit, which contained an ssh backdoor xx.yyy.zzz.3 connected to the ssh backdoor using the same passwd

Log Correlation: Network Scanning

On-going Work  VIOLIN-based virtual distributed environments on shared cyber-infrastructure  Self-management (making them smart entities)  Missing role of VIOLIN administrator  Automatic customization and bootstrapping  Enforcement of application-specific policies  Self-provisioning (application-driven)  Resource scaling  Scale adaptation  Topology evolution

Thank you. For more information: URL: Google: “Purdue SODA Friends”