Sungkyunkwan University (SKKU) Security Lab. A Framework for Security Services based on Software-Defined Networking Jaehoon (Paul) Jeong 1, Jihyeok Seo 1, Geumhwan Cho 1, Hyoungshick Kim 1, and Jung-Soo Park 2 1 Department of Computer Science and Engineering, Sungkyunkwan University, Korea (Republic of) {pauljeong, seojh43, geumhwan, 2 Elecronics and Telecommunications Research Institute, Korea (Republic of) The second International Workshop on Device Centric Cloud (DC2-2015)
Sungkyunkwan University (SKKU) Security Lab. DC Motivation Legacy firewall Inspects packets that attempts to cross a network boundary Rejects any illegal packets Incoming requests to open illegal TCP connections Packets of other illegal types (e.g., UDP and ICMP) IP datagrams with illegal IP addresses (or ports) Provides security at the loss of flexibility and the cost of network administration
Sungkyunkwan University (SKKU) Security Lab. DC Contributions Propose a framework for security services using Software- Defined Networking (SDN) Discuss challenge issues and requirements for SDN Introduce two representative security services Centralized firewall system Centralized DDoS-attack mitigation system
Sungkyunkwan University (SKKU) Security Lab. DC Challenges in firewall Cost The cost of adding firewalls to network resources is substantial Performance Firewalls are often slower than the link speed of their network interfaces Management Managing access control dynamically across hundreds of network elements is a challenge Policy It is difficult to describe what are permitted and denied flows within the specific organization Packet-based access mechanism Packet-based access mechanism is not enough in practice since the basis unit of access control is usually user or application (e.g., Skype connections for specific users are open)
Sungkyunkwan University (SKKU) Security Lab. DC Centralized network firewall Firewall rules can be managed flexibly by a centralized server SDN protocols can be used for a standard interface between firewall applications and switches Public network Private network Firewall add or delete rules src IPdest IPAction Drop packets
Sungkyunkwan University (SKKU) Security Lab. DC Expectations for SDN-based firewall - Cost Ideally, one single firewall is enough Firewall application SDN Controller Switch 2 Switch 1 Enforces rules to each switch Switch 3
Sungkyunkwan University (SKKU) Security Lab. DC Expectations for SDN-based firewall - Performance Firewalls can adaptively be deployed depending on network conditions Firewall application SDN Controller Switch 2 Switch 1 Firewall is applied Switch 3 Incoming packets
Sungkyunkwan University (SKKU) Security Lab. DC Expectations for SDN-based firewall - Management Switch 2 Switch 3 Switch 1 Install new rules
Sungkyunkwan University (SKKU) Security Lab. DC Expectations for SDN-based firewall - Management Firewall rules can dynamically be added with new attacks Firewall application SDN Controller Switch 2 Switch 3 Switch 1 Install new rules (e.g., drop packets with attack patterns)
Sungkyunkwan University (SKKU) Security Lab. DC Expectations for SDN-based firewall – Packet based access mechanism Application level rules can be defined by software SDN Controller Switch 2 Switch 3 Switch 1 Install new rules automatically Incoming packets Firewall application
Sungkyunkwan University (SKKU) Security Lab. DC Objectives Prompt reaction to new network attacks SDN-based security services allow private networks to defend themselves against new sophisticated network attacks Autonomous defense from network attacks SDN-based security services identify the category of network attack (e.g., worms and DDoS attacks) They take counteraction for the defense without the intervention of network administrators Network-load-aware resource allocation SDN-based security services measure the overhead of resources for security services They dynamically select resources considering load balance for trading-off between the maximum network performance and security
Sungkyunkwan University (SKKU) Security Lab. DC Requirements Multi-Layer Management Functions Security Application (e.g., Firewall, DDoS-Attack Mitigation) Application Support Orchestration Abstraction Control Support Data Transport and Processing Application Layer SDN Control Layer Resource Layer Resource-Control Interface Application-Control Interface
Sungkyunkwan University (SKKU) Security Lab. DC Centralized firewall system for malware packets Firewall SDN Controller Switch 2 Switch 3 Switch 1 Malware packet 1. Switch 1 forwards an unknown flow’s packet to Firewall via SDN Controller. 1. Switch 1 forwards an unknown flow’s packet to Firewall via SDN Controller. 2. Firewall investigates the packet. 1. Switch 1 forwards an unknown flow’s packet to Firewall via SDN Controller. 2. Firewall investigates the packet. 3. Firewall regards it as a malware packet with suspicious patterns.
Sungkyunkwan University (SKKU) Security Lab. DC Centralized firewall system for malware packets Firewall SDN Controller Switch 2 Switch 3 Switch 1 Install new rules (e.g., drop dangerous packets) Incoming packets Report a dangerous packet to SDN Controller The dangerous packets are dropped by switches
Sungkyunkwan University (SKKU) Security Lab. DC Research Issues
Sungkyunkwan University (SKKU) Security Lab. DC To prevent the unauthorized control of switches SDN Controller Switch 2 Switch 3 Switch 1 Security applications Malicious Controller
Sungkyunkwan University (SKKU) Security Lab. DC To prevent the unauthorized control of switches SDN Controller Switch 2 Switch 3 Switch 1 Secure & authenticated channel We should establish a secure and authenticated channel between SDN controller and switches We need to consider a proper key management for secure communication between them Key management Security applications
Sungkyunkwan University (SKKU) Security Lab. DC A single point of failure or Compromise A centralized server will suffer from a single point of failure or compromise SDN Controller Switch 2 Switch 3 Switch 1 SDN Controller Applications do not work Security applications
Sungkyunkwan University (SKKU) Security Lab. DC To support the SDN-based security services SDN Controller Switch 2 Switch 3 Switch 1 We need to consider changes in the existing SDN switches and protocols Deep Packet Inspection Incoming packets Security applications
Sungkyunkwan University (SKKU) Security Lab. DC A scalable architecture SDN seems a scalable architecture to provide centralized security services in theory SDN Controller Switch 1 Switch 2 Switch n... Security applications
Sungkyunkwan University (SKKU) Security Lab. DC Intelligence switches We should address scalability to support security services in an autonomous and scalable fashion SDN Controller Switch 2 Switch 1 Switch 3 Security applications Incoming packets with malware, DDoS attack Each switch drops the packet automatically based on flow table Passed packets without malware, DDoS attack
Sungkyunkwan University (SKKU) Security Lab. DC Conclusions Proposed framework for security services based on SDN Discussed challenge issues and requirements for SDN As future work, Develop proposed framework in Mininet emulator and OMNeT++ simulator Investigate other security services (e.g., encryption/decryption, junk mail filtering, and anti-spam service)
Sungkyunkwan University (SKKU) Security Lab. DC Any questions?