2016-5-261 SDN based Network Security Monitoring in Dynamic Cloud Networks Xiuzhen CHEN School of Information Security Engineering Shanghai Jiao Tong University,

Slides:



Advertisements
Similar presentations
CloudWatcher: Network Security Monitoring Using OpenFlow in Dynamic Cloud Networks or: How to Provide Security Monitoring as a Service in Clouds? Seungwon.
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Firewalls Uyanga Tserengombo
CCNA2 Module 4. Discovering and Connecting to Neighbors Enable and disable CDP Use the show cdp neighbors command Determine which neighboring devices.
 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Cosc 4765 Network Security: Routers, Firewall, filtering, NAT, and VPN.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Presented by Serge Kpan LTEC Network Systems Administration 1.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
A Guide to major network components
Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Networking Components Chad Benedict – LTEC
Connecting LANs, Backbone Networks, and Virtual LANs
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Additional SugarCRM details for complete, functional, and portable deployment.
Data Center Network Redesign using SDN
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
IT 210 The Internet & World Wide Web introduction.
NW Security and Firewalls Network Security
Network Components 101 Travis Hill.
Intranet, Extranet, Firewall. Intranet and Extranet.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Unit 4, Lesson 11 How Data Travels the Internet
Semester 3, v Chapter 3: Virtual LANs
Chapter 6: Packet Filtering
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Common Devices Used In Computer Networks
1 Routing. 2 Routing is the act of deciding how each individual datagram finds its way through the multiple different paths to its destination. Routing.
Honeypot and Intrusion Detection System
Repeaters and Hubs Repeaters: simplest type of connectivity devices that regenerate a digital signal Operate in Physical layer Cannot improve or correct.
INTERNATIONAL NETWORKS At Indiana University Hans Addleman TransPAC Engineer, International Networks University Information Technology Services Indiana.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Computer Networks. A computer network is defined as the interconnection of 2 or more independent computers or/and peripherals. Computer Network.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Aaron Gember, Theophilus Benson, Aditya Akella University of Wisconsin-Madison.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
1 Firewall Rules. 2 Firewall Configuration l Firewalls can generally be configured in one of two fundamental ways. –Permit all that is not expressly denied.
1 | © 2015 Infinera Open SDN in Metro P-OTS Networks Sten Nordell CTO Metro Business Group
6.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 6: Designing.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Preliminaries: EE807 Software-defined Networked Computing KyoungSoo Park Department of Electrical Engineering KAIST.
Chapter 26: Network Security Dr. Wayne Summers Department of Computer Science Columbus State University
Defining Network Infrastructure and Network Security Lesson 8.
SDN and Security Security as a service in the cloud
CompTIA Security+ Study Guide (SY0-401)
PCNSE7 Palo Alto Networks Certified Network Security Engineer
University of Maryland College Park
The DPIaaS Controller Prototype
Click to edit Master subtitle style
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Introduction to Networking
CompTIA Security+ Study Guide (SY0-401)
Firewalls at UNM 11/8/2018 Chad VanPelt Sean Taylor.
Information Security Session October 24, 2005
I. Basic Network Concepts
Chapter 26: Network Security
Network Virtualization
Firewalls Purpose of a Firewall Characteristic of a firewall
IS4680 Security Auditing for Compliance
Firewalls Routers, Switches, Hubs VPNs
Internet and Web Simple client-server model
Cloud-Enabling Technology
OpenSec:Policy-Based Security Using Software-Defined Networking
Presentation transcript:

SDN based Network Security Monitoring in Dynamic Cloud Networks Xiuzhen CHEN School of Information Security Engineering Shanghai Jiao Tong University, Shanghai, China Report in Telecom ParisTech, Paris 1

Content Background Background Characteristics of Cloud Network Challenges we meet Architecture of Cloud Security Monitor Analysis of concrete scenario

Background Cloud computing has become a popular paradigm. 3 Cloud computing is the third evolution of information technology after micro-computer and Internet.

Background Many recent new services are based on cloud environment.  computing  Storage  Web  Music  Cloud Hosting  …… 4 More and more people are using cloud networks. Many diverse hosts and network configurations coexist in a cloud network. It is essential to protect cloud networks from threats!!

Content Background Characteristics of Cloud Network Characteristics of Cloud Network Challenges we meet Architecture of Cloud Security Monitor Analysis of concrete scenario

Characteristics of Cloud Network Large-scale environment  Consisting of many physical hosts and virtual machines.  Amazon EC2 Cloud runs at least half million physical hosts.  Amazon EC2 Cloud operates almost five millions virtual machines assuming each host serves on average ten virtual machines. 6 Quite complicated configuration  Large number of diverse, networked physical/virtual machines.  Large number of diverse cloud consumers/tenants who may require very different networking configurations.

Characteristics of Cloud Network 7 Quite dynamic  On-demand service.  More VMs would run for a service massively required.  Virtual machines in a physical host can be dynamically invoked or removed, even be migrated to other physical hosts.

Content Background Characteristics of Cloud Network Challenges we meet Challenges we meet Architecture of Cloud Security Monitor Analysis of concrete scenario

Challenges Is it easy or simple to apply current network security devices (firewalls, NIDS) to a cloud network environment? 9 How to provide a network security monitoring service in a cloud network environment?

Challenges 10 Hard-to-ignore issues when deploying network security devices  How to care about threats from both outside and inside? Internet Human Resources Network Corporate Site Demilitarized Zone (DMZ) Public Servers DMZ Corporate Network Gateway It can’t detect malware infection of internal hosts/VMs in the case of public multi-tenant cloud networks.

Challenges 11 Hard-to-ignore issues when deploying network security devices  How to consider the dynamism of cloud computing resulted from virtual machine migration? Internet Human Resources Network Corporate Site Demilitarized Zone (DMZ) Public Servers DMZ Corporate Network Gateway Host A Host B Host C Installing a NIDS on a link between A and B for monitoring network traffic produced by a virtual machine running in host B. If virtual machines in host B migrate to another host C, we need to relocate the NIDS to a link between host A and host C.

Content Background Characteristics of cloud network Challenges we meet Architecture of Cloud Security Monitor Architecture of Cloud Security Monitor Analysis of concrete scenario

Architecture of Cloud Security Monitor Idea  Controlling network flows to guarantee that all necessary network packets are inspected by some security devices.  Providing a simple policy script language to help people use provided service easily.  SDN technology is used to provide a way of controlling network flows as we want, that is to say, making the flows transmit through network nodes where security devices reside. 13 Architecture

Architecture of Cloud Security Monitor As an application on top of network OSs used to control network routers or switches in SDN environment.  Device and policy manager: managing the information of security devices.  Routing rule generator: creating packet handling rule for each flow.  Flow rule enforcer: enforcing generated flow rules to switches. 14 Architecture

Architecture of Cloud Security Monitor Registering security devices  Device ID  Device type (NIDS, FW)  Location  Installation mode (passive (mirroring), in-line)  Supported functions 15 Specified by a SLI- registration script {1 , NIDS , 8 , passive , detect HTTP attack} Scenario: installing a NIDS in passive mode, which is attached to a router whose device ID is 8, can monitor network packets related to HTTP and detect attacks to Web servers.

Architecture of Cloud Security Monitor Creating security policies  Flow condition: representing the flow to be investigated. {SRC/DST IP Address, SRC/DST Port}  Device set: displaying necessary security devices (one or more) for investigation. 16 { : * →→ : *, {2}} Scenario: Monitoring network packets from to by employing a NIDS, whose device ID is 2. Specified by a SLI-policy script

Architecture of Cloud Security Monitor Controlling network flows which meet a flow condition  Network packet should pass through some specific routers or network links, which specified security devices are attached to.  The creating paths should be optimized.  Utilizing recent SDN technologies to control network flows as we want.  Graph structure, including nodes and arcs, is used to characterize a network. 17

Architecture of Cloud Security Monitor 1 ) Finding the shortest path (the lowest network link cost) between a start node and an end node. This problem can be formulated as: 18 s.t. : available supply at a node i : amount sent along the link from node i to node j : unit cost for flow along the arc between two nodes i and j Minimal cost flow problem Linear Programming 2 ) Finding path satisfying the conditions in our problem domain, including passive security devices and in-line security devices.

Content Background Characteristics of cloud network Challenges we meet Architecture of Cloud Security Monitor Analysis of concrete scenario Analysis of concrete scenario

Analysis of concrete scenario 20 Network layout Traditional packet delivery based on the shortest path routing Without considering the need of security monitoring

Analysis of concrete scenario 21 Multipath-naïve Visiting each security node regardless of the path between a start node and an end node. Finding the shortest path between a start node and an end node. Discovering the shortest path between a start node and each security node. Based on Openflow function: sending network packets to multiple output ports of a router simultaneously.

Analysis of concrete scenario 22 Multipath-shortest An enhanced version of multipath-naïve, which creates multiple redundant network flows Finding a node, which is closet to a security node, in the shortest path between the start node and the end node. If it finds the node, it asks this node to send packets to multiple output ports.

Analysis of concrete scenario 23 Shortest-through Finding all possible connection pairs among all nodes (including the start, the end and the security nodes) by performing permutation of all pairs. Investigating the shortest paths of each pair. Checking possible paths between a start node and an end node. Finding the path that has the minimum cost value and passing through each intermediate security node.

Analysis of concrete scenario 24 Shortest-inline Considering both security node and security links. Modification of multi-path-naïve to make sure that it should include security links in the generated paths.