国产日韩欧美一区二区三区三州_亚洲少妇熟女av_久久久久亚洲av国产精品_波多野结衣网站一区二区_亚洲欧美色片在线91_国产亚洲精品精品国产优播av_日本一区二区三区波多野结衣 _久久国产av不卡

?

SDN Based Security Services

2019-01-12 02:58:46ZHANGYunyongXULeiandTAOYe
ZTE Communications 2018年4期

ZHANG Yunyong,XU Lei,and TAO Ye

(China Unicom,Beijing 100032,China)

Abstract With the development and revolution of network in recent years,the scale and complexity of network have become big issues.Traditional hardware based network security solution has shown some significant disadvantages in cloud computing based Internet data centers(IDC),such as high cost and lack of flexibility.With the implementation of software defined networking(SDN),network security solution could be more flexible and efficient,such as SDN based firewall service and SDN based DDoS-attack mitigation service.Moreover,combined with cloud computing and SDN technology,network security services could be lighter-weighted,more flexible,and on-demanded.This paper analyzes some typical SDN based network security services,and provide a research on SDN based cloud security service(network security service pool)and its implementation in IDCs.

Key words SDN;network security;cloud security service

1 Introduction

T he introducing of software defined networking ent vendors;no collaboration between devices always led to inconsistenceof security policy.

●With virtualization,eastbound and westbound traffic flow information cross different virtual machines(VMs)may not becaptured and analyzed since current security devices/appliances could not recognize those traffic flows.Thus,the cur-rent traffic monitoring and interception mechanisms do not apply to the virtualized system and the security view of theoperator's network may not be provided.(SDN)and network function virtualization(NFV)solution changes the network significantly:general hardware,virtualization software,and programmable services.With SDN and NFV,the network operation and maintenance cost iscut down,the utilization of resources isimproved,the network flexibility is increased,and the time-tomarket of new services is considerably decreased[1].

Therefore,SDN and NFV are considered as the innovation technology for telecommunicationsnetwork evolution.

However,SDN and NFV also bring new security challenges for telecommunication networks.These new security challenges include:

●The physical security boundary becomes ambiguous,but the network is still protected by static-deployed security devices/appliances and passive security responses according to provisioned security policies,which leadstolow-efficient security operation and maintenance,and delayed responses to security attacks[2].

●Network elements are created and deleted dynamically,butsecurity policies cannot be updated accordingly because most security policies are updated by manual operations.Therefore,security management and protection could not be provided for network elementsdynamically and automatical-ly.

●SDN and NFV systems lack centralized security policy scheduling cross different devices and services from differ-differentvendors; no collaboration between devices always led to inconsistence of security policy.

>●With virtualization, eastbound and westbound traffic flow informationcross different virtual machines (VMs) may not becaptured and analyzed since current security devices/appliancescould not recognize those traffic flows. Thus, the currenttraffic monitoring and interception mechanisms do notapply to the virtualized system and the security view of theoperator's network may not be provided.

Therefore,the static,passive,separate and manual operation of traditional security defense systems does not work for SDN/NFV networks.A dynamic,proactive,centralized and intelligent security management capability isneeded.

The new framework shall utilize the key advantages of SDN/NFV technology,such as on-demand capacity scale-in/scaleout,virtualization,centralization,and decoupling the data and control planes.This new framework is a layered one and shall provide security orchestration,centralized and automated security policy management,and intelligent security analysis and response[3].

This paper analyzes the security challenges of SDN/NFV network to identify the requirements,defines a software-defined security framework,and then describes the functionalities of each module;finally the reference implementations are alsoprovided.

The software-defined security framework may include the following components[4]:

●Security controller:A security controller is introduced to centralize and automatically control all the security devices,to gather flow traffic information and system logs from them.The security controller also works as SDN/NFV applications;it interacts with the SDN controller and NFV management and orchestration(MANO)toachievethe flow scheduling and auto scaling of the virtualized security functions.New technology(such as big data and artificial intelligence)can be easily introduced to further improve the intelligence of the security controller[5].

●SDN network:The SDN controller offers flow scheduling function,whole network topology and traffic flow information tothesecurity controller.

●NFV system:The NFV MANO provides virtual machine resources to the virtualized security function and the run-time status of these VMs.

2 Typical SDN Based Security Services

2.1 SDN Based Firewall Service

The SDN based firewall service is centralized and can manage network resources and manage firewall rules flexibly.As shown inFig.1,a SDN based centralized firewall management systemcould managefirewall rulesand switchesmoreflexible.

By using SDN controller,a packet-filtering strategy,which is issued by the firewall application(software or hardware),could be easily converted to a flow table through the controller.However,a protocol between the controller and switches(e.g.,openflow and netconf)is only able to match up to the transmission control protocol(TCP)layer at present,and thereisnocorresponding field to set the identification information of data packets above the TCPlayer.Therefore,it cannot be achieved to identify the information above the TCP layer firewall strategy without changing the protocol[6].

Fig.2shows an example scenario of centralized firewall service for switches and the process of filtering the attacking network messages through this security system.This scenario concentrates on SDNswitchesand showsthat how a user can manage acentralized firewall service.

▲Figure1.Centralized firewall servicein intra-domain.

▲Figure2.An examplescenario of centralized firewall service.

As a precondition for this scenario,a security manager should specify a new policy to firewall application when the information about a new attacking network message is recognized.In order to prevent packets from including this attacking network messages,the user adds the new policy to the firewall application running on top of the SDN controller.

Theprocessincludesfour steps:

●Step 1:A firewall application(could be software or hardware)should specify new security policies when the attacking network messages is warned.And these new policies could be added to the SDNcontroller.

●Step 2:A new flow entry might be distributed to each switch by a SDN controller after installing it.Therefore,the SDN controller sends a flow insert operation that contains the rules(e.g.,“drop packets with the attacking network messagesfile”)toall the SDNswitches.

The reported new attacking network messages is either a known attacking network messages or a“zero-day”attacking network messages.As for a known attacking network messages,some mechanisms such as“signatures”and“thumbprints”are developed for firewall service to detect and defend it.However,for a“zero-day”attacking network messages,it should be scanned and detected before any countermeasure is applied to defend it.Attacking network messages deliver malicious payloads that could exploit some vulnerable applications or services.Those attacking network messages might be detected by inspectingthepacket payload.

●Step 3:An SDN switch adds a flow entry dropping future packets with the attacking network messages file to its flow table when receiving the flow insert operation about the attacking network messages file.After that,the SDN switch can drop the packets with the attacking network messages file.

●Step 4:When receiving any packets with attacking network messages file,an SDN switch completely drops the packets.

Any packets with attacking network messages files cannot bepassed totheswitchesunder theapplied rules.

When an SDN switch receives a type of packet that it has not processed before,it deletes this packet and sends a report to the controller about this kind of packets.The controller analyzes whether this is an attack.If this is an attack,the controller sends a message to the firewall application and Step 1 will be executed.If not,the controller keeps a regular flow entry to tell the switches how to handle this sequence of afterwards packets.

2.2 SDN Based Honeypot Service

The SDN-based centralized honeypot can manage honeypot places.As shown inFig.3,a centralized honeypot manages switches and new routing paths to the honeypots to attract attackers to a place used as a trap.The honeypot is configured as the intended attack target and reports the collected information to thecentralized honeypot service[7].

Fig.4shows a centralized honeypot service for switches.Adding a routing path to a honeypot scenario shows that how a security manager can use a centralized honeypot system.This scenarioconcentrateson SDNswitches.

The process of adding a routing path to a honeypot instead of theactual target includes four steps as follows:

●Step 1:A honeypot application installs new rules to the SDN controller

A honeypot application should specify new rules when the information about a suspicious host is reported.In order to monitor the traffic from the suspicious host,the new rules(e.g.,“forward packets from the suspicious host to a honeypot”)is added to the SDN controller by honeypot application running on top of the SDNcontroller.

●Step 2:The SDNcontroller distributes new rulesto appropriate SDNswitches

▲Figure4.An examplescenario for centralized honeypot service.

The new rules might be distributed to each switch by the SDN controller after installing it.Therefore,the SDN controller sends a flow insert operation that contains the rule(e.g.,“forward packets from the suspicious host to a honeypot”)to all the SDNswitches.

●Step 3:All the SDN switches apply the new rules into their flow tables.

All the SDN switches add a flow entry forwarding future packets from the suspicious host to a honeypot to their flow tables when receiving the flow insert operation about the suspicious host.After that,the SDN switch can forward the packets fromthesuspicioushost toahoneypot.

●Step 4:An SDN switch executes the new rules to support honeypot service

When receiving any packets from the suspicious host,an SDN switch forwards the packets to a honeypot.In this way,any packetsfromthesuspicioushost cannot be passed toan actual target host switch under the applied rules.The forwarded packetsarecollected in thehoneypot.

2.3 SDN Based DDoS-Attack Mitigation Service

Fig.5shows a centralized distributed denial of service attack(DDoSattack)mitigation service.This service adds,deletes or modifies rules to each switch.Unlike the centralized firewall service,this service is mainly on the inter-domain level.

Fig.6shows an example scenario of centralized DDoS-attack mitigation for stateless servers.The process against Domain Name Services(DNS)DDoSattacks include four steps as follows.

●Step 1:A mitigation application installs new rules to SDN controller

▲Figure5.Centralized DDoS-attack mitigation servicein inter-domain.

▲Figure6.An examplescenario for centralized DDoS-attack mitigation for statelessservers.

A DDoS-attack mitigation application should specify new rules when a new DDoS-attack is detected.In order to prevent packets from reaching servers to waste the servers'resources,the new rule(e.g.,“drop DDoS-attack packets randomly with some probability”)isadded tothe SDNcontroller.Thisruleaddition is performed by DDoS-attack mitigation application runningon top of the SDNcontroller.

●Step 2:An SDN controller distributes new rules to appropriateswitches

The new rules might be distributed to each switch by a SDN controller after installing it.Therefore,the SDN controller sends a flow insert operation that contains the rule(e.g.,“drop randomly packetsconsidered DDoSattackswith acertain probability”)to all the SDNswitches.

●Step 3:All the SDN switches apply new rules into their flow tables

All the SDNswitchesadd a flow entry to their flow tables for dropping the packets in a DDoS-attack when receiving the flow insert operation about the DDoS-attack mitigation.After that,the SDN switch can drop these packets with a probability proportional tothe DDoS-attack severity.

●Step 4:An SDNswitch executesnew rulesto mitigate DDoS-attacks

An SDN switch completely drops the packets selected when receiving any packets in a DDoS-attack.

Fig.7shows an example scenario where the SDN controller can manageacentralized DDoS-attack mitigation.

●Step 1:A mitigation application installs new rules to the SDNcontroller

A DDoS-attack mitigation application should select the switch that performs the role of proxy for TCP service.New rule addition is performed by DDoS-attack mitigation application runningon top of the SDNcontroller.

●Step 2:A SDN controller distributes new rules to appropriateswitches

The installed new rules might be distributed to appropriate switches for DDoSattack mitigation by an SDN controller.The SDN controller then sends a flow insert operation that contains the rule(e.g.,“generate TCPSync+Ack for packets considered DDoSattacks”)to all the SDN switches.Therefore,a new rule is installed into the selected switch so that it can generate TCP Sync-Ack packets for TCP Sync as request.If the same requests arrive much more frequently than the expected rate,the SDN controller selects a new switch to serve the role of server.For the normal TCPSync,the switch transfers the TCPsession to the corresponding server in the private network.It can also be managed centrally by the SDNcontroller such that a security manager can determine security policies for their services.

●Step 3:All the SDN switches apply the new rule into their flow tables

▲Figure7.An examplescenario for centralized DDoS-attack mitigation for stateful servers.

All the SDN switches add a flow entry to their flow tables for dropping future packets in any DDoS-attacks when receiving the flow insert operation about the DDoS attacks.After that,the SDN switch can generate TCP Sync-Ack packets with a probability proportional tothe DDoS-attack severity.

●Step 4:An SDN switch executes the new rule to mitigate DDoS-attacks

An SDN switch completely responds to TCP Sync packets from an adversary host randomly when receiving DDoS-attack packets.DDoS-attack requests for stateful servers are handled by theswitchesinstead of actual servers.

3 SDN Based Cloud Security Services

With the implementation of SDN,network security service could be more flexible and efficient.As shown inFig.8,the SDN based cloud security service solution has two main system modules:the SDN based security controller and security service pool[8].

The SDN based security controller provides security for service network control and VNFs management.Based on the SDN controller and cloud computing platform,this module implements SDN based security control,secure VNF and service management,cloud service customer(CSC)management,and service-level agreement(SLA)monitoring[9].

Based on virtualization and NFV technology,the security service pool is implemented with multiple network security VNF or simply integrated with third-party security software with open API.The security resource pool is a combination of original physical security devices(hardware boxes such as firewall,web application firewall(WAF),intrusion prevention system(IPS))and virtual security devices(such as virtual firewall,virtual wireless application protocol(WAP),and virtual IPS).These devicesare abstracted with basic features and unified interface,so that the security controller can orchestrate these security functions,set security policies to them,and obtain flow traffic information fromthem[10].

Compared with traditional hardware-based network security solutions,SDN based cloud security services have several advantages such as multiple service types and more flexible functions in future networks,Internet data center(IDC)and cloud computingplatforms.

Benefited from NFV technology,the security service pool could provide multiple virtual security resources,with lower cost and fewer hardware resources.Many small-and mediumsize IDC providers only implement minimized security function,which could only provide basic security functions such as firewall and anti-DDoSdevices,due to the high cost of security hardware.With the implementation of security service pool,the IDCprovider could provide more types of security services with lower cost,while the security of IDC and tenant network is also enhanced.

Based on the SDN and cloud computing technology,the security controller could bring more flexible security service functions.Security resources could be provided and modified on demand.The service function chain could provide CSCprivate security network.Security resources could automatically migrate with the migration of tenant network and resources.

Fig.9defines a process of SDNbased cloud security service tothe CSC,which includethefollowingthreesteps.

●Step 1:CSCrequestscloud security services

CSC could request cloud security services with the system information(such as VLAN id,and IP),service type(such as vFWand WAF),and service quantity and configuration.

●Step 2:Security controller handlestherequest

▲Figure8.SDNbased cloud security service.

?Figure9.Processof SDNbased cloud security service.

Configuring the CSC request(with some necessary identification methods),the security controller could handle the request and send another request for the basic cloud resource(VM,cloud mirror type,network configuration,etc.)to the cloud management platform.

●Step 3:Cloud resource generation and service function chain implementation

The cloud management platform handles the request,generates the resource,and then sends the resource information back to the security controller.The controller implements the security function chain with thedemands of CSC.

4 Conclusions

With the development of new network technology such as SDN and NFV,network security faces some new challenges,threats,but also opportunities.Combining and implementing SDN and traditional network security functions could bring more flexible,efficient,lower cost network security services to the end customers.As the new Information and communication technology(ICT)technologies such as 5G and artificial intelligence(AI)are being implemented in the Internet and IDC,more network and information security challenges would rise up.Therefore,implementing new ICTtechnology in security industry would beanew trend[11].

永春县| 蓬莱市| 云阳县| 电白县| 宿松县| 大理市| 泰安市| 视频| 长宁县| 托克逊县| 延寿县| 蒙山县| 元阳县| 轮台县| 密云县| 临潭县| 丹凤县| 北海市| 海阳市| 瓦房店市| 道真| 左贡县| 松滋市| 东港市| 仁布县| 铅山县| 临汾市| 隆回县| 盘山县| 石首市| 洛南县| 根河市| 永新县| 威远县| 静海县| 武义县| 玉山县| 郸城县| 扶沟县| 凤台县| 靖边县|