999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

SDN Based Security Services

2019-01-12 02:58:46ZHANGYunyongXULeiandTAOYe
ZTE Communications 2018年4期

ZHANG Yunyong,XU Lei,and TAO Ye

(China Unicom,Beijing 100032,China)

Abstract With the development and revolution of network in recent years,the scale and complexity of network have become big issues.Traditional hardware based network security solution has shown some significant disadvantages in cloud computing based Internet data centers(IDC),such as high cost and lack of flexibility.With the implementation of software defined networking(SDN),network security solution could be more flexible and efficient,such as SDN based firewall service and SDN based DDoS-attack mitigation service.Moreover,combined with cloud computing and SDN technology,network security services could be lighter-weighted,more flexible,and on-demanded.This paper analyzes some typical SDN based network security services,and provide a research on SDN based cloud security service(network security service pool)and its implementation in IDCs.

Key words SDN;network security;cloud security service

1 Introduction

T he introducing of software defined networking ent vendors;no collaboration between devices always led to inconsistenceof security policy.

●With virtualization,eastbound and westbound traffic flow information cross different virtual machines(VMs)may not becaptured and analyzed since current security devices/appliances could not recognize those traffic flows.Thus,the cur-rent traffic monitoring and interception mechanisms do not apply to the virtualized system and the security view of theoperator's network may not be provided.(SDN)and network function virtualization(NFV)solution changes the network significantly:general hardware,virtualization software,and programmable services.With SDN and NFV,the network operation and maintenance cost iscut down,the utilization of resources isimproved,the network flexibility is increased,and the time-tomarket of new services is considerably decreased[1].

Therefore,SDN and NFV are considered as the innovation technology for telecommunicationsnetwork evolution.

However,SDN and NFV also bring new security challenges for telecommunication networks.These new security challenges include:

●The physical security boundary becomes ambiguous,but the network is still protected by static-deployed security devices/appliances and passive security responses according to provisioned security policies,which leadstolow-efficient security operation and maintenance,and delayed responses to security attacks[2].

●Network elements are created and deleted dynamically,butsecurity policies cannot be updated accordingly because most security policies are updated by manual operations.Therefore,security management and protection could not be provided for network elementsdynamically and automatical-ly.

●SDN and NFV systems lack centralized security policy scheduling cross different devices and services from differ-differentvendors; no collaboration between devices always led to inconsistence of security policy.

>●With virtualization, eastbound and westbound traffic flow informationcross different virtual machines (VMs) may not becaptured and analyzed since current security devices/appliancescould not recognize those traffic flows. Thus, the currenttraffic monitoring and interception mechanisms do notapply to the virtualized system and the security view of theoperator's network may not be provided.

Therefore,the static,passive,separate and manual operation of traditional security defense systems does not work for SDN/NFV networks.A dynamic,proactive,centralized and intelligent security management capability isneeded.

The new framework shall utilize the key advantages of SDN/NFV technology,such as on-demand capacity scale-in/scaleout,virtualization,centralization,and decoupling the data and control planes.This new framework is a layered one and shall provide security orchestration,centralized and automated security policy management,and intelligent security analysis and response[3].

This paper analyzes the security challenges of SDN/NFV network to identify the requirements,defines a software-defined security framework,and then describes the functionalities of each module;finally the reference implementations are alsoprovided.

The software-defined security framework may include the following components[4]:

●Security controller:A security controller is introduced to centralize and automatically control all the security devices,to gather flow traffic information and system logs from them.The security controller also works as SDN/NFV applications;it interacts with the SDN controller and NFV management and orchestration(MANO)toachievethe flow scheduling and auto scaling of the virtualized security functions.New technology(such as big data and artificial intelligence)can be easily introduced to further improve the intelligence of the security controller[5].

●SDN network:The SDN controller offers flow scheduling function,whole network topology and traffic flow information tothesecurity controller.

●NFV system:The NFV MANO provides virtual machine resources to the virtualized security function and the run-time status of these VMs.

2 Typical SDN Based Security Services

2.1 SDN Based Firewall Service

The SDN based firewall service is centralized and can manage network resources and manage firewall rules flexibly.As shown inFig.1,a SDN based centralized firewall management systemcould managefirewall rulesand switchesmoreflexible.

By using SDN controller,a packet-filtering strategy,which is issued by the firewall application(software or hardware),could be easily converted to a flow table through the controller.However,a protocol between the controller and switches(e.g.,openflow and netconf)is only able to match up to the transmission control protocol(TCP)layer at present,and thereisnocorresponding field to set the identification information of data packets above the TCPlayer.Therefore,it cannot be achieved to identify the information above the TCP layer firewall strategy without changing the protocol[6].

Fig.2shows an example scenario of centralized firewall service for switches and the process of filtering the attacking network messages through this security system.This scenario concentrates on SDNswitchesand showsthat how a user can manage acentralized firewall service.

▲Figure1.Centralized firewall servicein intra-domain.

▲Figure2.An examplescenario of centralized firewall service.

As a precondition for this scenario,a security manager should specify a new policy to firewall application when the information about a new attacking network message is recognized.In order to prevent packets from including this attacking network messages,the user adds the new policy to the firewall application running on top of the SDN controller.

Theprocessincludesfour steps:

●Step 1:A firewall application(could be software or hardware)should specify new security policies when the attacking network messages is warned.And these new policies could be added to the SDNcontroller.

●Step 2:A new flow entry might be distributed to each switch by a SDN controller after installing it.Therefore,the SDN controller sends a flow insert operation that contains the rules(e.g.,“drop packets with the attacking network messagesfile”)toall the SDNswitches.

The reported new attacking network messages is either a known attacking network messages or a“zero-day”attacking network messages.As for a known attacking network messages,some mechanisms such as“signatures”and“thumbprints”are developed for firewall service to detect and defend it.However,for a“zero-day”attacking network messages,it should be scanned and detected before any countermeasure is applied to defend it.Attacking network messages deliver malicious payloads that could exploit some vulnerable applications or services.Those attacking network messages might be detected by inspectingthepacket payload.

●Step 3:An SDN switch adds a flow entry dropping future packets with the attacking network messages file to its flow table when receiving the flow insert operation about the attacking network messages file.After that,the SDN switch can drop the packets with the attacking network messages file.

●Step 4:When receiving any packets with attacking network messages file,an SDN switch completely drops the packets.

Any packets with attacking network messages files cannot bepassed totheswitchesunder theapplied rules.

When an SDN switch receives a type of packet that it has not processed before,it deletes this packet and sends a report to the controller about this kind of packets.The controller analyzes whether this is an attack.If this is an attack,the controller sends a message to the firewall application and Step 1 will be executed.If not,the controller keeps a regular flow entry to tell the switches how to handle this sequence of afterwards packets.

2.2 SDN Based Honeypot Service

The SDN-based centralized honeypot can manage honeypot places.As shown inFig.3,a centralized honeypot manages switches and new routing paths to the honeypots to attract attackers to a place used as a trap.The honeypot is configured as the intended attack target and reports the collected information to thecentralized honeypot service[7].

Fig.4shows a centralized honeypot service for switches.Adding a routing path to a honeypot scenario shows that how a security manager can use a centralized honeypot system.This scenarioconcentrateson SDNswitches.

The process of adding a routing path to a honeypot instead of theactual target includes four steps as follows:

●Step 1:A honeypot application installs new rules to the SDN controller

A honeypot application should specify new rules when the information about a suspicious host is reported.In order to monitor the traffic from the suspicious host,the new rules(e.g.,“forward packets from the suspicious host to a honeypot”)is added to the SDN controller by honeypot application running on top of the SDNcontroller.

●Step 2:The SDNcontroller distributes new rulesto appropriate SDNswitches

▲Figure4.An examplescenario for centralized honeypot service.

The new rules might be distributed to each switch by the SDN controller after installing it.Therefore,the SDN controller sends a flow insert operation that contains the rule(e.g.,“forward packets from the suspicious host to a honeypot”)to all the SDNswitches.

●Step 3:All the SDN switches apply the new rules into their flow tables.

All the SDN switches add a flow entry forwarding future packets from the suspicious host to a honeypot to their flow tables when receiving the flow insert operation about the suspicious host.After that,the SDN switch can forward the packets fromthesuspicioushost toahoneypot.

●Step 4:An SDN switch executes the new rules to support honeypot service

When receiving any packets from the suspicious host,an SDN switch forwards the packets to a honeypot.In this way,any packetsfromthesuspicioushost cannot be passed toan actual target host switch under the applied rules.The forwarded packetsarecollected in thehoneypot.

2.3 SDN Based DDoS-Attack Mitigation Service

Fig.5shows a centralized distributed denial of service attack(DDoSattack)mitigation service.This service adds,deletes or modifies rules to each switch.Unlike the centralized firewall service,this service is mainly on the inter-domain level.

Fig.6shows an example scenario of centralized DDoS-attack mitigation for stateless servers.The process against Domain Name Services(DNS)DDoSattacks include four steps as follows.

●Step 1:A mitigation application installs new rules to SDN controller

▲Figure5.Centralized DDoS-attack mitigation servicein inter-domain.

▲Figure6.An examplescenario for centralized DDoS-attack mitigation for statelessservers.

A DDoS-attack mitigation application should specify new rules when a new DDoS-attack is detected.In order to prevent packets from reaching servers to waste the servers'resources,the new rule(e.g.,“drop DDoS-attack packets randomly with some probability”)isadded tothe SDNcontroller.Thisruleaddition is performed by DDoS-attack mitigation application runningon top of the SDNcontroller.

●Step 2:An SDN controller distributes new rules to appropriateswitches

The new rules might be distributed to each switch by a SDN controller after installing it.Therefore,the SDN controller sends a flow insert operation that contains the rule(e.g.,“drop randomly packetsconsidered DDoSattackswith acertain probability”)to all the SDNswitches.

●Step 3:All the SDN switches apply new rules into their flow tables

All the SDNswitchesadd a flow entry to their flow tables for dropping the packets in a DDoS-attack when receiving the flow insert operation about the DDoS-attack mitigation.After that,the SDN switch can drop these packets with a probability proportional tothe DDoS-attack severity.

●Step 4:An SDNswitch executesnew rulesto mitigate DDoS-attacks

An SDN switch completely drops the packets selected when receiving any packets in a DDoS-attack.

Fig.7shows an example scenario where the SDN controller can manageacentralized DDoS-attack mitigation.

●Step 1:A mitigation application installs new rules to the SDNcontroller

A DDoS-attack mitigation application should select the switch that performs the role of proxy for TCP service.New rule addition is performed by DDoS-attack mitigation application runningon top of the SDNcontroller.

●Step 2:A SDN controller distributes new rules to appropriateswitches

The installed new rules might be distributed to appropriate switches for DDoSattack mitigation by an SDN controller.The SDN controller then sends a flow insert operation that contains the rule(e.g.,“generate TCPSync+Ack for packets considered DDoSattacks”)to all the SDN switches.Therefore,a new rule is installed into the selected switch so that it can generate TCP Sync-Ack packets for TCP Sync as request.If the same requests arrive much more frequently than the expected rate,the SDN controller selects a new switch to serve the role of server.For the normal TCPSync,the switch transfers the TCPsession to the corresponding server in the private network.It can also be managed centrally by the SDNcontroller such that a security manager can determine security policies for their services.

●Step 3:All the SDN switches apply the new rule into their flow tables

▲Figure7.An examplescenario for centralized DDoS-attack mitigation for stateful servers.

All the SDN switches add a flow entry to their flow tables for dropping future packets in any DDoS-attacks when receiving the flow insert operation about the DDoS attacks.After that,the SDN switch can generate TCP Sync-Ack packets with a probability proportional tothe DDoS-attack severity.

●Step 4:An SDN switch executes the new rule to mitigate DDoS-attacks

An SDN switch completely responds to TCP Sync packets from an adversary host randomly when receiving DDoS-attack packets.DDoS-attack requests for stateful servers are handled by theswitchesinstead of actual servers.

3 SDN Based Cloud Security Services

With the implementation of SDN,network security service could be more flexible and efficient.As shown inFig.8,the SDN based cloud security service solution has two main system modules:the SDN based security controller and security service pool[8].

The SDN based security controller provides security for service network control and VNFs management.Based on the SDN controller and cloud computing platform,this module implements SDN based security control,secure VNF and service management,cloud service customer(CSC)management,and service-level agreement(SLA)monitoring[9].

Based on virtualization and NFV technology,the security service pool is implemented with multiple network security VNF or simply integrated with third-party security software with open API.The security resource pool is a combination of original physical security devices(hardware boxes such as firewall,web application firewall(WAF),intrusion prevention system(IPS))and virtual security devices(such as virtual firewall,virtual wireless application protocol(WAP),and virtual IPS).These devicesare abstracted with basic features and unified interface,so that the security controller can orchestrate these security functions,set security policies to them,and obtain flow traffic information fromthem[10].

Compared with traditional hardware-based network security solutions,SDN based cloud security services have several advantages such as multiple service types and more flexible functions in future networks,Internet data center(IDC)and cloud computingplatforms.

Benefited from NFV technology,the security service pool could provide multiple virtual security resources,with lower cost and fewer hardware resources.Many small-and mediumsize IDC providers only implement minimized security function,which could only provide basic security functions such as firewall and anti-DDoSdevices,due to the high cost of security hardware.With the implementation of security service pool,the IDCprovider could provide more types of security services with lower cost,while the security of IDC and tenant network is also enhanced.

Based on the SDN and cloud computing technology,the security controller could bring more flexible security service functions.Security resources could be provided and modified on demand.The service function chain could provide CSCprivate security network.Security resources could automatically migrate with the migration of tenant network and resources.

Fig.9defines a process of SDNbased cloud security service tothe CSC,which includethefollowingthreesteps.

●Step 1:CSCrequestscloud security services

CSC could request cloud security services with the system information(such as VLAN id,and IP),service type(such as vFWand WAF),and service quantity and configuration.

●Step 2:Security controller handlestherequest

▲Figure8.SDNbased cloud security service.

?Figure9.Processof SDNbased cloud security service.

Configuring the CSC request(with some necessary identification methods),the security controller could handle the request and send another request for the basic cloud resource(VM,cloud mirror type,network configuration,etc.)to the cloud management platform.

●Step 3:Cloud resource generation and service function chain implementation

The cloud management platform handles the request,generates the resource,and then sends the resource information back to the security controller.The controller implements the security function chain with thedemands of CSC.

4 Conclusions

With the development of new network technology such as SDN and NFV,network security faces some new challenges,threats,but also opportunities.Combining and implementing SDN and traditional network security functions could bring more flexible,efficient,lower cost network security services to the end customers.As the new Information and communication technology(ICT)technologies such as 5G and artificial intelligence(AI)are being implemented in the Internet and IDC,more network and information security challenges would rise up.Therefore,implementing new ICTtechnology in security industry would beanew trend[11].

主站蜘蛛池模板: 免费看美女毛片| 色男人的天堂久久综合| 91久久天天躁狠狠躁夜夜| 综合社区亚洲熟妇p| av免费在线观看美女叉开腿| av手机版在线播放| 国产麻豆福利av在线播放| 2019年国产精品自拍不卡| 国产噜噜在线视频观看| 亚洲色图欧美| 日日噜噜夜夜狠狠视频| 91亚洲国产视频| 国产精品白浆无码流出在线看| 欧美成人免费一区在线播放| 少妇精品在线| 五月婷婷亚洲综合| 在线观看亚洲精品福利片| 国产免费一级精品视频 | AV天堂资源福利在线观看| 特级aaaaaaaaa毛片免费视频 | 国产性猛交XXXX免费看| 在线观看国产小视频| 国产午夜小视频| 国产精品免费p区| 国产黄色免费看| 色综合网址| 黄片在线永久| 国产精品久久自在自2021| 91无码人妻精品一区| 四虎国产在线观看| 亚洲国产天堂久久九九九| 国产综合精品一区二区| 特级毛片8级毛片免费观看| 一级福利视频| 国产精品美女自慰喷水| 特级做a爰片毛片免费69| 免费毛片全部不收费的| 五月六月伊人狠狠丁香网| 狠狠色成人综合首页| 人妻无码中文字幕一区二区三区| 亚洲最新地址| 免费无遮挡AV| 在线观看国产黄色| 美女一区二区在线观看| 日韩国产 在线| 国产精品片在线观看手机版| 一级毛片网| 国产精品9| 漂亮人妻被中出中文字幕久久| a亚洲天堂| 中国一级特黄视频| 国产人成在线观看| 第一区免费在线观看| 制服丝袜亚洲| 又爽又大又黄a级毛片在线视频| 乱人伦99久久| 欧美综合中文字幕久久| 欧美精品啪啪一区二区三区| 国模沟沟一区二区三区| 丁香六月激情综合| 亚洲不卡av中文在线| 亚洲无码高清一区| 欧美日韩激情在线| 日韩无码精品人妻| 欧美不卡在线视频| 真实国产精品vr专区| 国产人妖视频一区在线观看| 成人va亚洲va欧美天堂| 真人高潮娇喘嗯啊在线观看 | 无码丝袜人妻| 久热中文字幕在线| 欧美一区二区自偷自拍视频| 成人国内精品久久久久影院| 国产微拍一区| 久久精品亚洲热综合一区二区| 国产精品浪潮Av| 中文字幕在线播放不卡| 2021最新国产精品网站| 极品性荡少妇一区二区色欲| 玩两个丰满老熟女久久网| 欧美一级高清视频在线播放| 日韩国产黄色网站|