999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

SDN Based Security Services

2019-01-12 02:58:46ZHANGYunyongXULeiandTAOYe
ZTE Communications 2018年4期

ZHANG Yunyong,XU Lei,and TAO Ye

(China Unicom,Beijing 100032,China)

Abstract With the development and revolution of network in recent years,the scale and complexity of network have become big issues.Traditional hardware based network security solution has shown some significant disadvantages in cloud computing based Internet data centers(IDC),such as high cost and lack of flexibility.With the implementation of software defined networking(SDN),network security solution could be more flexible and efficient,such as SDN based firewall service and SDN based DDoS-attack mitigation service.Moreover,combined with cloud computing and SDN technology,network security services could be lighter-weighted,more flexible,and on-demanded.This paper analyzes some typical SDN based network security services,and provide a research on SDN based cloud security service(network security service pool)and its implementation in IDCs.

Key words SDN;network security;cloud security service

1 Introduction

T he introducing of software defined networking ent vendors;no collaboration between devices always led to inconsistenceof security policy.

●With virtualization,eastbound and westbound traffic flow information cross different virtual machines(VMs)may not becaptured and analyzed since current security devices/appliances could not recognize those traffic flows.Thus,the cur-rent traffic monitoring and interception mechanisms do not apply to the virtualized system and the security view of theoperator's network may not be provided.(SDN)and network function virtualization(NFV)solution changes the network significantly:general hardware,virtualization software,and programmable services.With SDN and NFV,the network operation and maintenance cost iscut down,the utilization of resources isimproved,the network flexibility is increased,and the time-tomarket of new services is considerably decreased[1].

Therefore,SDN and NFV are considered as the innovation technology for telecommunicationsnetwork evolution.

However,SDN and NFV also bring new security challenges for telecommunication networks.These new security challenges include:

●The physical security boundary becomes ambiguous,but the network is still protected by static-deployed security devices/appliances and passive security responses according to provisioned security policies,which leadstolow-efficient security operation and maintenance,and delayed responses to security attacks[2].

●Network elements are created and deleted dynamically,butsecurity policies cannot be updated accordingly because most security policies are updated by manual operations.Therefore,security management and protection could not be provided for network elementsdynamically and automatical-ly.

●SDN and NFV systems lack centralized security policy scheduling cross different devices and services from differ-differentvendors; no collaboration between devices always led to inconsistence of security policy.

>●With virtualization, eastbound and westbound traffic flow informationcross different virtual machines (VMs) may not becaptured and analyzed since current security devices/appliancescould not recognize those traffic flows. Thus, the currenttraffic monitoring and interception mechanisms do notapply to the virtualized system and the security view of theoperator's network may not be provided.

Therefore,the static,passive,separate and manual operation of traditional security defense systems does not work for SDN/NFV networks.A dynamic,proactive,centralized and intelligent security management capability isneeded.

The new framework shall utilize the key advantages of SDN/NFV technology,such as on-demand capacity scale-in/scaleout,virtualization,centralization,and decoupling the data and control planes.This new framework is a layered one and shall provide security orchestration,centralized and automated security policy management,and intelligent security analysis and response[3].

This paper analyzes the security challenges of SDN/NFV network to identify the requirements,defines a software-defined security framework,and then describes the functionalities of each module;finally the reference implementations are alsoprovided.

The software-defined security framework may include the following components[4]:

●Security controller:A security controller is introduced to centralize and automatically control all the security devices,to gather flow traffic information and system logs from them.The security controller also works as SDN/NFV applications;it interacts with the SDN controller and NFV management and orchestration(MANO)toachievethe flow scheduling and auto scaling of the virtualized security functions.New technology(such as big data and artificial intelligence)can be easily introduced to further improve the intelligence of the security controller[5].

●SDN network:The SDN controller offers flow scheduling function,whole network topology and traffic flow information tothesecurity controller.

●NFV system:The NFV MANO provides virtual machine resources to the virtualized security function and the run-time status of these VMs.

2 Typical SDN Based Security Services

2.1 SDN Based Firewall Service

The SDN based firewall service is centralized and can manage network resources and manage firewall rules flexibly.As shown inFig.1,a SDN based centralized firewall management systemcould managefirewall rulesand switchesmoreflexible.

By using SDN controller,a packet-filtering strategy,which is issued by the firewall application(software or hardware),could be easily converted to a flow table through the controller.However,a protocol between the controller and switches(e.g.,openflow and netconf)is only able to match up to the transmission control protocol(TCP)layer at present,and thereisnocorresponding field to set the identification information of data packets above the TCPlayer.Therefore,it cannot be achieved to identify the information above the TCP layer firewall strategy without changing the protocol[6].

Fig.2shows an example scenario of centralized firewall service for switches and the process of filtering the attacking network messages through this security system.This scenario concentrates on SDNswitchesand showsthat how a user can manage acentralized firewall service.

▲Figure1.Centralized firewall servicein intra-domain.

▲Figure2.An examplescenario of centralized firewall service.

As a precondition for this scenario,a security manager should specify a new policy to firewall application when the information about a new attacking network message is recognized.In order to prevent packets from including this attacking network messages,the user adds the new policy to the firewall application running on top of the SDN controller.

Theprocessincludesfour steps:

●Step 1:A firewall application(could be software or hardware)should specify new security policies when the attacking network messages is warned.And these new policies could be added to the SDNcontroller.

●Step 2:A new flow entry might be distributed to each switch by a SDN controller after installing it.Therefore,the SDN controller sends a flow insert operation that contains the rules(e.g.,“drop packets with the attacking network messagesfile”)toall the SDNswitches.

The reported new attacking network messages is either a known attacking network messages or a“zero-day”attacking network messages.As for a known attacking network messages,some mechanisms such as“signatures”and“thumbprints”are developed for firewall service to detect and defend it.However,for a“zero-day”attacking network messages,it should be scanned and detected before any countermeasure is applied to defend it.Attacking network messages deliver malicious payloads that could exploit some vulnerable applications or services.Those attacking network messages might be detected by inspectingthepacket payload.

●Step 3:An SDN switch adds a flow entry dropping future packets with the attacking network messages file to its flow table when receiving the flow insert operation about the attacking network messages file.After that,the SDN switch can drop the packets with the attacking network messages file.

●Step 4:When receiving any packets with attacking network messages file,an SDN switch completely drops the packets.

Any packets with attacking network messages files cannot bepassed totheswitchesunder theapplied rules.

When an SDN switch receives a type of packet that it has not processed before,it deletes this packet and sends a report to the controller about this kind of packets.The controller analyzes whether this is an attack.If this is an attack,the controller sends a message to the firewall application and Step 1 will be executed.If not,the controller keeps a regular flow entry to tell the switches how to handle this sequence of afterwards packets.

2.2 SDN Based Honeypot Service

The SDN-based centralized honeypot can manage honeypot places.As shown inFig.3,a centralized honeypot manages switches and new routing paths to the honeypots to attract attackers to a place used as a trap.The honeypot is configured as the intended attack target and reports the collected information to thecentralized honeypot service[7].

Fig.4shows a centralized honeypot service for switches.Adding a routing path to a honeypot scenario shows that how a security manager can use a centralized honeypot system.This scenarioconcentrateson SDNswitches.

The process of adding a routing path to a honeypot instead of theactual target includes four steps as follows:

●Step 1:A honeypot application installs new rules to the SDN controller

A honeypot application should specify new rules when the information about a suspicious host is reported.In order to monitor the traffic from the suspicious host,the new rules(e.g.,“forward packets from the suspicious host to a honeypot”)is added to the SDN controller by honeypot application running on top of the SDNcontroller.

●Step 2:The SDNcontroller distributes new rulesto appropriate SDNswitches

▲Figure4.An examplescenario for centralized honeypot service.

The new rules might be distributed to each switch by the SDN controller after installing it.Therefore,the SDN controller sends a flow insert operation that contains the rule(e.g.,“forward packets from the suspicious host to a honeypot”)to all the SDNswitches.

●Step 3:All the SDN switches apply the new rules into their flow tables.

All the SDN switches add a flow entry forwarding future packets from the suspicious host to a honeypot to their flow tables when receiving the flow insert operation about the suspicious host.After that,the SDN switch can forward the packets fromthesuspicioushost toahoneypot.

●Step 4:An SDN switch executes the new rules to support honeypot service

When receiving any packets from the suspicious host,an SDN switch forwards the packets to a honeypot.In this way,any packetsfromthesuspicioushost cannot be passed toan actual target host switch under the applied rules.The forwarded packetsarecollected in thehoneypot.

2.3 SDN Based DDoS-Attack Mitigation Service

Fig.5shows a centralized distributed denial of service attack(DDoSattack)mitigation service.This service adds,deletes or modifies rules to each switch.Unlike the centralized firewall service,this service is mainly on the inter-domain level.

Fig.6shows an example scenario of centralized DDoS-attack mitigation for stateless servers.The process against Domain Name Services(DNS)DDoSattacks include four steps as follows.

●Step 1:A mitigation application installs new rules to SDN controller

▲Figure5.Centralized DDoS-attack mitigation servicein inter-domain.

▲Figure6.An examplescenario for centralized DDoS-attack mitigation for statelessservers.

A DDoS-attack mitigation application should specify new rules when a new DDoS-attack is detected.In order to prevent packets from reaching servers to waste the servers'resources,the new rule(e.g.,“drop DDoS-attack packets randomly with some probability”)isadded tothe SDNcontroller.Thisruleaddition is performed by DDoS-attack mitigation application runningon top of the SDNcontroller.

●Step 2:An SDN controller distributes new rules to appropriateswitches

The new rules might be distributed to each switch by a SDN controller after installing it.Therefore,the SDN controller sends a flow insert operation that contains the rule(e.g.,“drop randomly packetsconsidered DDoSattackswith acertain probability”)to all the SDNswitches.

●Step 3:All the SDN switches apply new rules into their flow tables

All the SDNswitchesadd a flow entry to their flow tables for dropping the packets in a DDoS-attack when receiving the flow insert operation about the DDoS-attack mitigation.After that,the SDN switch can drop these packets with a probability proportional tothe DDoS-attack severity.

●Step 4:An SDNswitch executesnew rulesto mitigate DDoS-attacks

An SDN switch completely drops the packets selected when receiving any packets in a DDoS-attack.

Fig.7shows an example scenario where the SDN controller can manageacentralized DDoS-attack mitigation.

●Step 1:A mitigation application installs new rules to the SDNcontroller

A DDoS-attack mitigation application should select the switch that performs the role of proxy for TCP service.New rule addition is performed by DDoS-attack mitigation application runningon top of the SDNcontroller.

●Step 2:A SDN controller distributes new rules to appropriateswitches

The installed new rules might be distributed to appropriate switches for DDoSattack mitigation by an SDN controller.The SDN controller then sends a flow insert operation that contains the rule(e.g.,“generate TCPSync+Ack for packets considered DDoSattacks”)to all the SDN switches.Therefore,a new rule is installed into the selected switch so that it can generate TCP Sync-Ack packets for TCP Sync as request.If the same requests arrive much more frequently than the expected rate,the SDN controller selects a new switch to serve the role of server.For the normal TCPSync,the switch transfers the TCPsession to the corresponding server in the private network.It can also be managed centrally by the SDNcontroller such that a security manager can determine security policies for their services.

●Step 3:All the SDN switches apply the new rule into their flow tables

▲Figure7.An examplescenario for centralized DDoS-attack mitigation for stateful servers.

All the SDN switches add a flow entry to their flow tables for dropping future packets in any DDoS-attacks when receiving the flow insert operation about the DDoS attacks.After that,the SDN switch can generate TCP Sync-Ack packets with a probability proportional tothe DDoS-attack severity.

●Step 4:An SDN switch executes the new rule to mitigate DDoS-attacks

An SDN switch completely responds to TCP Sync packets from an adversary host randomly when receiving DDoS-attack packets.DDoS-attack requests for stateful servers are handled by theswitchesinstead of actual servers.

3 SDN Based Cloud Security Services

With the implementation of SDN,network security service could be more flexible and efficient.As shown inFig.8,the SDN based cloud security service solution has two main system modules:the SDN based security controller and security service pool[8].

The SDN based security controller provides security for service network control and VNFs management.Based on the SDN controller and cloud computing platform,this module implements SDN based security control,secure VNF and service management,cloud service customer(CSC)management,and service-level agreement(SLA)monitoring[9].

Based on virtualization and NFV technology,the security service pool is implemented with multiple network security VNF or simply integrated with third-party security software with open API.The security resource pool is a combination of original physical security devices(hardware boxes such as firewall,web application firewall(WAF),intrusion prevention system(IPS))and virtual security devices(such as virtual firewall,virtual wireless application protocol(WAP),and virtual IPS).These devicesare abstracted with basic features and unified interface,so that the security controller can orchestrate these security functions,set security policies to them,and obtain flow traffic information fromthem[10].

Compared with traditional hardware-based network security solutions,SDN based cloud security services have several advantages such as multiple service types and more flexible functions in future networks,Internet data center(IDC)and cloud computingplatforms.

Benefited from NFV technology,the security service pool could provide multiple virtual security resources,with lower cost and fewer hardware resources.Many small-and mediumsize IDC providers only implement minimized security function,which could only provide basic security functions such as firewall and anti-DDoSdevices,due to the high cost of security hardware.With the implementation of security service pool,the IDCprovider could provide more types of security services with lower cost,while the security of IDC and tenant network is also enhanced.

Based on the SDN and cloud computing technology,the security controller could bring more flexible security service functions.Security resources could be provided and modified on demand.The service function chain could provide CSCprivate security network.Security resources could automatically migrate with the migration of tenant network and resources.

Fig.9defines a process of SDNbased cloud security service tothe CSC,which includethefollowingthreesteps.

●Step 1:CSCrequestscloud security services

CSC could request cloud security services with the system information(such as VLAN id,and IP),service type(such as vFWand WAF),and service quantity and configuration.

●Step 2:Security controller handlestherequest

▲Figure8.SDNbased cloud security service.

?Figure9.Processof SDNbased cloud security service.

Configuring the CSC request(with some necessary identification methods),the security controller could handle the request and send another request for the basic cloud resource(VM,cloud mirror type,network configuration,etc.)to the cloud management platform.

●Step 3:Cloud resource generation and service function chain implementation

The cloud management platform handles the request,generates the resource,and then sends the resource information back to the security controller.The controller implements the security function chain with thedemands of CSC.

4 Conclusions

With the development of new network technology such as SDN and NFV,network security faces some new challenges,threats,but also opportunities.Combining and implementing SDN and traditional network security functions could bring more flexible,efficient,lower cost network security services to the end customers.As the new Information and communication technology(ICT)technologies such as 5G and artificial intelligence(AI)are being implemented in the Internet and IDC,more network and information security challenges would rise up.Therefore,implementing new ICTtechnology in security industry would beanew trend[11].

主站蜘蛛池模板: 亚洲精品无码高潮喷水A| 亚洲精品第五页| 欧美高清国产| 精品无码一区二区三区电影| 91在线无码精品秘九色APP | 999国内精品久久免费视频| 99无码中文字幕视频| 免费福利视频网站| 久久久国产精品免费视频| 亚洲色图另类| 亚洲永久精品ww47国产| 国产一在线观看| 国产激情无码一区二区免费| 18禁黄无遮挡网站| 精品成人免费自拍视频| www欧美在线观看| 天天操天天噜| 三级欧美在线| 久久毛片基地| 天天综合网亚洲网站| 免费看a级毛片| 国产亚洲欧美在线视频| 免费jjzz在在线播放国产| 欧美日韩国产成人高清视频| 超级碰免费视频91| 日韩专区第一页| 精品国产污污免费网站| 日韩无码真实干出血视频| 国产精品专区第一页在线观看| 国产精品久久久久久久久kt| 国内精品自在欧美一区| 亚洲中文在线看视频一区| 色天天综合| 中文字幕啪啪| 国产精品尤物铁牛tv | 日本久久久久久免费网络| 久久大香伊蕉在人线观看热2| 亚洲精品无码AⅤ片青青在线观看| 香蕉视频在线观看www| 亚洲第一区在线| 欧美国产菊爆免费观看 | 都市激情亚洲综合久久 | 一级毛片在线直接观看| 孕妇高潮太爽了在线观看免费| 国产99视频精品免费视频7| 国产在线麻豆波多野结衣| 欧美一级99在线观看国产| 欧美yw精品日本国产精品| 色哟哟色院91精品网站| 一边摸一边做爽的视频17国产 | 国产精品免费p区| 色综合a怡红院怡红院首页| 色综合手机在线| 97在线免费| 国内精品久久人妻无码大片高| 无码中文AⅤ在线观看| 国产欧美日韩视频怡春院| 亚洲第一成人在线| 成人av专区精品无码国产| 亚洲区欧美区| 亚洲欧美一区二区三区蜜芽| av无码久久精品| 玖玖免费视频在线观看| …亚洲 欧洲 另类 春色| 久久久久久高潮白浆| 国产精品尤物在线| 香蕉eeww99国产在线观看| 青青久视频| 日韩精品一区二区深田咏美| 国产成人在线无码免费视频| 97国产一区二区精品久久呦| 精品国产香蕉伊思人在线| 精品久久久无码专区中文字幕| 久久黄色毛片| 国内精品自在自线视频香蕉| 2021国产精品自产拍在线观看| 中文字幕在线日本| 色妺妺在线视频喷水| 欧美a级在线| 国产丝袜无码一区二区视频| 找国产毛片看| 九九九精品视频|