ESF: AN ELASTIC SECURITY FRAMEWORK FOR CLOUD INFRASTRUCTURES
|
|
- Silvester Sanders
- 8 years ago
- Views:
Transcription
1 M. Pourzandi 1 ESF: AN ELASTIC SECURITY FRAMEWORK FOR CLOUD INFRASTRUCTURES Makan Pourzandi Ericsson Cloud System Management, Affiliated Associate Professor Concordia University Apr 2013
2 M. Pourzandi 2 Plan Background Elastic Security Framework Elastic Enforcement Layer Security Enforcement Optimization
3 Contributions Publications: 16 patent applications issued by US and European patent offices 3 Book chapters, 7 Journal papers 31 papers in international conferences with peer review Standardizations: June 2005-Dec 2009: Leader for Service Availability Forum Security working group, Co-editor for Service Availability Forum Security service specifications version A.0.1, released Sept, June 2002-Sept 2003: Editor for security requirements of Carrier Grade Linux Release 2.0 for Open Source Development Lab, released July Open Source: M. Pourzandi 3 Main software architect and project leader for Distributed Security Infrastructure Team leader for "Model-Based Engineering of Secure Software and Systems", Development of Java based plug-ins for IBM Rational Software Architect
4 M. Pourzandi 4 RESEARCH THEMES
5 M. Pourzandi 5 Distributed Security Infrastructure: Middle ware security
6 M. Pourzandi 6 MOdel-Based Framework for the Engineering of Secure Software and Systems: Software Security
7 M. Pourzandi 7 Telecom networks security: SPAM Mitigation on LTE 4G Mobile Networks Distributed architecture on the LTE network for SPAM mitigation Solving the over dimensioning problem Using of-the-shelf hardware in distributed nodes
8 Threats Connection-Based: - RF Jamming - Wireless Scrambling - Eavesdropping - Message Modification & Injection - Protocol Failures - Physical Attacks & Natural Disasters M. Pourzandi 8 Smart Grid Communications Security Device-Based: - Physical Attacks, Nat. Disasters - Rogue Access Points - Man-in-the-middle Attacks - DoS Attacks, Replay Attacks - Illegitimate use of services - Masquerading - Wardriving Base Station Smart Meter Home Gateway Home Area Network Neighborhood Area Network
9 M. Pourzandi 9 Research Themes Software security Verification and validation of security requirements at design level Integration of enforcement mechanisms at the design level Distributed security infrastructure Application Middleware Security Distributed process based access control DDoS and SPAM mitigation mechanisms in Mobile Telecom networks Distributed Architecture for Spam Mitigation on LTE 4G Mobile Networks Cloud computing security Network & Cloud Computing Security Security and privacy of user-generated data in the cloud storage Self-protecting elastic security frameworks for large IT systems Communication Security for Smart Grid Distribution Networks Smart Grid Security
10 M. Pourzandi 10 WHY AN ELASTIC SECURITY FRAMEWORK IN CLOUD INFRASTRUCTURES?
11 M. Pourzandi 11 Agenda Background Elastic Security Framework Elastic Enforcement Layer Security Enforcement Optimization
12 M. Pourzandi 12 Cloud Computing: Infrastructure As A Service (IaaS) Enhanced by massive virtualization Internet Servers Physical Infrastructure Shared pool of configurable computing resources Elasticity: On-demand resource, auto-scaling Virtualization Virtual Infrastructure Self provisioning, Flexibility Physical Infrastructure
13 M. Pourzandi 13 Target systems: Large IT systems such as cloud infrastructure Cloud infrastructure build on top of large data centers Several thousands to hundreds of thousands of servers Cloud approach is based on pay for the resources that you need You just turn off the extra resources when there is no need Massive virtualization to provide elasticity and flexibility
14 M. Pourzandi 14 Cloud Computing Security: Status Security is a major concern for the industry when moving to Cloud Computing 72% of organizations are "extremely concerned" or "very concerned" about security in the cloud environment (2010 research firm TheInfoPro) Many of the cloud security issues are the same for enterprise security Some differences though
15 M. Pourzandi 15 Background Complexity of the application behaviour and sheer number of them make it difficult, costly and error prone to write down by hand different network security enforcement rules for the data centers Cloud elastic nature makes it necessary to be able to adapt security rules in an agile and fast way This makes a human intervention too slow and not realistic given the pace of changes An old problem: enforcing security in a complex network
16 M. Pourzandi 16 New dimensions for an old problem Scalability and elasticity in the cloud make it impossible to use old methods Multi Tenancy/Compartmentalization: Need to isolate communications/resources between different customers Scalability: Need to support tens of thousands of virtual machines, running on thousands of physical servers Flexibility: Need to support many different types of applications with different network topologies and security needs Elastic security: Need to maintain security policy as data and virtual machines migrate in the cloud, and auto-scale
17 M. Pourzandi Use Cases Consider security mechanisms for a 3-tier application Assume a deployment in the cloud: 6 instances of web server, 2 instances of business tier and 1 instance of database 17
18 M. Pourzandi Possible mapping of virtual machines into a physical network 18
19 M. Pourzandi Consequences of VM Migration on Security Rules If in the previous example WS6 migrates from PS2 to PS4 then: 1. WS6 rules should be removed from FW1 and added to FW2 2. WS3 WS6 rules in AppFW1 should be removed and added to AppFW2 3. Security policy of FW1, AppFW1, FW2, and AppFW2 should be verified and validated This means all FWs in the previous scenario are affected by this migration! 19
20 M. Pourzandi 20 Current approaches: Solution 1 Virtual FW defined for each VM When VM1 migrates to another data center, VM1 traffic is redirected back to the data
21 M. Pourzandi 21 Current approaches: Solution 2 Different VFWs are composed together Creating multitude of vfws Benefit from HW Firewalling
22 M. Pourzandi 22 Challenges remain When VM1 migrates, there is need for maintaining the same sec policy Validate that inserted rules do not introduce any anomalies in other FWs Security policy orchestration Topology based optimization
23 M. Pourzandi 23 How to address these challenges? Need for automatic and dynamic generation of security rules Maintenance and enforcement of security rules for a large number of components, e.g. virtual machines in the cloud infrastructure For an elastic network there is need for an elastic network security
24 M. Pourzandi 24 Agenda Background Elastic Security Framework Elastic Enforcement Layer Security Enforcement Optimization
25 M. Pourzandi 25 ESF: AN ELASTIC SECURITY FRAMEWORK FOR CLOUD INFRASTRUCTURES
26 M. Pourzandi 26 ESF High Level overview ESF presents a framework to implement security vertically through different layers of the cloud infrastructure Few steps involve human intervention: Developers describe their distributed application security policies Remaining steps are transparent to the developers and are generated automatically from the description
27 M. Pourzandi 27 Elastic Network Security: Functional Diagram Automatically generate security policy for different applications running in the cloud from their description Auditability: Being able to verify and validate the consistency and the compliance with predefined security policy Configure the enforcement measures to enforce those security rules in the cloud Compose/Consolidate different security rules in order to implement an efficient enforcement Dynamically modify/adapt the security enforcement measures based on the security policies
28 M. Pourzandi 28 Agenda Background Elastic Security Framework Elastic Enforcement Layer Security Enforcement Optimization
29 M. Pourzandi 29 ELASTIC ENFORCEMENT LAYER (EEL) Sticky Flow Algorithm Case
30 M. Pourzandi 30 Elastic Network Security: Functional Diagram
31 M. Pourzandi 31 EEL Virtual security architecture is anchored in the physical architecture As the applications evolve/migrate in the cloud, the enforcement measures should be adapted to enforce the security policies All life stages of VM must be taken into account: launch, termination, cloning, migration, etc.
32 M. Pourzandi 32 EEL functionality Dynamic and automatic enforcement of security mechanisms L3-L7 Firewalling, Secure connections establishment, e.g. IPSec tunnels, DPI, IDS/IPS, etc. Rapid scaling of protection mechanisms When one or several tenants are under attack, for example DDoS, mitigation mechanisms can be scaled up As the tasks performed by the cloud are Agile, Scalable, Elastic, their security policy enforcement should also be the same: Agile, Scalable, Elastic
33 M. Pourzandi 33 EEL flexible design EEL enforces security policies through different nodes in the cloud data center, Policy Enforcement Point (PEP) Policy Decision Points ( PDP) decide how and what PEPs enforce Based on resource availability (Bandwidth, CPU, Specialized HW, e.g. network processors) Latency Locality information
34 M. Pourzandi 34 EEL design application principles to the network layer: Sticky flow Network security is applied through different network middle boxes/security appliances, e.g. Firewall, IDS/IPS, Web App Firewall Different network traffic must traverse a pre-defined sequence of security appliances Automatic and Transparent Enforcement in consideration of multi-tenancy, elastic networking and VM cloning and migration Particularly, traffic should traverse security appliances in the sequence required by the tenant and should not traverse unnecessary security appliances
35 M. Pourzandi 35 State of the art: Policy aware network enforcement Sticky Flow Solution Support Middlebox Isolation Automatic Migration Dynamic Policy-aware [Stoica] Y Y Y N N NetOdessa [Bellessa] FML/FSL [Mitchell- Shenker] N Y Y N N Y Y N N N
36 Elastic enforcement M. Pourzandi 36
37 M. Pourzandi 37 Sticky flow design (1) Application ID (AppID) for each vapp inserted at hypervisor layer, e.g. IP options Each AppID is associated to some security sequence AppID is used for control level in SDN
38 M. Pourzandi 38 Sticky flow design (2) EEL-tags added at Ethernet layer: Generic Tags (gtags) Instance Tags (itags) EEL tags are used for forwarding layer Appliance types are not redundant in the sequence, in the security sequence then Reasonable as a sequence is applied to a communication between two VMs in the network
39 M. Pourzandi 39 Basic use case The OpenFlow-Controller (OFC) extracts the AppID and determine the chain of gtags to be traversed It then matches the Generic Tags (gtags) to an Instance Tags (itags) range It then chooses the middebox instances to send the packet to (based on cloud resource availability). In our example, let's assume the chosen instances of IDS, AppFW and DPI correspond to itags 2070, 1045 and 3093 respectively The OpenFlow-Switch (OFS) forwards the rst packet to the controller VM1 starts emitting packets. These packets are intercepted by the hypervisor that inserts the AppID into the ip options
40 M. Pourzandi 40 Basic use case Similar rules to the previous ones are to be set into all the middleboxes edge's OFS. Note that for the egress switch of the last middlebox in the chain, the packet should only be routed to the next switch towards the destination VM Along the path, the controller adds a rule to forward the packet to the next switch towards the middlebox instance, based on the EEL-tag. Elasticity: the security appliance instances can change as virtual network change The OFC also adds three new ow-entries into the IDS's ingress and egress OFS : { Packets tagged with EEL-tag 2070 must have their tag popped and be forwarded to the IDS (ingress). { Packets out of the IDS, from VM1 and to VM2 must have the EEL-tag 1045 pushed (egress). { Packets with EEL-tag 1045 must be routed to the next switch towards the AppFW 1045 instance (egress). The OFC adds a two new ow-entries into the VM1's edge OFS : { Packets from VM1 (to VM2) must be tagged with EEL-tag { Packets with EEL-tag 2070 must be routed to the next switch towards the IDS 2070 instance. Mulitenancy is enforced dynamically and automatically at layer 2.
41 M. Pourzandi 41 Migration use case: intra data center VM1' starts emitting packets. These packets are intercepted by the hypervisor that inserts the AppID into the ip options Similar rules to the previous ones are to be set into all the middleboxes edge's OFS. Same as previous. Note that the IDS itag is now Only the AppFW egress switch rules may be modifed, for example if VM1 and VM1' don't have the same MAC address. Network Security Policy is maintained dynamically and automatically after VM migration.
42 Elastic enforcement M. Pourzandi 42
43 M. Pourzandi 43 Sticky Flow Algorithm Traffic is steered inside the DC network based on App ID Open Flow controller is the PDP Open Flow switches and Security appliances are PEPs
44 M. Pourzandi 44 Implementation OpenFlow : NOX Openflow controller Python code added to support sticky flow functionality EEL-tags Usage of VLAN tag support Network : Mininet Custom topology Implemented as Python Sender, receiver, middlebox Implemented as Python processes
45 Proof of concept M. Pourzandi 45
46 M. Pourzandi 46 Sticky flow conclusions Automatic and transparent enforcement Isolation At switch level, L2 enforce the security isolation between tenants networks Maintaining security policies in an elastic environment VM migration/cloning Security policy can be maintained at network layer through different data centers Delegating the choice of security appliances instances according to data center resources No need for centralized decision making/resource management Better resiliency and efficiency in resource consumption
47 M. Pourzandi 47 Agenda Background Elastic Security Framework Elastic Enforcement Layer Security Enforcement Optimization
48 M. Pourzandi 48 SECURITY ENFORCEMENT OPTIMIZATION Local-Global Multi-objective Constraint-Based Path Optimization Algorithm in the cloud infrastructure (LGCM)
49 M. Pourzandi 49 Elastic Network Security: Functional Diagram
50 M. Pourzandi 50 Goal: Build an optimal path based on multiple factors passing through some predefined set of security appliances
51 M. Pourzandi 51 Multi-objective Optimization (1) Need for multiple criteria optimization algorithms Ex: cost, delay/latency, capacity, ownership for each network link Typically, there is no unique optimal solution for such problems Necessary to use decision maker s preferences to differentiate between solutions Difficulty comes from the presence of more than one criterion No longer a unique optimal solution to the problem that can be obtained without incorporating preference information
52 M. Pourzandi 52 Multi-objective Optimization (2) Concept of an optimal solution is often replaced by a set of non-dominated solutions A non-dominated solution has the property that it is not possible to move away from it to any other solution without sacrificing in at least one criterion The boxed points represent feasible choices, and smaller values are preferred to larger ones. Point C is not on the Pareto Frontier because it is dominated by both point A and point B. Points A and B are not strictly dominated by any other, and hence do lie on the frontier Fig from Wikipedia
53 M. Pourzandi 53 Solving Multi-objective Optimization: State of the art Scalarization: convert the original problem into one single problem Ex: Assign weights to different objectives in a linear scalarization Difficulty is to come up with right weights Human expert Difficult to be used in the cloud context, i.e. dynamic changes, large scale, elastic networks, short answer times needed Evolutionary Multi-objective Optimization Find all valid paths Low complexity comparative to other approaches, i.e. cost Difficult in cloud environment to define the convergence factor to the optimal solution
54 M. Pourzandi 54 Evolutionary Multi-objective Optimization Start from a set of initial individuals Iterate over generations Select the fittest individuals Mate the fittest Mutate over to create new individuals Converge toward a set of non-dominated individuals
55 M. Pourzandi 55 Bueno approach using SPEA2 for multicast flow routing Bueno algorithm* addresses building a multi-factor optimal multicast using SPEA2 An heuristic proposed to reduce the problem Mating selection Step 1: Fitness based on Pareto dominance: dominated by, dominating Dominance rank, dominance count Step 2: Refining through density, select individuals in less dense area to improve the diversity KNN density [*] Bueno, M.L.P.; Oliveira, G.M.B.;, "Multicast flow routing: Evaluation of heuristics and multiobjective evolutionary algorithms," Evolutionary Computation (CEC), 2010 IEEE Congress on, vol., no., pp.1-8, July 2010
56 M. Pourzandi 56 Supporting sequence of security appliances In Bueno Algo, there is no concept of sequence of middle boxes to respect Need for improving Bueno s algorithm with the concept of sequence
57 M. Pourzandi 57 LGMC: Illustrating Step by Step paradigm One step is defined to be an edge in the sequence diagram Bueno is used at each step Objective function must minimize link utilization, total cost, end-to-end delay, hops count
58 M. Pourzandi 58 LGMC Pseudo Code: define global paths Pre-defined security sequence of K middle boxes, i.e. K steps // Find Pareto front local paths for each step For each step do For every step I in the pre-defined sequence of middleboxes do According to step I for valid instances of middle box types then Assign Src and Dst to be two valid instance of the middle boxes Apply Bueno between Src Dst Find the Pareto front of local-paths between Src and Dst, i.e. local-path.. Assign Pareto front local-paths.. to step-paths.. // Build global paths from local steps Assign to Global-paths[m] the K-tupe (steppaths[1] step-paths[k])
59 M. Pourzandi 59 LGMC Pseudo code: finding Pareto front among global paths // Re-apply MOEA to the k-tuples while keeping the precedence of local-paths in the k-tuple Apply SPEA2 MOEA to the k-tuples Mating: fill mating pool through binary tournament with new (ktuple) individuals Mutation: Mutate new individuals by changing the local-paths respecting the sequence, i.e. mutation in step I from local-paths[i] End result: Pareto Front in the global paths, i.e. from Source VM to destination VM
60 M. Pourzandi 60 LGCM: Complexity LGCM is based on SPEA2 with the complexity log where M is number of individuals at each generation LGCM complexity is then K log where K is the number of elements in the security sequence LGCM complexity is independent from N number of nodes in the network We cannot really compare an evolutionary algorithm with exact algorithmic methods Chen and Nahrstedt showed on a paper that a similar kind of problem, i.e. Multi-constrained paths can be solved in complexity where N is the number of nodes in the graph and x is large enough (e.g. 10)
61 M. Pourzandi 61 Future work LGCM is our first attempt at using MOEA in a network with a pre-defined set of constraints First results are encouraging Theoretical complexity is comparatively low Proof of concept program results in valid graphs Need to validate approach through more complete set of examples Need for new improve current LGCM algorithm by extending our work to create virtual security appliances in the cloud infrastructure
62 M. Pourzandi 62 ESF conclusions ESF targets developing a homogeneous approach around complex problems Several problems have been addressed so far Elastic enforcement: Sticky Flow Algorithm Enforcement optimization: LGCM Verification and validation of security rules: Cloud Calculus Need to extend these results to a wider use cases
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
More informationVirtualization, SDN and NFV
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
More informationTesting Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES
Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 SDN - An Overview... 2 SDN: Solution Layers and its Key Requirements to be validated...
More informationTesting Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...
More informationSoftware-Defined Networks Powered by VellOS
WHITE PAPER Software-Defined Networks Powered by VellOS Agile, Flexible Networking for Distributed Applications Vello s SDN enables a low-latency, programmable solution resulting in a faster and more flexible
More informationRemote Voting Conference
Remote Voting Conference Logical Architecture Connectivity Central IT Infra NIST Best reachability in India for R-Voting Initiative 200+ Physical MPLS POPs across India 5 Regional Data Centre at Pune,
More informationCloud Networking Disruption with Software Defined Network Virtualization. Ali Khayam
Cloud Networking Disruption with Software Defined Network Virtualization Ali Khayam In the next one hour Let s discuss two disruptive new paradigms in the world of networking: Network Virtualization Software
More informationBuilding Scalable Multi-Tenant Cloud Networks with OpenFlow and OpenStack
Building Scalable Multi-Tenant Cloud Networks with OpenFlow and OpenStack Dave Tucker Hewlett-Packard April 2013 1 About Me Dave Tucker WW Technical Marketing HP Networking dave.j.tucker@hp.com Twitter:
More informationWedge Networks: Transparent Service Insertion in SDNs Using OpenFlow
Wedge Networks: EXECUTIVE SUMMARY In this paper, we will describe a novel way to insert Wedge Network s multiple content security services (such as Anti-Virus, Anti-Spam, Web Filtering, Data Loss Prevention,
More informationRIDE THE SDN AND CLOUD WAVE WITH CONTRAIL
RIDE THE SDN AND CLOUD WAVE WITH CONTRAIL Pascal Geenens CONSULTING ENGINEER, JUNIPER NETWORKS pgeenens@juniper.net BUSINESS AGILITY Need to create and deliver new revenue opportunities faster Services
More informationWHITE PAPER. Network Virtualization: A Data Plane Perspective
WHITE PAPER Network Virtualization: A Data Plane Perspective David Melman Uri Safrai Switching Architecture Marvell May 2015 Abstract Virtualization is the leading technology to provide agile and scalable
More informationDelivering Managed Services Using Next Generation Branch Architectures
Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN
More informationIntroduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre
Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre Wilfried van Haeren CTO Edgeworx Solutions Inc. www.edgeworx.solutions Topics Intro Edgeworx Past-Present-Future
More informationRELIABILITY AND AVAILABILITY OF CLOUD COMPUTING. Eric Bauer. Randee Adams IEEE IEEE PRESS WILEY A JOHN WILEY & SONS, INC.
RELIABILITY AND AVAILABILITY OF CLOUD COMPUTING Eric Bauer Randee Adams IEEE IEEE PRESS WILEY A JOHN WILEY & SONS, INC., PUBLICATION CONTENTS Figures Tables Equations Introduction xvii xxi xxiii xxv I
More informationHow To Orchestrate The Clouddusing Network With Andn
ORCHESTRATING THE CLOUD USING SDN Joerg Ammon Systems Engineer Service Provider 2013-09-10 2013 Brocade Communications Systems, Inc. Company Proprietary Information 1 SDN Update -
More informationSOFTWARE-DEFINED NETWORKING AND OPENFLOW
SOFTWARE-DEFINED NETWORKING AND OPENFLOW Freddie Örnebjär TREX Workshop 2012 2012 Brocade Communications Systems, Inc. 2012/09/14 Software-Defined Networking (SDN): Fundamental Control
More informationSTeP-IN SUMMIT 2013. June 18 21, 2013 at Bangalore, INDIA. Performance Testing of an IAAS Cloud Software (A CloudStack Use Case)
10 th International Conference on Software Testing June 18 21, 2013 at Bangalore, INDIA by Sowmya Krishnan, Senior Software QA Engineer, Citrix Copyright: STeP-IN Forum and Quality Solutions for Information
More informationRadware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical
Radware ADC-VX Solution The Agility of Virtual; The Predictability of Physical Table of Contents General... 3 Virtualization and consolidation trends in the data centers... 3 How virtualization and consolidation
More informationLecture 02a Cloud Computing I
Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking
More informationSDN CONTROLLER. Emil Gągała. PLNOG, 30.09.2013, Kraków
SDN CONTROLLER IN VIRTUAL DATA CENTER Emil Gągała PLNOG, 30.09.2013, Kraków INSTEAD OF AGENDA 2 Copyright 2013 Juniper Networks, Inc. www.juniper.net ACKLOWLEDGEMENTS Many thanks to Bruno Rijsman for his
More informationOptimizing Data Center Networks for Cloud Computing
PRAMAK 1 Optimizing Data Center Networks for Cloud Computing Data Center networks have evolved over time as the nature of computing changed. They evolved to handle the computing models based on main-frames,
More informationCore and Pod Data Center Design
Overview The Core and Pod data center design used by most hyperscale data centers is a dramatically more modern approach than traditional data center network design, and is starting to be understood by
More informationSoftware Defined Network (SDN)
Georg Ochs, Smart Cloud Orchestrator (gochs@de.ibm.com) Software Defined Network (SDN) University of Stuttgart Cloud Course Fall 2013 Agenda Introduction SDN Components Openstack and SDN Example Scenario
More informationIntel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family
Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family White Paper June, 2008 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL
More informationOn Orchestrating Virtual Network Functions
On Orchestrating Virtual Network Functions Presented @ CNSM 2015 Md. Faizul Bari, Shihabur Rahman Chowdhury, and Reaz Ahmed, and Raouf Boutaba David R. Cheriton School of Computer science University of
More informationSOFTWARE DEFINED NETWORKING
SOFTWARE DEFINED NETWORKING Bringing Networks to the Cloud Brendan Hayes DIRECTOR, SDN MARKETING AGENDA Market trends and Juniper s SDN strategy Network virtualization evolution Juniper s SDN technology
More informationDefinition of a White Box. Benefits of White Boxes
Smart Network Processing for White Boxes Sandeep Shah Director, Systems Architecture EZchip Technologies sandeep@ezchip.com Linley Carrier Conference June 10-11, 2014 Santa Clara, CA 1 EZchip Overview
More informationSoftware-Defined Network (SDN) & Network Function Virtualization (NFV) Po-Ching Lin Dept. CSIE, National Chung Cheng University
Software-Defined Network (SDN) & Network Function Virtualization (NFV) Po-Ching Lin Dept. CSIE, National Chung Cheng University Transition to NFV Cost of deploying network functions: Operating expense
More informationTRILL for Data Center Networks
24.05.13 TRILL for Data Center Networks www.huawei.com enterprise.huawei.com Davis Wu Deputy Director of Switzerland Enterprise Group E-mail: wuhuajun@huawei.com Tel: 0041-798658759 Agenda 1 TRILL Overview
More informationSecure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka. www.ijreat.org
Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks Kruthika S G 1, VenkataRavana Nayak 2, Sunanda Allur 3 1, 2, 3 Department of Computer Science, Visvesvaraya Technological
More informationCloud, SDN and the Evolution of
Cloud, SDN and the Evolution of Enterprise Networks Neil Rickard Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form
More informationTRILL Large Layer 2 Network Solution
TRILL Large Layer 2 Network Solution Contents 1 Network Architecture Requirements of Data Centers in the Cloud Computing Era... 3 2 TRILL Characteristics... 5 3 Huawei TRILL-based Large Layer 2 Network
More informationPLUMgrid Open Networking Suite Service Insertion Architecture
White Paper PLUMgrid Open Networking Suite Service Insertion Architecture Introduction A rapid increase in the use of cloud services across the globe require networks to be adaptable and flexible. PLUMgrid
More informationNetwork Services in the SDN Data Center
Network Services in the SDN Center SDN as a Network Service Enablement Platform Whitepaper SHARE THIS WHITEPAPER Executive Summary While interest about OpenFlow and SDN has increased throughout the tech
More informationNetwork Technologies for Next-generation Data Centers
Network Technologies for Next-generation Data Centers SDN-VE: Software Defined Networking for Virtual Environment Rami Cohen, IBM Haifa Research Lab September 2013 Data Center Network Defining and deploying
More informationOVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea (meclavea@brocade.com) Senior Solutions Architect, Brocade Communications Inc. Jim Allen (jallen@llnw.com) Senior Architect, Limelight
More informationBuilding an Open, Adaptive & Responsive Data Center using OpenDaylight
Building an Open, Adaptive & Responsive Data Center using OpenDaylight Vijoy Pandey, IBM 04 th February 2014 Email: vijoy.pandey@gmail.com Twitter: @vijoy Agenda Where does ODP (& SDN) fit in the bigger
More informationNetwork Security: Network Flooding. Seungwon Shin GSIS, KAIST
Network Security: Network Flooding Seungwon Shin GSIS, KAIST Detecting Network Flooding Attacks SYN-cookies Proxy based CAPCHA Ingress/Egress filtering Some examples SYN-cookies Background In a TCP 3-way
More informationNetwork Security Demonstration - Snort based IDS Integration -
Network Security Demonstration - Snort based IDS Integration - Hyuk Lim (hlim@gist.ac.kr) with TJ Ha, CW Jeong, J Narantuya, JW Kim Wireless Communications and Networking Lab School of Information and
More informationNETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
More informationHow To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan
Centec s SDN Switch Built from the Ground Up to Deliver an Optimal Virtual Private Cloud Table of Contents Virtualization Fueling New Possibilities Virtual Private Cloud Offerings... 2 Current Approaches
More informationSoftware Define Storage (SDs) and its application to an Openstack Software Defined Infrastructure (SDi) implementation
Software Define Storage (SDs) and its application to an Openstack Software Defined Infrastructure (SDi) implementation This paper discusses how data centers, offering a cloud computing service, can deal
More informationSerro Solutions Enables Managed Security Service Providers to Optimize Networking Performance and Cost
Serro Solutions Enables Managed Security Service Providers to Optimize Networking Performance and Cost Serro s SDN Controller automates Internet connections on a global scale to migrate traffic to lower
More informationPanel: Cloud/SDN/NFV 黃 仁 竑 教 授 國 立 中 正 大 學 資 工 系 2015/12/26
Panel: Cloud/SDN/NFV 黃 仁 竑 教 授 國 立 中 正 大 學 資 工 系 2015/12/26 1 Outline Cloud data center (CDC) Software Defined Network (SDN) Network Function Virtualization (NFV) Conclusion 2 Cloud Computing Cloud computing
More informationNetwork Functions Virtualization (NFV) for Next Generation Networks (NGN)
P a g e 1 Network Functions Virtualization (NFV) for Next Generation Networks (NGN) Summary Network Functions Virtualization (NFV) has drawn industry attention. Network Virtualization aims to transform
More informationIncrease Simplicity and Improve Reliability with VPLS on the MX Series Routers
SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation
More informationRadware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical
Radware ADC-VX Solution The Agility of Virtual; The Predictability of Physical Table of Contents General... 3 Virtualization and consolidation trends in the data centers... 3 How virtualization and consolidation
More informationHow OpenFlow-based SDN can increase network security
How OpenFlow-based SDN can increase network security Charles Ferland, IBM System Networking Representing the ONF ferland@de.ibm.com +49 151 1265 0830 Important elements The objective is to build SDN networks
More informationWhy ISPs need SDN: SDN-based Network Service Chaining and Software-defined Multicast
Why ISPs need SDN: SDN-based Network Chaining and Software-defined Multicast ZKI Herbsttagung, Kaiserslautern, Germany, 24. Sept. 2014 Jeremias Blendin, Julius Rückert, David Hausheer Department of Electrical
More informationNew Cloud Networking Enabled by ProgrammableFlow
New Cloud Networking Enabled by ProgrammableFlow NISHIHARA Motoo, IWATA Atsushi, YUN Su-hun WATANABE Hiroyuki, IIJIMA Akio, KANOH Toshiyuki Abstract Network virtualization, network programmability, and
More informationSoftware Defined Networking
Software Defined Networking Stefano Giordano Dipartimento di Ingegneria dell Informazione Università di Pisa 3D Reference model of ISDN Hourglass reference model of a TCP/IP network Network Ossification
More informationHAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer
HAWAII TECH TALK SDN Paul Deakin Field Systems Engineer SDN What Is It? SDN stand for Software Defined Networking SDN is a fancy term for: Using a controller to tell switches where to send packets SDN
More informationOpenFlow: Load Balancing in enterprise networks using Floodlight Controller
OpenFlow: Load Balancing in enterprise networks using Floodlight Controller Srinivas Govindraj, Arunkumar Jayaraman, Nitin Khanna, Kaushik Ravi Prakash srinivas.govindraj@colorado.edu, arunkumar.jayaraman@colorado.edu,
More informationVMware vshield App Design Guide TECHNICAL WHITE PAPER
ware vshield App Design Guide TECHNICAL WHITE PAPER ware vshield App Design Guide Overview ware vshield App is one of the security products in the ware vshield family that provides protection to applications
More informationSDN in the Public Cloud: Windows Azure. Albert Greenberg Partner Development Manager Windows Azure Networking albert@microsoft.com
SDN in the Public Cloud: Windows Azure Albert Greenberg Partner Development Manager Windows Azure Networking albert@microsoft.com Microsoft s big bet on public cloud service Lets companies move their IT
More informationIT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011
IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011 Cloud Basics Cloud Basics The interesting thing about cloud computing is that we've redefined cloud computing to include everything
More informationProactively Secure Your Cloud Computing Platform
Proactively Secure Your Cloud Computing Platform Dr. Krutartha Patel Security Engineer 2010 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals Agenda 1 Cloud
More informationSoftware-Defined Networking for the Data Center. Dr. Peer Hasselmeyer NEC Laboratories Europe
Software-Defined Networking for the Data Center Dr. Peer Hasselmeyer NEC Laboratories Europe NW Technology Can t Cope with Current Needs We still use old technology... but we just pimp it To make it suitable
More informationWhat is SDN all about?
What is SDN all about? Emil Gągała Juniper Networks Piotr Jabłoński Cisco Systems In the beginning there was a chaos CLOUD BUILDING BLOCKS CAN I VIRTUALIZE MY Compute Network? Storage Where is my money?
More informationData Center Virtualization and Cloud QA Expertise
Data Center Virtualization and Cloud QA Expertise Highlights Broad Functional QA Experience Deep understanding of Switching and Routing Protocols Strong hands on experience in multiple hyper-visors like
More informationInfrastructure as a Service (IaaS)
Infrastructure as a Service (IaaS) (ENCS 691K Chapter 4) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ References 1. R. Moreno et al.,
More informationTransform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure
White Paper Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure What You Will Learn The new Cisco Application Centric Infrastructure
More informationRelay2 Enterprise Cloud Controller Datasheet
Relay2 Enterprise Cloud WLAN Network Controller Provides the power of enterprise network services without the complexities and cost of traditional hardware- based Wi- Fi controllers The Relay2 Enterprise
More informationBuilding Access Networks that Support Carrier Ethernet 2.0 Services and SDN
In cooperation with Building Access Networks that Support Carrier Ethernet 2.0 Services and SDN COMMTECH Show Toronto, April 15-16 Mississauga Center by Pasquale Tagliarini Senior Solutions Engineer Agenda
More informationIBM 000-281 EXAM QUESTIONS & ANSWERS
IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of
More informationSecuring Virtual Applications and Servers
White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating
More informationCompTIA Cloud+ 9318; 5 Days, Instructor-led
CompTIA Cloud+ 9318; 5 Days, Instructor-led Course Description The CompTIA Cloud+ certification validates the knowledge and best practices required of IT practitioners working in cloud computing environments,
More informationOracle SDN Performance Acceleration with Software-Defined Networking
Oracle SDN Performance Acceleration with Software-Defined Networking Oracle SDN, which delivers software-defined networking, boosts application performance and management flexibility by dynamically connecting
More informationNetwork performance in virtual infrastructures
Network performance in virtual infrastructures A closer look at Amazon EC2 Alexandru-Dorin GIURGIU University of Amsterdam System and Network Engineering Master 03 February 2010 Coordinators: Paola Grosso
More informationNetwork Functions Virtualization in Home Networks
Network Functions Virtualization in Home Networks Marion Dillon Timothy Winters Abstract The current model of home networking includes relatively low- cost, failure- prone devices, requiring frequent intervention
More informationRestorable Logical Topology using Cross-Layer Optimization
פרויקטים בתקשורת מחשבים - 236340 - סמסטר אביב 2016 Restorable Logical Topology using Cross-Layer Optimization Abstract: Today s communication networks consist of routers and optical switches in a logical
More informationCompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:
CompTIA Cloud+ Length: 5 Days Who Should Attend: Project manager, cloud computing services Cloud engineer Manager, data center SAN Business analyst, cloud computing Summary: The CompTIA Cloud+ certification
More informationDesigning Virtual Network Security Architectures Dave Shackleford
SESSION ID: CSV R03 Designing Virtual Network Security Architectures Dave Shackleford Sr. Faculty and Analyst SANS @daveshackleford Introduction Much has been said about virtual networking and softwaredefined
More informationSOFTWARE DEFINED NETWORKING: INDUSTRY INVOLVEMENT
BROCADE SOFTWARE DEFINED NETWORKING: INDUSTRY INVOLVEMENT Rajesh Dhople Brocade Communications Systems, Inc. rdhople@brocade.com 2012 Brocade Communications Systems, Inc. 1 Why can t you do these things
More informationData Center Networking Designing Today s Data Center
Data Center Networking Designing Today s Data Center There is nothing more important than our customers. Data Center Networking Designing Today s Data Center Executive Summary Demand for application availability
More informationRadware s Attack Mitigation Solution On-line Business Protection
Radware s Attack Mitigation Solution On-line Business Protection Table of Contents Attack Mitigation Layers of Defense... 3 Network-Based DDoS Protections... 3 Application Based DoS/DDoS Protection...
More informationAnalysis of Network Segmentation Techniques in Cloud Data Centers
64 Int'l Conf. Grid & Cloud Computing and Applications GCA'15 Analysis of Network Segmentation Techniques in Cloud Data Centers Ramaswamy Chandramouli Computer Security Division, Information Technology
More informationProgrammableFlow for Open Virtualized Data Center Network
ProgrammableFlow for Open Virtualized Data Center Network Samrat Ganguly NEC Corporation of America Challenges in Today s Data Center and Cloud Networks Performance scaling concerns Complexity scaling
More informationSimplify IT. With Cisco Application Centric Infrastructure. Barry Huang bhuang@cisco.com. Nov 13, 2014
Simplify IT With Cisco Application Centric Infrastructure Barry Huang bhuang@cisco.com Nov 13, 2014 There are two approaches to Control Systems IMPERATIVE CONTROL DECLARATIVE CONTROL Baggage handlers follow
More informationIndustrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
More informationSecure Cloud-Ready Data Centers Juniper Networks
Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security
More informationBuilding Storage Service in a Private Cloud
Building Storage Service in a Private Cloud Sateesh Potturu & Deepak Vasudevan Wipro Technologies Abstract Storage in a private cloud is the storage that sits within a particular enterprise security domain
More informationFujitsu Cloud IaaS Trusted Public S5. shaping tomorrow with you
Fujitsu Cloud IaaS Trusted Public S5 shaping tomorrow with you Realizing the cloud opportunity: Fujitsu Cloud iaas trusted Public s5 All the benefits of the public cloud, with enterprise-grade performance
More informationEthernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心
Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心 1 SDN Introduction Decoupling of control plane from data plane
More informationCisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments
Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments What You Will Learn Deploying network services in virtual data centers is extremely challenging. Traditionally, such Layer
More informationConference. Smart Future Networks THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF EVERYTHING
Conference THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF Smart Future Networks www.internet-of-things.no EVERYTHING Patrick Waldemar Vice President Telenor Research and Future
More informationCisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems
Cisco Prime Network Services Controller Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems Agenda Cloud Networking Challenges Prime Network Services Controller L4-7 Services Solutions
More informationSOFTWARE-DEFINED NETWORKING AND OPENFLOW
SOFTWARE-DEFINED NETWORKING AND OPENFLOW Eric Choi < echoi@brocade.com> Senior Manager, Service Provider Business Unit, APJ 2012 Brocade Communications Systems, Inc. EPF 7 2012/09/17 Software-Defined Networking
More informationSDN PARTNER INTEGRATION: SANDVINE
SDN PARTNER INTEGRATION: SANDVINE SDN PARTNERSHIPS SSD STRATEGY & MARKETING SERVICE PROVIDER CHALLENGES TIME TO SERVICE PRODUCT EVOLUTION OVER THE TOP THREAT NETWORK TO CLOUD B/OSS AGILITY Lengthy service
More informationVirtualized Security: The Next Generation of Consolidation
Virtualization. Consolidation. Simplification. Choice. WHITE PAPER Virtualized Security: The Next Generation of Consolidation Virtualized Security: The Next Generation of Consolidation As we approach the
More informationSecure Cloud Computing with a Virtualized Network Infrastructure
Secure Cloud Computing with a Virtualized Network Infrastructure Fang Hao, T.V. Lakshman, Sarit Mukherjee, Haoyu Song Bell Labs Cloud Security: All or Nothing? Amazon EC2 Government Cloud Shared computing,
More informationSolaris For The Modern Data Center. Taking Advantage of Solaris 11 Features
Solaris For The Modern Data Center Taking Advantage of Solaris 11 Features JANUARY 2013 Contents Introduction... 2 Patching and Maintenance... 2 IPS Packages... 2 Boot Environments... 2 Fast Reboot...
More informationHow Network Virtualization can improve your Data Center Security
How Network Virtualization can improve your Data Center Security Gilles Chekroun SDDC, NSX Team EMEA gchekroun@vmware.com 2014 VMware Inc. All rights reserved. Security IT spending Security spending is
More informationGroup-Based Policy for OpenStack
Group-Based Policy for OpenStack Introduction Over the past four years, OpenStack has grown from a simple open source project to a major community-based initiative including thousands of contributors in
More informationNetworking in the Era of Virtualization
SOLUTIONS WHITEPAPER Networking in the Era of Virtualization Compute virtualization has changed IT s expectations regarding the efficiency, cost, and provisioning speeds of new applications and services.
More informationTransformation of the enterprise WAN with dynamic-path networking
Transformation of the enterprise WAN with dynamic-path networking Greg Ferro November 24, 2014 This report is underwritten by Sonus Networks. TABLE OF CONTENTS Executive summary... 3 How dynamic-path networking
More informationSecuring Virtualization with Check Point and Consolidation with Virtualized Security
Securing Virtualization with Check Point and Consolidation with Virtualized Security consolidate security gateways with full power of Software Blades with Check Point Virtual Systems (VSX) secure virtualized
More informationVirtual Privacy vs. Real Security
Virtual Privacy vs. Real Security Certes Networks at a glance Leader in Multi-Layer Encryption Offices throughout North America, Asia and Europe Growing installed based with customers in 37 countries Developing
More information