A Framework for Security Context Migration in a Firewall Secured Virtual Machine Environment
|
|
|
- Beryl Hill
- 10 years ago
- Views:
Transcription
1 A Framework for Security Context Migration in a Firewall Secured Virtual Machine Environment Zahra Tavakoli, Sebastian Meier, and Alexander Vensmer Institute of Communication Networks and Computer Engineering (IKR), University of Stuttgart, Pfaffenwaldring 47, Stuttgart, Germany {tavakoza,sebastian.meier,alexander.vensmer}@ikr.uni-stuttgart.de Abstract. Current virtualization technologies enable hosting of a large number of Virtual Machines (s) on a common physical host. The hypervisor interconnects these s via Virtual Networks (VNs). These VNs underlie the same security requirements as physical networks. Network elements such as stateful firewalls contribute in enforcing this security. With the advent of stateful firewalls on the hypervisor level, a new challenge arises when it comes to migration. Not only the itself, but also the associated Security Context () has to migrate. Current open-source hypervisors do not address this issue. In this paper we present the architecture and implementation of our framework for migrating along with s. Keywords: Virtualization, Firewall, Security, Migration. 1 Introduction Virtualization of end systems is becoming more and more popular. Optimizations such as Kernel SamePage Merging [10] enable hosting of a very large number ofsonacommonhost.duetotheincreasing number of s on a single physical host, VN topologies inside a hypervisor become more and more sophisticated. Consequently, current hypervisor implementations support VN devices such as virtual switches and virtual routers. In an enterprise scenario those VNs are expected to satisfy the same requirements regarding monitoring and management as their physical counterparts. Vendors such as CIO address this need by providing VN equipment [1] that provides the same configuration and management interfaces as physical network equipment. By doing so, the barrier for including more intelligent and elaborated network elements into a VN is lowered. Those network elements can perform different functions. We will focus on stateful firewalling in a VN in the following. Stateful firewalls provide means to protect a network from malicious or unwanted traffic. In contrast to traditional networks, where machines and their attachments to the network are rather fixed, virtualization offers the opportunity to migrate At the time of writing, Zahra Tavakoli was a student at the IKR. R. Szabó and A. Vidács (Eds.): EUNICE 2012, LNCS 7479, pp , c IFIP International Federation for Information Processing 2012
2 42 Z. Tavakoli, S. Meier, and A. Vensmer s between different physical hosts. In this context, managing stateful firewalls becomes more complex as security policies that are associated with a have to migrate together with the itself. This is most challenging for stateful firewalls, as in addition to static security policies dynamic state information has to migrate along with the. In this paper we present the architecture and the implementation of a framework that extends the K hypervisor to migrate stateful along with a. The remainder of this paper is structured as follows. Section 2 gives an introduction to stateful firewalling and virtualization of end systems. Section 3 presents current research activities regarding VN security. In Section 4 we introduce our architecture for migrating within a virtual environment. In Section 5 we present our implementation of the architecture. Finally, Section 6 concludes this paper. 2 Background In the following, we introduce stateful firewalls and virtualization technologies. In particular, we present implementations for the Linux operating system. Furthermore, we give a short overview on migration. 2.1 Stateful Firewall Stateless firewalls perform policing by filtering packets according to static filter rules. These rules typically specify filter criteria that are applied to headers of packets that traverse the firewall. Stateful firewalls enhance this mechanism by relying on connection tracking. Connection tracking maintains state information about active connections and sessions. Tracking is typically done by observing network traffic. For instance, observing a TCP three way handshake will create state information within the connection tracking internal connection table. Stateful firewalls can access this information. In comparison to stateless firewalls, this allows stateful firewalls to specify additional filter criteria. For instance, a stateful firewall may only forward TCP packets that are part of a TCP three way handshake or belong to an already established TCP connection. In the case of a Linux machine, filtering and connection tracking are both realized by the Netfilter framework [6] in the kernel. User space tools such as conntrack-tools and iptables allow manipulating connection tracking entries and firewall filter rules. 2.2 Virtualization in Linux Virtualization is an approach for sharing common resources of a physical host between multiple s. One of the core tasks in virtualization is to isolate s against each other. This is done by the hypervisor. The hypervisor schedules the execution of s and mediates the access to the resources of the host system. Resources typically include memory, disk space, CPU and network devices.
3 A Framework for Security Context Migration 43 There are several well-known implementations of hypervisors: Xen [9], ware ESX [8] and K [3]. In the following we will focus on K. It is an open source hypervisor for Linux. K enables the Linux kernel to perform hypervisor functionality such as scheduling and memory management [14]. K relies on QEMU [7] for emulating a virtual environment, including CPU architecture and peripheral devices. The libvirt API [5] provides means to manage, control and monitor s that are hosted by K and QEMU. We use libvirt in our solution to manipulate the migration process of s and added extensions for transferring the. 2.3 Virtual Machine Migration migration provides means to move a from one host to another. There exist several incentives to migrate s. For instance, a s might be moved from one physical host to another to shut down a physical machine and perform hardware maintenance or save energy. Migration approaches can be divided into two categories: offline migration and live migration. For offline migration, a is suspended on the source host before being migrated to the destination. After a comparatively long shutdown time it will be resumed on the destination host. For live migration, the will be migrated with almost no interruption of the processes within it. Compared to offline migration, live migration provides many advantages and is therefore the commonly used migration approach. Thus, we focus on live migration scenarios in the following. Regarding the network, one can additionally introduce two categories for migration: migration within the same subnetwork and migration across subnetworks. Migration across a subnetwork may trigger a change of a s IP address. Furthermore, it may require rerouting of IP packets that are exchanged with a communication partner. Currently, we consider such a scenario out of scope and focus on migration scenarios where the IP and MAC addresses of a migrating don t change. For our migration scenario, we additionally assume that s may access a common storage network. This storage network contains the file systems of the s. Therefore, there is no need to migrate the file system of a migrating. Consequently, only state information such as memory pages, CPU register contents, et cetera are subject to migration. K already supports this kind of live migration [4]. However, K doesn t take migration of such as firewall rules and connection tracking state into account. 3 Related Work Security vulnerabilities and possible countermeasures in VNs have been introduced by Dawoud et al. [11]. They performed a study regarding the security of Infrastructure as a service (IaaS) components. The result of their research is a proposal for a Security Model for IaaS. Qi-Guang Miao et al. [13] presented another solution for improving security of VNs. They created an emulated network
4 44 Z. Tavakoli, S. Meier, and A. Vensmer Live Migration Hypervisor Hypervisor NIC NIC Fig. 1. Security Context Migration (M) Principle device called VSFilter. It consists of a virtual switch and a network packet filter. Hanquia et al. [15] suggested a novel VN model to provide isolation between traffic running on the same physical host. For isolation they relied on a hypervisor based firewall. Although the above mentioned approaches suggested or relied on a hypervisor based firewall, they didn t address the challenges of migration. Xianqin, Chen et al. [16] acknowledged this challenge in context of stateful firewalls. They outlined why it is important to transfer the state of the connections that are related to a migrating. Furthermore, they modified the XEN live migration tool to migrate connection tracking information between hypervisors. However, they neither migrated the stateful firewall policies nor other information. 4 Security Context Migration Architecture In contrast to previous work, we consider in a more general sense. We consider to be varying and its actual composition to be scenario dependent. For instance, may include firewall filtering rules in addition to connection tracking information. In more sophisticated scenarios additional elements such as IPSec [12] state information may be added to the. Currently, we assume that information doesn t require modification during migration. In particular, we assume that the IP and MAC address of a migrating won t change, even if migrating to a different IP subnetwork. This assumption usually holds true, as s are typically attached to the network via Layer 2 over Layer 3 encapsulation or other tunnel solutions. Regarding the itself, we differentiate between static and dynamic. We define as static, if it doesn t change during the life-cycle of a. Dynamic on the other hand may change constantly if the isn t suspended or stopped. This kind of flexible requires an elaborate framework that is able to cope with the dynamic nature of the. In the following, we present the architecture of our flexible framework to handle and migrate that is associated with s. Figure 1 outlines the principle M idea.
5 A Framework for Security Context Migration 45 Migration Manager Migration Manager State Security Context Security Context State Hypervisor Driver 1 Driver N Driver N Driver 1 Hypervisor Source Host Destination Host Fig. 2. M Framework Architecture 4.1 Structural View Figure 2 shows the architecture of the M framework. We will introduce its components in the following. Migration Manager: The Migration Manager coordinates the migration of state and state information between the importing and exporting host. In particular, the migration manager ensures a consistent snapshot of state and state. For this, the Migration Manager interacts with the State and, as detailed in subsection 4.2. State : The State component interacts with the hypervisor. It is responsible for coordinating the transfer of state information, such as memory pages for instance. For this, it relies on the functionality provided by the underlying hypervisor to migrate the from the source to the destination host. Security Context : Whenever a migrates, the extracts related information on the source host. The on the destination host is responsible for importing the extracted information. For exchanging information the involved s establish a communication channel. Drivers: Drivers are responsible for handling a subset of the. They abstract from implementation or operating system specific interfaces and data structures. For this, drivers provide a generic interface towards the for importing and exporting information. Furthermore, a driver may encapsulate the handled state information into a common data structure. Regarding handling, this abstraction is a key enabler for a flexible and extensible migration framework. 4.2 Behavioral View The M framework extends the current K migration workflow to migrate the that is associated with a. The grey boxes in figure 3 indicate extensions to the current K workflow. We divide migration into two tasks.
6 46 Z. Tavakoli, S. Meier, and A. Vensmer Fig. 3. Live Migration Workflow The task Static transfer is responsible for migrating static. The task Dynamic transfer is responsible for migrating dynamic. We define two tasks to migrate as much information as possible while the is still running on the source host. This ensures that only dynamic state has to be migrated while the machine is suspended. This approach keeps additional downtime caused by migration at the bare minimum. Figure 4 depicts the coordinated migration of a together with the associated. For simplicity we only show the and component. The migration is initiated by an external trigger. The trigger denotes which is subject to migration. Upon receiving this trigger, the of the source host starts extracting and transferring the related static information. The on the destination host imports the information and sends a positive reply. As soon as this reply is received on the source host, the triggers the to begin with the migration. Then, the begins to transfer the state incrementally to the destination. This tasks ends as soon as the state migration is complete. At this point, the source host suspends the and notifies the. Now the transfers the remaining dynamic information to the destination host. Once the reception of the dynamic has been acknowledged by the destination host, the on the source host will complete the migration. This is done by sending a trigger to the destination host to resume the. 5 Implementation In this section, we will present the prototypic implementation of our M framework. For portability, we implemented the framework in Java. We rely on the external Libvirt library, which provides an abstraction layer between our framework and the underlying hypervisor. This kind of abstraction allows us to interact with a great variety of hypervisors using a common codebase. For testing the prototype, we focused on the K hypervisor of the Linux operating system.
7 A Framework for Security Context Migration 47 Fig. 4. Sequence Diagram for and Migration Migration Manager Migration Manager Libvirt API state Security Context Security Context state User Space Libvirt API Nwfilter Driver Conntrack Driver Conntrack Driver Nwfilter Driver User Space Kernel Space K iptables ebtables Conntrack Conntrack iptables ebtables Kernel Space K Kernel Space Source Host Destination Host Fig. 5. M Framework Implementation 5.1 M Prototype Figure 5 shows the structure of our implementation and its interaction with external components. In the following, we will provide some details on the components of the implementation and the integration of the prototype. Migration Manager: The Migration Manager is responsible for keeping track of ongoing migration processes. For this, it interacts with the, which notifies the Migration Manager about the progress of a s state during migration. Based on this information, the Migration Manager coordinates and migration. For instance, when the Migration Manager is
8 48 Z. Tavakoli, S. Meier, and A. Vensmer notified that a migrating is suspended on the source host, it triggers the dynamic transfer via the. : K interacts with external components such as Libvirt or the QEMU monitor for migration. For migration we rely on an appliction called virsh which is part of the Libvirt toolset. To synchronize the and migration we have to interact with the Libvirt API. We added two additional hooks to the API so that we can realize the workflow that is depicted in figure 3. The first hook is required to migrate the static information before the migrating is suspended on the source host. For this, we extended the virsh code to notify the before triggering the migration via the Libvirt API. The second hook ensures that all dynamic information is imported on the destination host, before the machine is resumed there. We added this hook to the Libvirt API so that the is informed when the machine is suspended on the source host. Furthermore, the Libvirt API on the destination host won t resume the machine until notified by the. We implemented the inter-process communication via UNIX domain sockets. : We subdivided the into two components. The first component is responsible for interacting with the Drivers. It coordinates the import and export of static and dynamic information. The second component maintains communication sessions with components on remote hosts. For this, it establishes a TCP connection. The destination address is automatically derived from the migration target. For coordination and transport we defined a simple type-length-value protocol. Divers: For the prototypic implementation of our framework, we focused on a stateful firewall scenario. Linux relies on the netfilter [6] and connection tracking [2] framework for this task. We implemented a driver for each of those components. The NWFilter Driver is responsible for importing and exporting firewall rules. As Libvirt provides its own means to structure and organize related firewall rules, we do not interact with the netfilter framework directly. Instead we rely on an abstraction layer provided by Libvirt to import and export firewall rules that belong to a particular. The Conntrack Driver imports and exports connection tracking entries. As Libvirt doesn t provide an interface for this task, we rely on the conntrack-tools [2] to export and import conneciton tracking information. To extract the correct subset of conneciton tracking entries, we match all connection tracking entries against the IP addresses that are associated with the migrating. 5.2 Functional Evaluation To evaluate the functionality of our prototype and its impact on the migration process we have setup a small test scenario. We will present the testbed setup, the test cases and the results in the following.
9 A Framework for Security Context Migration 49 Live Migration Source Host K echo server Firewall NIC echo server Destination Host K echo server Firewall NIC Communication Partner echo client NIC Fig. 6. Test Scenario Testbed Setup. As figure 6 depicts, our test setup consists of three physical hosts. All hosts run the Linux operating system. Two hosts are virtualized via K, Libvirt and virsh. Initially, a runs on the source host. This executes a simple TCP echo server. The third host executes a TCP echo client application. Whenever the echo client sends data to the echo server, the echo server returns a copy of the received data to the echo client. Test Cases and Results. In the following, we will introduce three test cases and discuss their results. In the first test case we will perform a migration without any information. In the second test case we will migrate a with static information. In the third test case we will migrate a with static and dynamic information. Test Case 1. In this test case we only migrate the and don t migrate any. The purpose of this test case is to evaluate whether our modifications to the migration process of Libvirt have any negative influence. For the test we disabled all firewalling functionality as well as connection tracking on the source and destination host. The test consists of migrating the TCP echo server and its from the source host to the destination host. We measure the time the migration takes and compare it to the migration time without our extensions. Furthermore, we check whether the echo client still can communicate with the echo server, after the of the echo server is migrated. We measured that the migration takes about six seconds in total. The of the echo server is suspended for approximately one second. The echo client and echo server can continue to communicate after the migration is complete. Compared to a migration without our framework, the extension only adds a few milliseconds to the duration of the migration. Thereby the impact of our framework is insignificant for this test case. Test Case 2. In this test case we verify whether our framework is able to migrate static. In particular, we want to verify whether our framework is able
10 50 Z. Tavakoli, S. Meier, and A. Vensmer to migrate static firewall rules. For this, we setup a firewall default policy that discards all related traffic. The policy is enabled on the hypervisor-level firewall on the source and destination host. Furthermore, we define a set of iptables rules on the source host that allows the echo client to communicate with the echo server. Only if these rules are migrated to the destination host, communication between echo client and server will be possible after the migration. For the test we trigger the migration of the echo server. Again, the migration takes about six seconds. As we only migrate a few hundred bytes of static over a high speed local area network, transmission times and delay are insignificant. The is suspended for one second. As we migrate the static before the machine is suspended on the source host, the suspension time isn t affected at all. Test Case 3. Inthelasttestcasewewanttoverifystaticanddynamic migration. For this test, we enabled connection tracking on the source host and destination host. Again the policy on both source host and destination host is to drop all related traffic. Furthermore, we defined a set of stateful firewall rules on the source host. The rules only allow echo client and server related TCP packets to traverse the firewall, if a TCP connection has been established. For this match criterion, the firewall interacts with the connection tracking framework of the Linux kernel. For the test we trigger the migration of the echo server. As in the two tests before, the migration takes about six seconds. In contrast to the second test case, the suspension time of the should be slightly higher, as we migrate connection tracking information while the machine is suspended. However, as we still only migrate a few hundred bytes of information over a high speed local area network, the additional delay is insignificant. After the migration was complete, we verified that the firewall rules and connection tracking entries have been transferred successfully by exchanging messages between the echo client and server application. All our tests were performed successfully. Thereby we conclude that our prototypic implementation is able to migrate dynamic as well as static information. The additional delay introduced by our prototype was insignificant for the considered scenario. 6 Conclusion In this paper, we presented a flexible and extensible framework for Security Context migration. The framework is a key enabler for migrating Virtual Machines that are secured by a hypervisor-based stateful firewall. We presented the principle architecture of our framework as well as a prototypic implementation for K and the Linux operating system. We have shown some first measurement results with focus on verification of functionality. In future work, we plan a more comprehensive performance evaluation. In particular, we want to evaluate how the framework scales dependent on the amount of information to migrate.
11 A Framework for Security Context Migration 51 Furthermore, we intend to test our framework with other hypervisors that are supported by the Libvirt API. Acknowledgements. This work was funded by the Federal Ministry of Education and Research of the Federal Republic of Germany (Förderkennzeichen 01BY1151, DynFire). The authors alone are responsible for the content of the paper. References 1. Cisco nexus 1000v series switches (March 2012), ns892/ns894/at a glance c pdf 2. Conntrack tools (March 2012), 3. Kvm (March 2012), 4. Kvm live migration (March 2012), 5. Libvirt (March 2012), 6. Netfilter (March 2012), 7. Qemu (March 2012), 8. Vmware (March 2012), 9. Xen (March 2012), Arcangeli, A., Eidus, I., Wright, C.: Increasing memory density by using kvm. In: Proceedings of the Linux Symposium, pp (2009) 11. Dawoud, W., Takouna, I., Meinel, C.: Infrastructure as a service security: Challenges and solutions. Security (2010), Kent, S., Seo, K.: Security Architecture for the Internet Protocol. RFC 4301, IETF (December 2005) 13. Miao, Q.G., Hui-Liu, Zhang, X.G., Liu, Z.L., Yang, Y.Z., Yun-Wang, Yin-Cao: Developing a virtual network environment for analyzing malicious network behavior. In: 2010 International Conference on Educational and Network Technology (ICENT), pp (June 2010) 14. Shah, A.: Kernel-based virtualization with kvm. Linux Magazine 86, (2008), Based Virtualization With K.pdf 15. Wu, H., Ding, Y., Winer, C., Yao, L.: Network security for virtual machine in cloud computing. In: th International Conference on Computer Sciences and Convergence Information Technology (ICCIT), November 30-December 2, pp (2010) 16. Xianqin, C., Han, W., Sumei, W., Xiang, L.: Seamless virtual machine live migration on network security enhanced hypervisor. In: nd IEEE International Conference on Broadband Network Multimedia Technology, pp (2009),
Dynamic Load Balancing of Virtual Machines using QEMU-KVM
Dynamic Load Balancing of Virtual Machines using QEMU-KVM Akshay Chandak Krishnakant Jaju Technology, College of Engineering, Pune. Maharashtra, India. Akshay Kanfade Pushkar Lohiya Technology, College
VIRTUALIZATION INTROSPECTION SYSTEM ON KVM-BASED CLOUD COMPUTING PLATFORMS. [email protected] Advisor: [email protected] Software Security Lab.
VIRTUALIZATION INTROSPECTION SYSTEM ON KVM-BASED CLOUD COMPUTING PLATFORMS [email protected] Advisor: [email protected] Software Security Lab. Motivation The era of cloud computing Motivation In the
Cloud Server. Parallels. An Introduction to Operating System Virtualization and Parallels Cloud Server. White Paper. www.parallels.
Parallels Cloud Server White Paper An Introduction to Operating System Virtualization and Parallels Cloud Server www.parallels.com Table of Contents Introduction... 3 Hardware Virtualization... 3 Operating
VMware Server 2.0 Essentials. Virtualization Deployment and Management
VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.
PARALLELS CLOUD SERVER
PARALLELS CLOUD SERVER An Introduction to Operating System Virtualization and Parallels Cloud Server 1 Table of Contents Introduction... 3 Hardware Virtualization... 3 Operating System Virtualization...
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation
Quantum Hyper- V plugin
Quantum Hyper- V plugin Project blueprint Author: Alessandro Pilotti Version: 1.0 Date: 01/10/2012 Hyper-V reintroduction in OpenStack with the Folsom release was primarily focused
Virtualization for Cloud Computing
Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources
www.see-grid-sci.eu Regional SEE-GRID-SCI Training for Site Administrators Institute of Physics Belgrade March 5-6, 2009
SEE-GRID-SCI Virtualization and Grid Computing with XEN www.see-grid-sci.eu Regional SEE-GRID-SCI Training for Site Administrators Institute of Physics Belgrade March 5-6, 2009 Milan Potocnik University
Linux MDS Firewall Supplement
Linux MDS Firewall Supplement Table of Contents Introduction... 1 Two Options for Building a Firewall... 2 Overview of the iptables Command-Line Utility... 2 Overview of the set_fwlevel Command... 2 File
VXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
Virtual Switching Without a Hypervisor for a More Secure Cloud
ing Without a for a More Secure Cloud Xin Jin Princeton University Joint work with Eric Keller(UPenn) and Jennifer Rexford(Princeton) 1 Public Cloud Infrastructure Cloud providers offer computing resources
19531 - Telematics. 14th Tutorial - Proxies, Firewalls, P2P
19531 - Telematics 14th Tutorial - Proxies, Firewalls, P2P Bastian Blywis Department of Mathematics and Computer Science Institute of Computer Science 10. February, 2011 Institute of Computer Science Telematics
Remote PC Guide Series - Volume 1
Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
Protecting and controlling Virtual LANs by Linux router-firewall
Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia
Analysis on Virtualization Technologies in Cloud
Analysis on Virtualization Technologies in Cloud 1 V RaviTeja Kanakala, V.Krishna Reddy, K.Thirupathi Rao 1 Research Scholar, Department of CSE, KL University, Vaddeswaram, India I. Abstract Virtualization
Firewalls. Ahmad Almulhem March 10, 2012
Firewalls Ahmad Almulhem March 10, 2012 1 Outline Firewalls The Need for Firewalls Firewall Characteristics Types of Firewalls Firewall Basing Firewall Configurations Firewall Policies and Anomalies 2
Network Virtualization for Large-Scale Data Centers
Network Virtualization for Large-Scale Data Centers Tatsuhiro Ando Osamu Shimokuni Katsuhito Asano The growing use of cloud technology by large enterprises to support their business continuity planning
Enabling Technologies for Distributed Computing
Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies
Chapter 14 Virtual Machines
Operating Systems: Internals and Design Principles Chapter 14 Virtual Machines Eighth Edition By William Stallings Virtual Machines (VM) Virtualization technology enables a single PC or server to simultaneously
Cloud Networking Disruption with Software Defined Network Virtualization. Ali Khayam
Cloud Networking Disruption with Software Defined Network Virtualization Ali Khayam In the next one hour Let s discuss two disruptive new paradigms in the world of networking: Network Virtualization Software
Intro to Linux Kernel Firewall
Intro to Linux Kernel Firewall Linux Kernel Firewall Kernel provides Xtables (implemeted as different Netfilter modules) which store chains and rules x_tables is the name of the kernel module carrying
Unified network traffic monitoring for physical and VMware environments
Unified network traffic monitoring for physical and VMware environments Applications and servers hosted in a virtual environment have the same network monitoring requirements as applications and servers
Stateful Firewalls. Hank and Foo
Stateful Firewalls Hank and Foo 1 Types of firewalls Packet filter (stateless) Proxy firewalls Stateful inspection Deep packet inspection 2 Packet filter (Access Control Lists) Treats each packet in isolation
Remote PC Guide for Standalone PC Implementation
Remote PC Guide for Standalone PC Implementation Updated: 2007-01-22 The guide covers features available in NETLAB+ version 3.6.1 and later. IMPORTANT Standalone PC implementation is no longer recommended.
Enhancing Cisco Networks with Gigamon // White Paper
Across the globe, many companies choose a Cisco switching architecture to service their physical and virtual networks for enterprise and data center operations. When implementing a large-scale Cisco network,
Virtual Machine Management with OpenNebula in the RESERVOIR project
CISCO Cloud Computing Research Symposium (C 3 RS) November 5 & 6, 2008 San Jose, CA Virtual Machine Management with OpenNebula in the RESERVOIR project Ruben Santiago Montero Distributed Systems Architecture
Design of a SIP Outbound Edge Proxy (EPSIP)
Design of a SIP Outbound Edge Proxy (EPSIP) Sergio Lembo Dept. of Communications and Networking Helsinki University of Technology (TKK) P.O. Box 3000, FI-02015 TKK, Finland Jani Heikkinen, Sasu Tarkoma
Virtualization, SDN and NFV
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
Introduction to OpenStack
Introduction to OpenStack Carlo Vallati PostDoc Reseracher Dpt. Information Engineering University of Pisa [email protected] Cloud Computing - Definition Cloud Computing is a term coined to refer
Multicast-based Distributed LVS (MD-LVS) for improving. scalability and availability
Multicast-based Distributed LVS (MD-LVS) for improving scalability and availability Haesun Shin, Sook-Heon Lee, and Myong-Soon Park Internet Computing Lab. Department of Computer Science and Engineering,
Desktop Virtualization Technologies and Implementation
ISSN : 2250-3021 Desktop Virtualization Technologies and Implementation Pranit Patil 1, Shakti Shekar 2 1 ( Mumbai, India) 2 (Mumbai, India) ABSTRACT Desktop virtualization is new desktop delivery method
Live Migration of Virtual Machines in Cloud
International Journal of Scientific and Research Publications, Volume 2, Issue 6, June 2012 1 Live Migration of Virtual Machines in Cloud Ashima Agarwal, Shangruff Raina Department of Computer, MIT College
Enterprise-Class Virtualization with Open Source Technologies
Enterprise-Class Virtualization with Open Source Technologies Alex Vasilevsky CTO & Founder Virtual Iron Software June 14, 2006 Virtualization Overview Traditional x86 Architecture Each server runs single
Lecture 02a Cloud Computing I
Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking
Content-Aware Load Balancing using Direct Routing for VOD Streaming Service
Content-Aware Load Balancing using Direct Routing for VOD Streaming Service Young-Hwan Woo, Jin-Wook Chung, Seok-soo Kim Dept. of Computer & Information System, Geo-chang Provincial College, Korea School
LASTLINE WHITEPAPER. In-Depth Analysis of Malware
LASTLINE WHITEPAPER In-Depth Analysis of Malware Abstract Malware analysis is the process of determining the purpose and functionality of a given malware sample (such as a virus, worm, or Trojan horse).
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
Tomás P. de Miguel DIT-UPM. dit UPM
Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability
Software Defined Network (SDN)
Georg Ochs, Smart Cloud Orchestrator ([email protected]) Software Defined Network (SDN) University of Stuttgart Cloud Course Fall 2013 Agenda Introduction SDN Components Openstack and SDN Example Scenario
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
How To Manage A Virtualization Server
Brain of the Virtualized Data Center Contents 1 Challenges of Server Virtualization... 3 1.1 The virtual network breaks traditional network boundaries... 3 1.2 The live migration function of VMs requires
Security Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
Secure SCTP against DoS Attacks in Wireless Internet
Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea [email protected] Abstract. The Stream Control Transport Protocol
Network Performance Comparison of Multiple Virtual Machines
Network Performance Comparison of Multiple Virtual Machines Alexander Bogdanov 1 1 Institute forhigh-performance computing and the integrated systems, e-mail: [email protected], Saint-Petersburg, Russia
Virtualization Technologies (ENCS 691K Chapter 3)
Virtualization Technologies (ENCS 691K Chapter 3) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ The Key Technologies on Which Cloud Computing
A Research Study on Packet Sniffing Tool TCPDUMP
A Research Study on Packet Sniffing Tool TCPDUMP ANSHUL GUPTA SURESH GYAN VIHAR UNIVERSITY, INDIA ABSTRACT Packet sniffer is a technique of monitoring every packet that crosses the network. By using this
ΕΠΛ 674: Εργαστήριο 5 Firewalls
ΕΠΛ 674: Εργαστήριο 5 Firewalls Παύλος Αντωνίου Εαρινό Εξάμηνο 2011 Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized
Firewalls P+S Linux Router & Firewall 2013
Firewalls P+S Linux Router & Firewall 2013 Firewall Techniques What is a firewall? A firewall is a hardware or software device which is configured to permit, deny, or proxy data through a computer network
Efficient Load Balancing using VM Migration by QEMU-KVM
International Journal of Computer Science and Telecommunications [Volume 5, Issue 8, August 2014] 49 ISSN 2047-3338 Efficient Load Balancing using VM Migration by QEMU-KVM Sharang Telkikar 1, Shreyas Talele
Enabling Technologies for Distributed and Cloud Computing
Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading
Influence of Load Balancing on Quality of Real Time Data Transmission*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,
VON/K: A Fast Virtual Overlay Network Embedded in KVM Hypervisor for High Performance Computing
Journal of Information & Computational Science 9: 5 (2012) 1273 1280 Available at http://www.joics.com VON/K: A Fast Virtual Overlay Network Embedded in KVM Hypervisor for High Performance Computing Yuan
KVM: Kernel-based Virtualization Driver
KVM: Kernel-based Virtualization Driver White Paper Overview The current interest in virtualization has led to the creation of several different hypervisors. Most of these, however, predate hardware-assisted
COS 318: Operating Systems. Virtual Machine Monitors
COS 318: Operating Systems Virtual Machine Monitors Kai Li and Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall13/cos318/ Introduction u Have
A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS
A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS K.B.Chandradeep Department of Centre for Educational Technology, IIT Kharagpur, Kharagpur, India [email protected] ABSTRACT This paper
Putting it on the NIC: A Case Study on application offloading to a Network Interface Card (NIC)
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE CCNC 2006 proceedings. Putting it on the NIC: A Case Study on application
UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING AND NETWORK SECURITY SEMESTER TWO EXAMINATIONS 2014/2015 NETWORK SECURITY MODULE NO: CPU6004
[CRT14] UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING AND NETWORK SECURITY SEMESTER TWO EXAMINATIONS 2014/2015 NETWORK SECURITY MODULE NO: CPU6004 Date: Wednesday 27 th May 2015 Time: 14:00 16:00
Deployment Options for Microsoft Hyper-V Server
CA ARCserve Replication and CA ARCserve High Availability r16 CA ARCserve Replication and CA ARCserve High Availability Deployment Options for Microsoft Hyper-V Server TYPICALLY, IT COST REDUCTION INITIATIVES
How To Make A Virtual Machine Aware Of A Network On A Physical Server
VMready Virtual Machine-Aware Networking White Paper Table of Contents Executive Summary... 2 Current Server Virtualization Environments... 3 Hypervisors... 3 Virtual Switches... 3 Leading Server Virtualization
Chapter 2 Addendum (More on Virtualization)
Chapter 2 Addendum (More on Virtualization) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ More on Systems Virtualization Type I (bare metal)
RCL: Software Prototype
Business Continuity as a Service ICT FP7-609828 RCL: Software Prototype D3.2.1 June 2014 Document Information Scheduled delivery 30.06.2014 Actual delivery 30.06.2014 Version 1.0 Responsible Partner IBM
Cisco Application-Centric Infrastructure (ACI) and Linux Containers
White Paper Cisco Application-Centric Infrastructure (ACI) and Linux Containers What You Will Learn Linux containers are quickly gaining traction as a new way of building, deploying, and managing applications
Virtual Private Networks: IPSec vs. SSL
Virtual Private Networks: IPSec vs. SSL IPSec SSL Michael Daye Jr. Instructor: Dr. Lunsford ICTN 4040-001 April 16 th 2007 Virtual Private Networks: IPSec vs. SSL In today s society organizations and companies
LSKA 2010 Survey Report I Device Drivers & Cloud Computing
LSKA 2010 Survey Report I Device Drivers & Cloud Computing Yu Huang and Hao-Chung Yang {r98922015, r98944016}@csie.ntu.edu.tw Department of Computer Science and Information Engineering March 31, 2010 Abstract
Control Tower for Virtualized Data Center Network
Control Tower for Virtualized Data Center Network Contents 1 Virtual Machine Network Environment Analysis...3 2 "Control Tower" Must Have an Overall Picture of the Network...4 3 Virtual Machine Migration
Solution of Exercise Sheet 5
Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????
PANDORA FMS NETWORK DEVICES MONITORING
NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,
An API for dynamic firewall control and its implementation for Linux Netfilter
An API for dynamic firewall control and its implementation for Linux Netfilter 3. Essener Workshop "Neue Herausforderungen in der Netzsicherheit" Jochen Kögel, Sebastian Kiesel, Sebastian Meier [email protected]
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture 4 Virtualization of Clusters and Data Centers Text Book: Distributed and Cloud Computing, by K. Hwang, G C. Fox, and J.J. Dongarra,
Xen Live Migration. Networks and Distributed Systems Seminar, 24 April 2006. Matúš Harvan Xen Live Migration 1
Xen Live Migration Matúš Harvan Networks and Distributed Systems Seminar, 24 April 2006 Matúš Harvan Xen Live Migration 1 Outline 1 Xen Overview 2 Live migration General Memory, Network, Storage Migration
Design and Implementation of IaaS platform based on tool migration Wei Ding
4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2015) Design and Implementation of IaaS platform based on tool migration Wei Ding State Key Laboratory
VMWARE Introduction ESX Server Architecture and the design of Virtual Machines
Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013.
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013. Keywords: virtualization, virtual machine, security. 1. Virtualization The rapid growth of technologies, nowadays,
OGF25/EGEE User Forum Catania, Italy 2 March 2009
OGF25/EGEE User Forum Catania, Italy 2 March 2009 Constantino Vázquez Blanco Javier Fontán Muiños Raúl Sampedro Distributed Systems Architecture Research Group Universidad Complutense de Madrid 1/31 Outline
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Martin Elich 1,3, Matěj Grégr 1,2 and Pavel Čeleda1,3 1 CESNET, z.s.p.o., Prague, Czech Republic 2 Brno University of Technology,
Virtual Networking Features of the VMware vnetwork Distributed Switch and Cisco Nexus 1000V Series Switches
Virtual Networking Features of the vnetwork Distributed Switch and Cisco Nexus 1000V Series Switches What You Will Learn With the introduction of ESX, many virtualization administrators are managing virtual
Firewall Design Principles
Firewall Design Principles Software Engineering 4C03 Dr. Krishnan Stephen Woodall, April 6 th, 2004 Firewall Design Principles Stephen Woodall Introduction A network security domain is a contiguous region
Enhancing Hypervisor and Cloud Solutions Using Embedded Linux Iisko Lappalainen MontaVista
Enhancing Hypervisor and Cloud Solutions Using Embedded Linux Iisko Lappalainen MontaVista Setting the Stage This presentation will discuss the usage of Linux as a base component of hypervisor components
Securing VoIP Networks using graded Protection Levels
Securing VoIP Networks using graded Protection Levels Andreas C. Schmidt Bundesamt für Sicherheit in der Informationstechnik, Godesberger Allee 185-189, D-53175 Bonn [email protected] Abstract
Overview. Firewall Security. Perimeter Security Devices. Routers
Overview Firewall Security Chapter 8 Perimeter Security Devices H/W vs. S/W Packet Filtering vs. Stateful Inspection Firewall Topologies Firewall Rulebases Lecturer: Pei-yih Ting 1 2 Perimeter Security
Programmable Networking with Open vswitch
Programmable Networking with Open vswitch Jesse Gross LinuxCon September, 2013 2009 VMware Inc. All rights reserved Background: The Evolution of Data Centers Virtualization has created data center workloads
Real-time Protection for Hyper-V
1-888-674-9495 www.doubletake.com Real-time Protection for Hyper-V Real-Time Protection for Hyper-V Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate
Aerohive Networks Inc. Free Bonjour Gateway FAQ
Aerohive Networks Inc. Free Bonjour Gateway FAQ 1. About the Product... 1 2. Installation... 2 3. Management... 3 4. Troubleshooting... 4 1. About the Product What is the Aerohive s Free Bonjour Gateway?
Scalable Extraction, Aggregation, and Response to Network Intelligence
Scalable Extraction, Aggregation, and Response to Network Intelligence Agenda Explain the two major limitations of using Netflow for Network Monitoring Scalability and Visibility How to resolve these issues
Introduction To Computer Networking
Introduction To Computer Networking Alex S. 1 Introduction 1.1 Serial Lines Serial lines are generally the most basic and most common communication medium you can have between computers and/or equipment.
Introduction to Firewalls Open Source Security Tools for Information Technology Professionals
Introduction to Firewalls Open Source Security Tools for Information Technology Professionals School of Professional Studies (SPS) The City University of New York (CUNY) Aron Trauring Adjunct Professor
