A Study of Basic Architecture for Big-Data Security Analysis in SDN Environment

Size: px
Start display at page:

Download "A Study of Basic Architecture for Big-Data Security Analysis in SDN Environment"

Transcription

1 Int'l Conf. Security and Management SAM' A Study of Basic Architecture for Big-Data Security Analysis in SDN Environment Seong-Ho Choi 1,Jun-Sub Kim 2, and Jin Kwak 3 1 ISAA Lab., Department of Information and Computer Engineering, Ajou University, Suwon, Korea 2 IT Convergence Research Institute, Sungkyunkwan University, Suwon, Korea 3 Department of Information and Computer Engineering, Ajou University, Suwon, Korea Abstract - The first purpose of our project is to find a way to reduce overhead for big-data security analysis in an SDN environment. The second purpose of our project is to support a multi-sdn environment. The SDN is a technology that enables users to control networks by software. Accordingly, the security services would be provided by security software of the SDN controller. However, the process of data analysis for a network security service can generate a large overhead. In addition, big-data security analysis requires more data. This problem such as large overhead and suspension of control systems can arise. Therefore, we need an architecture to reduce the overhead in the controller system. In this study, the architecture is based on a distributed system. It operates on the basis of a virtualization OS. As a result, the architecture uses a disjunct system that consists of control system and data analysis areas. This concept can be developed into a cloud environment, and multiple controllers can be installed and used. A test for the architecture is carried out by a simulation on the basis of the distribution system architecture. We built a distributed system based on KVM, and we was each configure for System of Security, Hadoop, control. As a result, we could reduce the overhead in the control system area. In addition, we could add a new SDN controller. Keywords: Distributed System, Virtualization, Cloud, Big- Data Security Analysis, Security Service, SDN 1. Introduction The number of network devices is growing rapidly. Accordingly, SDN technology is drawing more attention than ever as a means of mitigating problems caused by variable traffic from by diverse types of packet and network environments. SDN is technology that controls the network by using software, it is a concept that separates the control plane from the transport plane. By using this information, software in the control area enables users to configure various networking movements, simplify complex network environment, and manage variable traffic and diverse types of packets efficiently [1-4]. Recently, there is a trend of more security threats as the number of network-connected devices increases. Security threats is evolve through diverse environments. It problem will be limiting the signature based security operation service. Currently, security operation services detect security threats by filtering the signature. However, detecting the attack from a non-registered signature is difficult. This problem can be resolved with big-data security analysis, which provides functions to collect various service and security event logs generated from the network, and discover symptoms by a correlation analysis of collected data. In an SDN environment, where users can control a network with software, the security service provided by an existing security device can be configured as software. This characteristic makes it possible to provide a security service such as IDS/IPS, implement a software firewall, form special systems, and execute big-data security analysis. However, overhead interruption can occur during the data analysis for the security service and the big-data security analysis. The overhead causes a system load for the network controller that results in system suspension. Therefore, we must be Study for decrease to overhead. In this paper, we study a basic Architecture to distributed system for decreased overhead. This paper is organized as follows. In Section 2, we study for distributed SDN, and Big-data Security Analysis. In Section 3, we studied the basic architecture for Big Data security analysis. Section 4 shows the results of the implementation and testing of the architecture. Our conclusions are presented in Section Background Study 2.1. Distributed Security in SDN An SDN environment is a next-generation network technology in which a network can be controlled by software. A security service provided by existing security devices can be configured as software by this technology and the security policy on a network device connected with a controller is applicable [5-8]. s in an SDN environment can provide security service after collecting and analyzing the packets flowing through the network. However, a large overhead against the controller can occur during the process of data collection and analysis. The solution to this problem is to convert the controller system into a distribution system [9-12]. When the controller system is converted into a distribution system, users can protect the control function from the overhead by distinguishing the core area, which controls the

2 138 Int'l Conf. Security and Management SAM'15 network directly, from the analysis area. Table I shows the result of the provision of the security service to the network through the controller after simple realization of IDS and the comparison between the share of CPU and that of memory. The test is executed with the normal application model applied by a distribution environment, which is configured with a simple IDS module from the controller system [13-16]. Consequently, a high share has been recorded from the IDS, which operates in the single controller system and a significantly low share has been shown when operated as a system in a distributed environment. In conclusion, it is more efficient to provide service within the distributed environment to supply security service in the SDN environment. Attack name SYN Flooding TABLE I. RESULTS OF PERFORMANCE ANALYSIS Switch HOST Single CPU Shared 2.2. Big-Data Security Analysis Distributed CPU Shared % 1.0% % 1.4% % 2.3% Big-data security analysis is a technology that can overcome the limits of existing network security analysis. Various solutions including SIEM are in use and are considered important in overcoming the flows of existing network security technology [17-20]. A summary of big-data security analyses is shown in Figure 1. The big-data security analysis model detects symptoms through the collection of network control and security devices, log data such as the server, and then through a correlation analysis engine. This provides the functions to discover symptoms from an undetected cyber-attack in the security equipment. Therefore, the big-data security analysis platform will be an essential factor in future security monitoring and control systems. 3. Architecture of the Prototype This paper discusses how to implement the big-data security analysis in an SDN environment. The architecture can execute big-data security analysis and the security service for the device connected with the network through the controller. The controller is essentially an important system that controls the network. Therefore, the overhead in the controller should not increase during the security analysis process. The previous study reached a conclusion, after realizing the simple IDS in the controller, that the CPU and memory use increase rapidly when analyzing in the single controller. Problems such as system interruption can occur if an analysis system is applied that deals with a large amount of security data. Therefore, a distributed system is needed to minimize the negative effect on the controller system when analyzing data for security. This study hereafter focuses on the core controller system, which controls the network by configured controller system in a distributed environment, and on decreasing the overhead generated from it. The architecture of the prototype is as follows Architecture of Prototype In this research, the controller system is configured with a distributed environment by a simple method derived from advanced research. The architecture is composed of a network control area, and the normal security service area, such as the IPS/IDS, firewall, and big-data security analysis area. See Fig. 2 for the architecture. An explanation for each system area follows. Fig. 1. Big-Data Security Analysis System Control area This system is a core function of the controller and it provides network device management, host management, and various network services. It can be considered as a normal controller environment that controls connected network resources. Security service area The security service area forms a system by using the RPC protocol to minimize the effect on the core controller. The security service, which is executed in the form of an application, records the security events in a log after analyzing packets for the network.

3 Int'l Conf. Security and Management SAM' Big-data security analysis area The big-data security analysis area conducts correlation analysis with the collected data generated from the core controller system and the security event log information recorded in the distributed application system area. This area is managed separately from the controller because it is an environment that can be applied in the network environment, where single controllers and controllers connected with multiple domains control the network. The controllers connected with multiple domains may need to share the outcomes with the big-data security analysis system area. This architecture provide multi SDN environment. Just we will the connected other with This architecture. Fig. 3. Multi SDN Environment Fig. 2. Architecture of Prototype 3.2. Multi-SDN Environment A multi-sdn can provide an environment with which it is possible to execute big-data security analysis by using the prototype architecture. It can also collect data needed for the big-data security analysis by gathering a log for each network by using the controllers in a multi-domain environment. It helps to increase the accuracy of the anticipation of possible attacks by collecting data to detect symptoms more efficiently. This means that users can transform the big-data security analysis system into a server and form it as a single data center in the prototype architecture. The controller can remotely connect from the OFswitch for network control. Another approach is that the controller system may be connected to a remote server with big-data security analysis. However, we need more research for effective measures. See Fig. 3 for the implementation of big-data security in the environment composed of a multi-sdn controller. 4. Implementation This section describes tests carried out on the basis of the architecture introduced in Section 3. It presumes that the security service operates well and that log data for various network services from the controller system can be collected; it also illustrates the process of detecting symptoms by transmitting data generated from the SDN controller to the big-data security analysis server. An overload test for the controller system and the analysis of CPU and memory share are included in the process. An SDN environment forms the status in which an SDN controller-based network environment and interhost correspondence are available. It shows the procedure of a SYN flooding attack from host A to host B and collects event log data about the attack. It also generates massive data to show the process of producing log data in the controller and functions as a data transmitter to the security analysis server. The big-data security analysis server collects security event logs and massive files and is saved as a log file in the non-relational database. Big-data security analysis is a condition precedent TEST The test realizes each system as a virtual environment. We realize each system in the architecture on virtualization. We used KVM technology for this environment [21-24]. The core control system and security analyzer system are configured in VM instances on the Hadoop file system for big-data analysis. In addition, we configure Mininet from the Hadoop system, and mininet is connecting the core control system of VM instance environment from Hadoop. We used network bridge technology in this architecture. Next, we obtained the result of the SYN flooding attack and log file for the network service from the Hadoop file system. In addition, we checked the CPU and memory share. The realized function is for checking the effect of the overhead from the controller system.

4 140 Int'l Conf. Security and Management SAM' % 10.3% 5.2% 10.5% % 10.8% 6.1% 10.7% 4 8.0% 11.2% 6.3% 10.7% % 12.3% 6.5% 10.8% Figs. 5 and 6 graphically depict the change in usage. Fig. 4. Test Environment See Fig. 4 for the network structure. This Result is CPU and memory usage from the core control system. After setting up the test environment as seen in Fig 4, we generated a large amount of log data as more network devices were connected to the controller, and then proceeded to test the CPU and memory share while sending the log data to the big-data security analysis server. The comparison target is the result of CPU and memory, which provide a single system security service. See Table II for the test results. This result is CPU and memory usage from the core control system. Fig. 5. Cpu Usage TABLE II. RESULT OF PERFORMANCE Switch Host Single System Distributed System CPU Mem CPU Mem % 8.0% 4.0% 9.2% 4 2.6% 7.8% 4.5% 9.3% 8 4.2% 7.7% 4.7% 9.3% 1 3.0% 9.9% 4.8% 10.1% 4 5.3% 10.2% 5.0% 10.1% Fig. 6. Memory Usage We were observe that when the Data analysis function is executed. Single System is CPU usage amount increase that if the number of switches and hosts increases, or if the

5 Int'l Conf. Security and Management SAM' Submit a lot of data. But, Distributed System is CPU usage the little increases. We reached the conclusion that forming an individual service system with a distributed system and running it helped to reduce the overhead. 5. Conclusion In this paper, we carried out a study of an architecture for implementing big-data security analysis in an SDN environment. We studied the architecture for the distributed system environment. In addition, we studied a multi-sdn environment for services provided by the big-data security analysis system. We formulated the control system as a distributed system to reduce the overhead generated from the big-data security analysis, and showed the possibility through simulation testing. Security service and big-data security analysis functions were not formulated in the simulation test. Nonetheless, we succeeded in reducing the overhead from the control system by handling the overhead with the distributed system. Even though the individual security service and bigdata security analysis system were formed, possible problems were removed by minimizing the overhead on the control area system. However, the security service system and the big-data security analysis system should be formed with a high quality system that is dependent on the number of connected network devices. This paper, in its initial procedure, would not provide significant help to the industry, but it suggests a method for reducing big-data analysis overhead. We hope that further study on this subject will enable a stable big-data security analysis through the expansion and verification of the architecture. 6. Acknowledgment This work was supported by the ICT R&D program of MSIP/IITP, Republic of Korea. [ , Development of Mobile S/W Security Testing Tools for Detecting New Vulnerabilities of Android] 7. References [1] Yu, J. H., Kim, W. S. and Yun C. H., A Technical Trend and Prospect of Software Defined Network and OpenFlow, KNOM Review, , [2] Lantz, Bob, Brandon Heller, and Nick McKeown, A network in a laptop: rapid prototyping for software-defined networks, Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks. ACM, [3] Handigol, Nikhil, et al., Where is the debugger for my software-defined network?, Proceedings of the first workshop on Hot topics in software defined networks. ACM, [4] ONF, Software-Defined Networking: The New Norm for Networks, ONF White Paper, 4 (2012), [5] Kim, H. and Feamster, N., Improving Network Management with Software Defined Networking, Communications Magazine, IEEE, 51 (2013), [6] Fernando, N. N. Farias, Joao J. Salvatti, Eduardo Cerqueira, and Antonio Jorge Gomes Abelem, Management of the Existing Network Environment Using Openflow Control Plane, IEEE NOMS, 2012, [7] Oueslati, S. and Roberts, J., A New Direction for Quality of Service:Flow-aware Networking, In Proc. NGI, 2014, [8] Hata, H., A Study of Requirements for SDN Switch Platform, ISPACS 2013, 2013, [9] Dixit, Advait, et al., Towards an elastic distributed SDN controller, ACM SIGCOMM Computer Communication Review. Vol. 43. No. 4. ACM, [10] Schmid, Stefan, and Jukka Suomela, Exploiting locality in distributed sdn control, Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking. ACM, [11] Berde, Pankaj, et al., ONOS: towards an open, distributed SDN OS. Proceedings of the third workshop on Hot topics in software defined networking. ACM, 2014 [12] Phemius, Kévin, Mathieu Bouet, and Jérémie Leguay. Disco: Distributed multi-domain sdn controllers, Network Operations and Management Symposium (NOMS), 2014 IEEE. IEEE, [13] Gupta, P., SS-IDS: Statistical Signature Based IDS, ICIW 09, 2009, [14] Ozgur Depren, Murat Topallar, Emin Anarim, M. Kemal Ciliz, An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks, Expert Systems with Applications, November,2005, [15] S. Staniford-Chen, S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, C. Wee, R. Yip, D. Zerkle, Gr., IDS-A GRAPH BASED INTRUSION DETECTION SYSTEM FOR LARGE NETWORKS, NISSC 96, 1996, [16] Weijian Huang, YanAn, Wei Du, A Multi-Agent-Based Distributed Intrusion Detection System, ICACTE,2010 3rd International Conference on, 2010, [17] Wang, Guohui, T. S. Ng, and Anees Shaikh, Programming your network at run-time for big data applications, Proceedings of the first workshop on Hot topics in software defined networks. ACM, [18] Qin, Peng, et al., Bandwidth-Aware Scheduling with SDN in Hadoop: A New Trend for Big Data, arxiv preprint arxiv: (2014). [19] Tankard, Colin. "Big data security." Network security (2012): 5-8. [20] Bhatti, Rafae, et al., Emerging trends around big data analytics and security: panel. Proceedings of the 17th ACM symposium on Access Control Models and Technologies. ACM, [21] Jain, Raj, and Subharthi Paul., Network virtualization and software defined networking for cloud computing: a survey, Communications Magazine, IEEE51.11 (2013): [22] Lin, Pingping, Jun Bi, and Hongyu Hu., VCP: A virtualization cloud platform for SDN intra-domain production network, Network Protocols (ICNP), th IEEE International Conference on. IEEE, [23] Habib, Irfan. "Virtualization with kvm." Linux Journal (2008): 8. [24] Kivity, Avi, et al., kvm: the Linux virtual machine monitor, Proceedings of the Linux Symposium. Vol

A Virtual Machine Searching Method in Networks using a Vector Space Model and Routing Table Tree Architecture

A Virtual Machine Searching Method in Networks using a Vector Space Model and Routing Table Tree Architecture A Virtual Machine Searching Method in Networks using a Vector Space Model and Routing Table Tree Architecture Hyeon seok O, Namgi Kim1, Byoung-Dai Lee dept. of Computer Science. Kyonggi University, Suwon,

More information

Network Security Demonstration - Snort based IDS Integration -

Network Security Demonstration - Snort based IDS Integration - Network Security Demonstration - Snort based IDS Integration - Hyuk Lim ([email protected]) with TJ Ha, CW Jeong, J Narantuya, JW Kim Wireless Communications and Networking Lab School of Information and

More information

Device-based Secure Data Management Scheme in a Smart Home

Device-based Secure Data Management Scheme in a Smart Home Int'l Conf. Security and Management SAM'15 231 Device-based Secure Data Management Scheme in a Smart Home Ho-Seok Ryu 1, and Jin Kwak 2 1 ISAA Lab., Department of Computer Engineering, Ajou University,

More information

A collaborative model for routing in multi-domains OpenFlow networks

A collaborative model for routing in multi-domains OpenFlow networks A collaborative model for routing in multi-domains OpenFlow networks Xuan Thien Phan, Nam Thoai Faculty of Computer Science and Engineering Ho Chi Minh City University of Technology Ho Chi Minh city, Vietnam

More information

Failover Mechanisms for Distributed SDN Controllers

Failover Mechanisms for Distributed SDN Controllers Failover Mechanisms for Distributed SDN Controllers Mathis Obadia, Mathieu Bouet, Jérémie Leguay, Kévin Phemius, Luigi Iannone Thales Communications & Security {firstname.name}@thalesgroup.com Telecom

More information

Future of DDoS Attacks Mitigation in Software Defined Networks

Future of DDoS Attacks Mitigation in Software Defined Networks Future of DDoS Attacks Mitigation in Software Defined Networks Martin Vizváry, Jan Vykopal Institute of Computer Science, Masaryk University, Brno, Czech Republic {vizvary vykopal}@ics.muni.cz Abstract.

More information

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India

More information

A Study on Software Defined Networking

A Study on Software Defined Networking A Study on Software Defined Networking Yogita Shivaji Hande, M. Akkalakshmi Research Scholar, Dept. of Information Technology, Gitam University, Hyderabad, India Professor, Dept. of Information Technology,

More information

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,

More information

A Method for Load Balancing based on Software- Defined Network

A Method for Load Balancing based on Software- Defined Network , pp.43-48 http://dx.doi.org/10.14257/astl.2014.45.09 A Method for Load Balancing based on Software- Defined Network Yuanhao Zhou 1, Li Ruan 1, Limin Xiao 1, Rui Liu 1 1. State Key Laboratory of Software

More information

A Fuzzy Logic-Based Information Security Management for Software-Defined Networks

A Fuzzy Logic-Based Information Security Management for Software-Defined Networks A Fuzzy Logic-Based Information Security Management for Software-Defined Networks Sergei Dotcenko *, Andrei Vladyko *, Ivan Letenko * * The Bonch-Bruevich Saint-Petersburg State University of Telecommunications,

More information

Securing Local Area Network with OpenFlow

Securing Local Area Network with OpenFlow Securing Local Area Network with OpenFlow Master s Thesis Presentation Fahad B. H. Chowdhury Supervisor: Professor Jukka Manner Advisor: Timo Kiravuo Department of Communications and Networking Aalto University

More information

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA Configuring Personal Firewalls and Understanding IDS Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA 1 Configuring Personal Firewalls and IDS Learning Objectives Task Statements 1.4 Analyze baseline

More information

Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka. www.ijreat.org

Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka. www.ijreat.org Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks Kruthika S G 1, VenkataRavana Nayak 2, Sunanda Allur 3 1, 2, 3 Department of Computer Science, Visvesvaraya Technological

More information

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure

More information

Improving Network Management with Software Defined Networking

Improving Network Management with Software Defined Networking Improving Network Management with Software Defined Networking Hyojoon Kim and Nick Feamster, Georgia Institute of Technology 2013 IEEE Communications Magazine Presented by 101062505 林 瑋 琮 Outline 1. Introduction

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat.

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat. Intrusion Detection in Cloud for Smart Phones Namitha Jacob Department of Information Technology, SRM University, Chennai, India Abstract The popularity of smart phone is increasing day to day and the

More information

Software Defined Networking for Telecom Operators: Architecture and Applications

Software Defined Networking for Telecom Operators: Architecture and Applications 2013 8th International Conference on Communications and Networking in China (CHINACOM) Software Defined Networking for Telecom Operators: Architecture and Applications Jian-Quan Wang China Unicom Research

More information

Home Appliance Control and Monitoring System Model Based on Cloud Computing Technology

Home Appliance Control and Monitoring System Model Based on Cloud Computing Technology Home Appliance Control and Monitoring System Model Based on Cloud Computing Technology Yun Cui 1, Myoungjin Kim 1, Seung-woo Kum 3, Jong-jin Jung 3, Tae-Beom Lim 3, Hanku Lee 2, *, and Okkyung Choi 2 1

More information

Network Security Using Job Oriented Architecture (SUJOA)

Network Security Using Job Oriented Architecture (SUJOA) www.ijcsi.org 222 Network Security Using Job Oriented Architecture (SUJOA) Tariq Ahamad 1, Abdullah Aljumah 2 College Of Computer Engineering & Sciences Salman Bin Abdulaziz University, KSA ABSTRACT In

More information

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load

More information

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,

More information

1 Network Service Development Trends and Challenges

1 Network Service Development Trends and Challenges 1 Network Service Development Trends and Challenges Mobility 1. Shift the focus from technology, device, and connectivity to services and user experience. Cloud Computing 2. Shift from single-point security

More information

IMAV: An Intelligent Multi-Agent Model Based on Cloud Computing for Resource Virtualization

IMAV: An Intelligent Multi-Agent Model Based on Cloud Computing for Resource Virtualization 2011 International Conference on Information and Electronics Engineering IPCSIT vol.6 (2011) (2011) IACSIT Press, Singapore IMAV: An Intelligent Multi-Agent Model Based on Cloud Computing for Resource

More information

Network Security Monitoring: Looking Beyond the Network

Network Security Monitoring: Looking Beyond the Network 1 Network Security Monitoring: Looking Beyond the Network Ian R. J. Burke: GCIH, GCFA, EC/SA, CEH, LPT [email protected] [email protected] February 8, 2011 2 Abstract Network security monitoring

More information

OpenFlow: Load Balancing in enterprise networks using Floodlight Controller

OpenFlow: Load Balancing in enterprise networks using Floodlight Controller OpenFlow: Load Balancing in enterprise networks using Floodlight Controller Srinivas Govindraj, Arunkumar Jayaraman, Nitin Khanna, Kaushik Ravi Prakash [email protected], [email protected],

More information

Network Programmability Using POX Controller

Network Programmability Using POX Controller Network Programmability Using POX Controller Sukhveer Kaur 1, Japinder Singh 2 and Navtej Singh Ghumman 3 1,2,3 Department of Computer Science and Engineering, SBS State Technical Campus, Ferozepur, India

More information

Analyze & Classify Intrusions to Detect Selective Measures to Optimize Intrusions in Virtual Network

Analyze & Classify Intrusions to Detect Selective Measures to Optimize Intrusions in Virtual Network Analyze & Classify Intrusions to Detect Selective Measures to Optimize Intrusions in Virtual Network 1 T.Ganesh, 2 K.Santhi 1 M.Tech Student, Department of Computer Science and Engineering, SV Collge of

More information

A Network in a Laptop: Rapid Prototyping for So7ware- Defined Networks

A Network in a Laptop: Rapid Prototyping for So7ware- Defined Networks A Network in a Laptop: Rapid Prototyping for So7ware- Defined Networks Bob Lantz, Brandon Heller, Nick McKeown Stanford University HotNets 2010, 10/20/10 1 2 Wouldn t it be amazing if systems papers were

More information

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security SIEM Optimization 101 ReliaQuest E-Book Fully Integrated and Optimized IT Security Introduction SIEM solutions are effective security measures that mitigate security breaches and increase the awareness

More information

OpenFlow-Based Dynamic Server Cluster Load Balancing with Measurement Support

OpenFlow-Based Dynamic Server Cluster Load Balancing with Measurement Support OpenFlow-Based Dynamic Server Cluster Load Balancing with Measurement Support Qingwei Du and Huaidong Zhuang College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics,

More information

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

Cloud Database Storage Model by Using Key-as-a-Service (KaaS) www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK SOFTWARE DEFINED NETWORKING A NEW ARCHETYPE PARNAL P. PAWADE 1, ANIKET A. KATHALKAR

More information

A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING

A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING AZRUDDIN AHMAD, GOBITHASAN RUDRUSAMY, RAHMAT BUDIARTO, AZMAN SAMSUDIN, SURESRAWAN RAMADASS. Network Research Group School of

More information

A Study on Detection of Hacking and Malware Codes in Bare Metal Hypervisor for Virtualized Internal Environment of Cloud Service

A Study on Detection of Hacking and Malware Codes in Bare Metal Hypervisor for Virtualized Internal Environment of Cloud Service 78 A Study on Detection of Hacking and Malware Codes in Bare Metal Hypervisor for Virtualized Internal Environment of Cloud Service Jung-oh Park Dept. of Information Communications, DONGYANG MIRAE University,

More information

OpenFlow: Concept and Practice. Dukhyun Chang ([email protected])

OpenFlow: Concept and Practice. Dukhyun Chang (dhchang@mmlab.snu.ac.kr) OpenFlow: Concept and Practice Dukhyun Chang ([email protected]) 1 Contents Software-Defined Networking (SDN) Overview of OpenFlow Experiment with OpenFlow 2/24 Software Defined Networking.. decoupling

More information

Implementation of Address Learning/Packet Forwarding, Firewall and Load Balancing in Floodlight Controller for SDN Network Management

Implementation of Address Learning/Packet Forwarding, Firewall and Load Balancing in Floodlight Controller for SDN Network Management Research Paper Implementation of Address Learning/Packet Forwarding, Firewall and Load Balancing in Floodlight Controller for SDN Network Management Raphael Eweka MSc Student University of East London

More information

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India [email protected],

More information

Dynamic Security Traversal in OpenFlow Networks with QoS Guarantee

Dynamic Security Traversal in OpenFlow Networks with QoS Guarantee International Journal of Science and Engineering Vol.4 No.2(2014):251-256 251 Dynamic Security Traversal in OpenFlow Networks with QoS Guarantee Yu-Jia Chen, Feng-Yi Lin and Li-Chun Wang Department of

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

48 0890-8044/15/$25.00 2015 IEEE

48 0890-8044/15/$25.00 2015 IEEE An Extended SDN Architecture for Network Function Virtualization with a Case Study on Intrusion Prevention Ying-Dar Lin, Po-Ching Lin, Chih-Hung Yeh, Yao-Chun Wang, and Yuan-Cheng Lai Abstract In conventional

More information

An Efficient Hybrid P2P MMOG Cloud Architecture for Dynamic Load Management. Ginhung Wang, Kuochen Wang

An Efficient Hybrid P2P MMOG Cloud Architecture for Dynamic Load Management. Ginhung Wang, Kuochen Wang 1 An Efficient Hybrid MMOG Cloud Architecture for Dynamic Load Management Ginhung Wang, Kuochen Wang Abstract- In recent years, massively multiplayer online games (MMOGs) become more and more popular.

More information

DDoS Attack Protection in the Era of Cloud Computing and Software-Defined Networking

DDoS Attack Protection in the Era of Cloud Computing and Software-Defined Networking DDoS Attack Protection in the Era of Cloud Computing and Software-Defined Networking Bing Wang Yao Zheng Wenjing Lou Y. Thomas Hou Virginia Polytechnic Institute and State University, Blacksburg, VA, USA

More information

Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform

Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform Shie-Yuan Wang Department of Computer Science National Chiao Tung University, Taiwan Email: [email protected]

More information

Development and Runtime Platform and High-speed Processing Technology for Data Utilization

Development and Runtime Platform and High-speed Processing Technology for Data Utilization Development and Runtime Platform and High-speed Processing Technology for Data Utilization Hidetoshi Kurihara Haruyasu Ueda Yoshinori Sakamoto Masazumi Matsubara Dramatic increases in computing power and

More information

GUI Tool for Network Designing Using SDN

GUI Tool for Network Designing Using SDN GUI Tool for Network Designing Using SDN P.B.Arun Prasad, Varun, Vasu Dev, Sureshkumar Assistant Professor Department of Computer Science and Engineering, Saranathan College of Engineering, Tamil Nadu,

More information

Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis

Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis Felipe Augusto Nunes de Oliveira - GRR20112021 João Victor Tozatti Risso - GRR20120726 Abstract. The increasing

More information

Accessing Private Network via Firewall Based On Preset Threshold Value

Accessing Private Network via Firewall Based On Preset Threshold Value IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. V (May-Jun. 2014), PP 55-60 Accessing Private Network via Firewall Based On Preset Threshold

More information

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...

More information

Control of Multiple Packet Schedulers for Improving QoS on OpenFlow/SDN Networking

Control of Multiple Packet Schedulers for Improving QoS on OpenFlow/SDN Networking Control of Multiple Packet Schedulers for Improving QoS on OpenFlow/SDN Networking Airton Ishimori, Fernando Farias, Eduardo Cerqueira, Antônio Abelém Federal University of Pará GERCOM Lab Belém, Brazil

More information

Dynamic Controller Deployment in SDN

Dynamic Controller Deployment in SDN Dynamic Controller Deployment in SDN Marc Huang, Sherrill Lin, Dominic Yan Department of Computer Science, University of Toronto Table of Contents Introduction... 1 Background and Motivation... 1 Problem

More information

OF-RHM: Transparent Moving Target Defense using Software Defined Networking

OF-RHM: Transparent Moving Target Defense using Software Defined Networking OF-RHM: Transparent Moving Target Defense using Software Defined Networking Haadi Jafarian, Qi Duan and Ehab Al-Shaer ACM SIGCOMM HotSDN Workshop August 2012 Helsinki, Finland Why IP Mutation Static assignment

More information

Mobility Management Framework in Software Defined Networks

Mobility Management Framework in Software Defined Networks , pp. 1-10 http://dx.doi.org/10.14257/ijseia.2014.8.8,01 Mobility Management Framework in Software Defined Networks Kyoung-Hee Lee Department of Computer Engineering, Pai Chai University, Korea [email protected]

More information

Survey on DDoS Attack in Cloud Environment

Survey on DDoS Attack in Cloud Environment Available online at www.ijiere.com International Journal of Innovative and Emerging Research in Engineering e-issn: 2394-3343 p-issn: 2394-5494 Survey on DDoS in Cloud Environment Kirtesh Agrawal and Nikita

More information

ON THE IMPLEMENTATION OF ADAPTIVE FLOW MEASUREMENT IN THE SDN-ENABLED NETWORK: A PROTOTYPE

ON THE IMPLEMENTATION OF ADAPTIVE FLOW MEASUREMENT IN THE SDN-ENABLED NETWORK: A PROTOTYPE ON THE IMPLEMENTATION OF ADAPTIVE FLOW MEASUREMENT IN THE SDN-ENABLED NETWORK: A PROTOTYPE PANG-WEI TSAI, CHUN-YU HSU, MON-YEN LUO AND CHU-SING YANG NATIONAL CHENG KUNG UNIVERSITY, INSTITUTE OF COMPUTER

More information

SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT

SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT V. Devi PG Scholar, Department of CSE, Indira Institute of Engineering & Technology, India. J. Chenni Kumaran Associate Professor,

More information

Big Data Collection Study for Providing Efficient Information

Big Data Collection Study for Providing Efficient Information , pp. 41-50 http://dx.doi.org/10.14257/ijseia.2015.9.12.03 Big Data Collection Study for Providing Efficient Information Jun-soo Yun, Jin-tae Park, Hyun-seo Hwang and Il-young Moon Computer Science and

More information

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 7.1 Threats to Computer System 7.2 Process of Intrusions

More information

DoS: Attack and Defense

DoS: Attack and Defense DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g Virtualization: Architectural Considerations and Implementation Options Virtualization Virtualization is the

More information

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise

More information

IBM QRadar Security Intelligence Platform appliances

IBM QRadar Security Intelligence Platform appliances IBM QRadar Security Intelligence Platform Comprehensive, state-of-the-art solutions providing next-generation security intelligence Highlights Get integrated log management, security information and event

More information

A B S T R A C T. Index Terms: DoubleGuard; database server; intruder; web server I INTRODUCTION

A B S T R A C T. Index Terms: DoubleGuard; database server; intruder; web server I INTRODUCTION Intervention Detection System Using DoubleGuard Technique Web Application. Prof.P.M.Bhujbal, Prof.S.V.Gumaste, Mr.N.S.Jadhav, Mr.S.N.Dhage Department Of Computer Engineering Jaihind College Of Engineering,

More information

Network/Internet Forensic and Intrusion Log Analysis

Network/Internet Forensic and Intrusion Log Analysis Course Introduction Enterprises all over the globe are compromised remotely by malicious hackers each day. Credit card numbers, proprietary information, account usernames and passwords, and a wealth of

More information

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram. Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 2, February 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analysis of

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

The Three-level Approaches for Differentiated Service in Clustering Web Server

The Three-level Approaches for Differentiated Service in Clustering Web Server The Three-level Approaches for Differentiated Service in Clustering Web Server Myung-Sub Lee and Chang-Hyeon Park School of Computer Science and Electrical Engineering, Yeungnam University Kyungsan, Kyungbuk

More information

IBM Security QRadar Risk Manager

IBM Security QRadar Risk Manager IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Collect network security device configuration data to

More information

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment R&D supporting future cloud computing infrastructure technologies Research and Development on Autonomic Operation Control Infrastructure Technologies in the Cloud Computing Environment DEMPO Hiroshi, KAMI

More information

SDN/Virtualization and Cloud Computing

SDN/Virtualization and Cloud Computing SDN/Virtualization and Cloud Computing Agenda Software Define Network (SDN) Virtualization Cloud Computing Software Defined Network (SDN) What is SDN? Traditional Network and Limitations Traditional Computer

More information

A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS

A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS Journal homepage: www.mjret.in ISSN:2348-6953 A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS P.V.Sawant 1, M.P.Sable 2, P.V.Kore 3, S.R.Bhosale 4 Department

More information

Extreme Networks Security Analytics G2 Risk Manager

Extreme Networks Security Analytics G2 Risk Manager DATA SHEET Extreme Networks Security Analytics G2 Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance HIGHLIGHTS Visualize current and potential

More information

How OpenFlow-based SDN can increase network security

How OpenFlow-based SDN can increase network security How OpenFlow-based SDN can increase network security Charles Ferland, IBM System Networking Representing the ONF [email protected] +49 151 1265 0830 Important elements The objective is to build SDN networks

More information

Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications

Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications Rouven Kreb 1 and Manuel Loesch 2 1 SAP AG, Walldorf, Germany 2 FZI Research Center for Information

More information

Cyber Forensic for Hadoop based Cloud System

Cyber Forensic for Hadoop based Cloud System Cyber Forensic for Hadoop based Cloud System ChaeHo Cho 1, SungHo Chin 2 and * Kwang Sik Chung 3 1 Korea National Open University graduate school Dept. of Computer Science 2 LG Electronics CTO Division

More information

Security improvement in IoT based on Software Defined Networking (SDN)

Security improvement in IoT based on Software Defined Networking (SDN) Security improvement in IoT based on Software Defined Networking (SDN) Vandana C.P Assistant Professor, New Horizon College of Engineering Abstract With the evolving Internet of Things (IoT) technology,

More information

Restorable Logical Topology using Cross-Layer Optimization

Restorable Logical Topology using Cross-Layer Optimization פרויקטים בתקשורת מחשבים - 236340 - סמסטר אביב 2016 Restorable Logical Topology using Cross-Layer Optimization Abstract: Today s communication networks consist of routers and optical switches in a logical

More information

SDN_CDN Documentation

SDN_CDN Documentation SDN_CDN Documentation Release 0.1.1 introom9 October 27, 2015 Contents 1 What s it about 1 2 Get the code 3 3 Contents: 5 3.1 Overview................................................. 5 3.2 sdn_module................................................

More information

Managing Risks at Runtime in VoIP Networks and Services

Managing Risks at Runtime in VoIP Networks and Services Managing Risks at Runtime in VoIP Networks and Services Oussema Dabbebi, Remi Badonnel, Olivier Festor To cite this version: Oussema Dabbebi, Remi Badonnel, Olivier Festor. Managing Risks at Runtime in

More information

OpenFlow and Onix. OpenFlow: Enabling Innovation in Campus Networks. The Problem. We also want. How to run experiments in campus networks?

OpenFlow and Onix. OpenFlow: Enabling Innovation in Campus Networks. The Problem. We also want. How to run experiments in campus networks? OpenFlow and Onix Bowei Xu [email protected] [1] McKeown et al., "OpenFlow: Enabling Innovation in Campus Networks," ACM SIGCOMM CCR, 38(2):69-74, Apr. 2008. [2] Koponen et al., "Onix: a Distributed Control

More information

Traffic Analyzer Based on Data Flow Patterns

Traffic Analyzer Based on Data Flow Patterns AUTOMATYKA 2011 Tom 15 Zeszyt 3 Artur Sierszeñ*, ukasz Sturgulewski* Traffic Analyzer Based on Data Flow Patterns 1. Introduction Nowadays, there are many systems of Network Intrusion Detection System

More information

Qualifying SDN/OpenFlow Enabled Networks

Qualifying SDN/OpenFlow Enabled Networks Qualifying SDN/OpenFlow Enabled Networks Dean Lee Senior Director, Product Management Ixia Santa Clara, CA USA April-May 2014 1 Agenda SDN/NFV a new paradigm shift and challenges Benchmarking SDN enabled

More information

Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX

Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX Shie-Yuan Wang Hung-Wei Chiu and Chih-Liang Chou Department of Computer Science, National Chiao Tung University, Taiwan Email: [email protected]

More information

The SIEM Evaluator s Guide

The SIEM Evaluator s Guide Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,

More information

Design and Implementation of Dynamic load balancer on OpenFlow enabled SDNs

Design and Implementation of Dynamic load balancer on OpenFlow enabled SDNs IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V4 PP 32-41 Design and Implementation of Dynamic load balancer on OpenFlow enabled SDNs Ragalatha

More information

The Road to SDN: Software-Based Networking and Security from Brocade

The Road to SDN: Software-Based Networking and Security from Brocade WHITE PAPER www.brocade.com SOFTWARE NETWORKING The Road to SDN: Software-Based Networking and Security from Brocade Software-Defined Networking (SDN) presents a new approach to rapidly introducing network

More information

Intrusion Detection Systems. Darren R. Davis Student Computing Labs

Intrusion Detection Systems. Darren R. Davis Student Computing Labs Intrusion Detection Systems Darren R. Davis Student Computing Labs Overview Intrusion Detection What is it? Why do I need it? How do I do it? Intrusion Detection Software Network based Host based Intrusion

More information