Securing Local Area Network with OpenFlow



Similar documents
OpenFlow: Concept and Practice. Dukhyun Chang

OpenFlow and Onix. OpenFlow: Enabling Innovation in Campus Networks. The Problem. We also want. How to run experiments in campus networks?

COMPSCI 314: SDN: Software Defined Networking

Software Defined Networking What is it, how does it work, and what is it good for?

SDN AND SECURITY: Why Take Over the Hosts When You Can Take Over the Network

OpenFlow: Enabling Innovation in Campus Networks

Network Virtualization Based on Flows

Open Source Network: Software-Defined Networking (SDN) and OpenFlow

SOFTWARE-DEFINED NETWORKING AND OPENFLOW

Software Defined Networking (SDN) OpenFlow and OpenStack. Vivek Dasgupta Principal Software Maintenance Engineer Red Hat

LTE - Can SDN paradigm be applied?

Software Defined Networking and the design of OpenFlow switches

Towards Software Defined Cellular Networks

Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心

Understanding OpenFlow

OpenFlow - the key standard of Software-Defined Networks. Dmitry Orekhov, Epam Systems

Getting to know OpenFlow. Nick Rutherford Mariano Vallés

OpenFlow: History and Overview. Demo of routers

Software Defined Networking

Software Defined Networking (SDN)

Software-Defined Networking for the Data Center. Dr. Peer Hasselmeyer NEC Laboratories Europe

基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器

Software Defined Networking

Tutorial: OpenFlow in GENI

SOFTWARE-DEFINED NETWORKING AND OPENFLOW

SDN, OpenFlow and the ONF

The State of OpenFlow: Advice for Those Considering SDN. Steve Wallace Executive Director, InCNTRE SDN Lab Indiana University

Outline. Institute of Computer and Communication Network Engineering. Institute of Computer and Communication Network Engineering

Cloud Networking Disruption with Software Defined Network Virtualization. Ali Khayam

SDN/Virtualization and Cloud Computing

HP OpenFlow Protocol Overview

Using SDN-OpenFlow for High-level Services

SDN 交 換 機 核 心 技 術 - 流 量 分 類 以 及 應 用 辨 識 技 術. 黃 能 富 教 授 國 立 清 華 大 學 特 聘 教 授, 資 工 系 教 授 nfhuang@cs.nthu.edu.tw

Software Defined Networking A quantum leap for Devops?

Software Defined Networking and OpenFlow: a Concise Review

Software Defined Networking (SDN) - Open Flow

MASTER THESIS. Performance Comparison Of the state of the art Openflow Controllers. Ahmed Sonba, Hassan Abdalkreim

OpenFlow. Ihsan Ayyub Qazi. Slides use info from Nick Mckeown

SDN and OpenFlow. Naresh Thukkani (ONF T&I Contributor) Technical Leader, Criterion Networks

OpenFlow Overview. Daniel Turull

Software Defined Networking What is it, how does it work, and what is it good for?

How To Understand The Power Of A Network In A Microsoft Computer System (For A Micronetworking)

Configuring Static and Dynamic NAT Simultaneously

An Introduction to Software-Defined Networking (SDN) Zhang Fu

Facilitating Network Management with Software Defined Networking

How To Understand The Power Of The Internet

Multicasting on SDN. Prof. Sunyoung Han Konkuk University 23 July 2015

Cloud Computing Security: What Changes with Software-Defined Networking?

IPOP-TinCan: User-defined IP-over-P2P Virtual Private Networks

A Presentation at DGI 2014 Government Cloud Computing and Data Center Conference & Expo, Washington, DC. September 18, 2014.

How To Orchestrate The Clouddusing Network With Andn

CTS2134 Introduction to Networking. Module Network Security

Software Defined Networks

VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port

YI-CHIH HSU & JEI-WEI ESTINET TECHNOLOGIES

OpenFlow: Load Balancing in enterprise networks using Floodlight Controller

OpenStack/Quantum SDNbased network virtulization with Ryu

How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan

Software Defined Network (SDN)

The Past, Present, and Future of Software Defined Networking

Design and Implementation of Dynamic load balancer on OpenFlow enabled SDNs

IMPLEMENTATION AND EVALUATION OF THE MOBILITYFIRST PROTOCOL STACK ON SOFTWARE-DEFINED NETWORK PLATFORMS

Designing Virtual Network Security Architectures Dave Shackleford

Network Security through Software Defined Networking: a Survey

Autonomicity Design in OpenFlow Based Software Defined Networking

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

DEMYSTIFYING ROUTING SERVICES IN SOFTWAREDEFINED NETWORKING

SDN/OpenFlow. Dean Pemberton Andy Linton

Ten Things to Look for in an SDN Controller

Technical white paper. Realizing the power of SDN with HP Virtual Application Networks

Limitations of Current Networking Architecture OpenFlow Architecture

Information- Centric Networks. Section # 13.2: Alternatives Instructor: George Xylomenos Department: Informatics

IP Filter/Firewall Setup

Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks

How To Write A Network Plan In Openflow V1.3.3 (For A Test)

software networking Jithesh TJ, Santhosh Karipur QuEST Global

8. Firewall Design & Implementation

VXLAN: Scaling Data Center Capacity. White Paper

Application Note. Stateful Firewall, IPS or IDS Load- Balancing

SDN Architecture and Service Trend

CS 91: Cloud Systems & Datacenter Networks Networks Background

An Overview of OpenFlow

Chapter 11 Cloud Application Development

Multi-Gigabit Intrusion Detection with OpenFlow and Commodity Clusters

Distributed Denial of Service Attacks defenses and OpenFlow:

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

OpenFlow and Software Defined Networking presented by Greg Ferro. OpenFlow Functions and Flow Tables

OpenFlow with Intel Voravit Tanyingyong, Markus Hidell, Peter Sjödin

Conference. Smart Future Networks THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF EVERYTHING

What is OpenFlow? What does OFELIA? An Introduction to OpenFlow and what OFELIA has to do with it

Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES

Programmable Networking with Open vswitch

Bringing OpenFlow s Power to Real Networks

What is VLAN Routing?

Virtualization, SDN and NFV

Securing EtherNet/IP Using DPI Firewall Technology

A Case for Overlays in DCN Virtualization Katherine Barabash, Rami Cohen, David Hadas, Vinit Jain, Renato Recio and Benny Rochwerger IBM

Ethernet-based Software Defined Network (SDN)

Transcription:

Securing Local Area Network with OpenFlow Master s Thesis Presentation Fahad B. H. Chowdhury Supervisor: Professor Jukka Manner Advisor: Timo Kiravuo Department of Communications and Networking Aalto University

Outline Background Methodology Example Test Scenario Results Shortcoming of the firewall Future Work 2

1. Background Limitations of traditional network Software Defined Networking (SDN) OpenFlow Network Security of OpenFlow Firewall 3

Limitations of traditional network The dynamic character of the modern network environment is in sharp contrast to the static traditional network architecture. Rapid increase of mobile devices and content, server virtualization and use of cloud services. In conventional network switches, the control logic for each switch is co-located with the switching logic. The task of operation and maintenance is tedious. The network devices grow to meet the requirements Each entity of network devices need to configured individually using low-level vendor specific commands. To implement network wide policy, a large number of devices need to be configured, which is time-consuming and inefficient 4

Software Defined Networking (SDN) Control Decisions Forwarding hardware Control Decisions Standard Interface Applications SDN controller Traditional Switches and routers - Both forwarding and control functions reside in network devices Standard Interface Forwarding Hardware Network devices SDN Architecture -Decouples control decisions from forwarding plane - Logically centralized controller - Distributed forwarding hardware - Standard Interface to communicate (e.g. OpenFlow ) 5

Software Defined Network Architecture The centralized controller has network intelligence & global view of the network The network devices only has to accept instruction from the controller Entire network can be managed by programming the controller 6

OpenFlow The first standard of SDN architecture. OpenFlow is a protocol between SDN controllers and network devices, and also a specification of the logical structure of the network switch functions. Majority of Ethernet switches and routers have flow tables. Although different vendors have different flow-tables, there is common set of functionalities in the switches and routers which OpenFlow exploits. By programming the flow table, OpenFlow can add, remove or update flow entries and thus control the flow of traffic in the network. 7

Flow Table Entry Matching Fields Action Stats Forward Packet to port(s) Encapsulate and forward to controller Drop packet Send to normal processing pipeline Customized action Packet Counters, Byte Counters Switch port MAC src MAC dst Eth type VLAN ID IP src IP dst IP proto TCP Sr prt TCP Dst prt Each Flow Table entry contains a set of rules (e.g. IP src) to match and an action list (e.g. forward to port) to be executed in case of match 8

OpenFlow Switch OpenFlow switch consists of: 1. Flow tables and Group tables: -Packet look-up and forwarding 2. OpenFlow Channel: - Connects switch to controller, to facilitate exchange of packets and commands 3. OpenFlow Protocol: - Standard means of communication between the switch and the controller 9

Network Security with OpenFlow Security Challenge: - Centralized OpenFlow controller is an ideal target to gain unauthorized access to the network and for exploitation. Enhancing Security: -The programmability of the controller also provides means to enhance security. - Network traffic data can be analyzed to identify irregularity and security threats, and security policies could be established by the OpenFlow controller. - Thus, firewall or intrusion detection system (IDS) could be included in the network using OpenFlow 10

Firewall May consist of software programs or hardware devices or combination of both. Firewall prevents unauthorized network access and protects the network from hazardous outside environment. It controls the flow of traffic between network segments based on predefined security rules. 11

2. Methodology Virtualized Environment Designed Firewall Functionality Flow chart of the Designed Firewall 12

Virtualized Environment Mininet -Network emulator that mimics the properties and functionalities of actual network - A network with 4 hosts connected to an OpenFlow switch is created - Possible to connect external controller 13

POX Controller - Python based controller - Controls and communicates with all the network devices -Responsible for all network operations Virtualized network 14

Designed Firewall Functionality It installs rules in flow table of the OpenFlow switch to allow or block traffic. The rules are based upon predefined port numbers, MAC addresses and IP addresses Example of predefined Rules Flow table rules Action Priority Src IP = 10.0.0.1 Drop packets 100 Src IP = 10.0.0.1 & Dst IP = 10.0.0.2 Allow 200 Port number = 80 Drop packets 50 Src IP = 10.0.0.2 & Dst IP = 10.0.0.1 Forward to 10.0.0.3 250 Dst MAC = 00:00:00:00:00:04 Drop packets 100 Src IP = 10.0.0.1 & TCP port = 80 Allow 500 15

Flow-chart of Designed Firewall 16

3. Example Test Scenario Firewall predefined rules 10.0.0.1 10.0.0.2 10.0.0.3 10.0.0.4 10.0.0.1 X Block Allow Allow 10.0.0.2 Block X Allow Allow 10.0.0.3 Allow Allow X Allow 10.0.0.4 Allow Allow Allow X -Block all traffic between host-1 and host-2 - Allow rest of the hosts to communicate 17

POX controller Packet-In Msg OF switch Checks the flow table for rules Host - 1 Host - 2 Host - 3 Host - 4 18

Packet-In Msg POX controller Flow Add Msg OF switch Checks the predefined firewall rules and finds out communication between host 1 & 2 is not allowed Host - 1 Host - 2 Host - 3 Host - 4 19

Packet-In Msg POX controller Flow Add Msg OF switch Installs flow rule to drop all packets between host 1 & 2, and drops the packet Flow table rules Src IP = 10.0.0.1 & Dst IP = 10.0.0.2 Src IP = 10.0.0.2 & Dst IP = 10.0.0.1 Action Drop packets Drop packets Host - 1 Host - 2 Host - 3 Host - 4 20

POX controller Packet-In Msg Flow Add Msg OF switch Flow Add Conf Msg Host - 2 Host - 3 Host - 4 Wireshark capture of transmitted OpenFlow messages Host - 1 21

4. Results The firewall successfully blocks traffic based MAC addresses, IP addresses and port number. The measured round trip time reveals that only the first packet of the flow takes a long time, and the remaining packets are routed quickly. The bandwidth measurement test reveals that the active firewall offers similar bandwidth compared to inactive firewall. However, the bandwidth reduces drastically if all the packets are routed to the controller. Although the firewall has been built and tested in virtual environment, the test results illustrate the prospect of replacing traditional firewall with OpenFlow based firewall. 22

Bandwidth Measurement Results 23

5. Shortcomings of the Firewall If the controller has to handle too many packets, it creates a bottle neck in the network. The controller needs to be restarted every time for the changed firewall policies to come into effect. The firewall has been designed to control a single switch. 24

6. Future Work The firewall can be modified to provide support for multiple switches. The unique datapath identifier (dpid) can be used to distinguish switches. The firewall capabilities could be extended to application layer. For example, it can be modified to block traffic from all torrent applications. By utilizing OpenFlow s traffic flow features, the switches can be monitored regularly to detect unusual flows, and thus prevent security attacks like denial-of-service. It is possible to redirect the network traffic dynamically for analysis and create an intrusion detection System (IDS). 25

Questions 26