How OpenFlow-based SDN can increase network security



Similar documents
Understanding OpenFlow

Software-Defined Networking for the Data Center. Dr. Peer Hasselmeyer NEC Laboratories Europe

Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre

Using SDN-OpenFlow for High-level Services

SHARE THIS WHITEPAPER

Mock RFI for Enterprise SDN Solutions

Trusting SDN. Brett Sovereign Trusted Systems Research National Security Agency 28 October, 2015

New Cloud Networking Enabled by ProgrammableFlow

Defense4All: Anti-DoS for OpenDaylight. July 18, 2013

Simplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera VERSION May, 2015

FRESCO: Modular Composable Security Services for So;ware- Defined Networks

Security in Software Defined Networking. Professor : Admela Jukan Supervisor : Marcel Caria Student : Siqian Zhao

Network Services in the SDN Data Center

Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES

SOFTWARE-DEFINED NETWORKING AND OPENFLOW

Building an Open, Adaptive & Responsive Data Center using OpenDaylight

Open Source Network: Software-Defined Networking (SDN) and OpenFlow

A Case for Overlays in DCN Virtualization Katherine Barabash, Rami Cohen, David Hadas, Vinit Jain, Renato Recio and Benny Rochwerger IBM

Stanford SDN-Based Private Cloud. Johan van Reijendam Stanford University

ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY

HAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer

Application Defined E2E Security for Network Slices. Linda Dunbar Diego Lopez

SOFTWARE-DEFINED NETWORKING AND OPENFLOW

NEC contribution to OpenDaylight: Virtual Tenant Network (VTN)

Enterprise Buyer Guide

How To Write A Network Plan In Openflow V1.3.3 (For A Test)

Conference. Smart Future Networks THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF EVERYTHING

An Overview of OpenFlow

A Presentation at DGI 2014 Government Cloud Computing and Data Center Conference & Expo, Washington, DC. September 18, 2014.

SDN and NFV in the WAN

Radware s Attack Mitigation Solution On-line Business Protection

Software Defined Network (SDN)

software networking Jithesh TJ, Santhosh Karipur QuEST Global

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

Active Visibility for Multi-Tiered Security. Juergen Kirchmann Director Enterprise Sales EMEA

Securing Local Area Network with OpenFlow

SDN Security Considerations in the Data Center. ONF Solution Brief October 8, 2013

SDN Use Cases: Leveraging Programmable Networks

Security Challenges & Opportunities in Software Defined Networks (SDN)

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

ViSION Status Update. Dan Savu Stefan Stancu. D. Savu - CERN openlab

What is SDN? And Why Should I Care? Jim Metzler Vice President Ashton Metzler & Associates

Cisco Application Networking for IBM WebSphere

Qualifying SDN/OpenFlow Enabled Networks

2013 ONS Tutorial 2: SDN Market Opportunities

Why Software Defined Networking (SDN)? Boyan Sotirov

2. Are explicit proxy connections also affected by the ARM config?

74% 96 Action Items. Compliance

Open Fabric SDN The Comprehensive SDN approach. Jake Howering, Director SDN Product Line Management Bithika Khargharia, PhD, Senior Engineer

CTS2134 Introduction to Networking. Module Network Security

Network Technologies for Next-generation Data Centers

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Software-Defined Networking. Starla Wachsmann. University Of North Texas

AppDirector Load balancing IBM Websphere and AppXcel

Technical Note. ForeScout CounterACT: Virtual Firewall

SECURING YOUR MODERN DATA CENTER WITH CHECK POINT

SDN AND SECURITY: Why Take Over the Hosts When You Can Take Over the Network

White Paper. SDN 101: An Introduction to Software Defined Networking. citrix.com

SDN and OpenFlow. Naresh Thukkani (ONF T&I Contributor) Technical Leader, Criterion Networks

Securing Virtualization with Check Point and Consolidation with Virtualized Security

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

An Introduction to Software-Defined Networking (SDN) Zhang Fu

OperationCheckpoint: SDN Application Control

Benchmarking the SDN controller!

SDN/Virtualization and Cloud Computing

Carrier/WAN SDN. SDN Optimized MPLS Demo

SOFTWARE DEFINED NETWORKING: INDUSTRY INVOLVEMENT

Software Defined Networking Subtitle: Network Virtualization Terry Slattery Chesapeake NetCraftsmen Principal Consultant CCIE #1026.

DECODING SOFTWARE DEFINED NETWORKING (SDN) Nico Siebelink Technical Director Northern Europe

Software Defined Networking (SDN) OpenFlow and OpenStack. Vivek Dasgupta Principal Software Maintenance Engineer Red Hat

Cisco Application Networking for BEA WebLogic

Ranch Networks for Hosted Data Centers

RIDE THE SDN AND CLOUD WAVE WITH CONTRAIL

SDN Architecture and Service Trend

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

Panel : Future Data Center Networks

SDN CENTRALIZED NETWORK COMMAND AND CONTROL

Ten Things to Look for in an SDN Controller

Software Defined Networking What is it, how does it work, and what is it good for?

Cisco Certified Security Professional (CCSP)

Zscaler Internet Security Frequently Asked Questions

Software Defined Networking (SDN) - Open Flow

L2-L7 BASED SERVICE REDIRECTION WITH SDN/OPENFLOW

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

Wedge Networks: Transparent Service Insertion in SDNs Using OpenFlow

Future of DDoS Attacks Mitigation in Software Defined Networks

Leveraging SDN and NFV in the WAN

Deploying Network Taps for improved security

Network Functions Virtualization in Home Networks

SOFTWARE DEFINED NETWORKING

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

The Software Defined Hybrid Packet Optical Datacenter Network SDN AT LIGHT SPEED TM CALIENT Technologies

Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心

SINGLE-TOUCH ORCHESTRATION FOR PROVISIONING, END-TO-END VISIBILITY AND MORE CONTROL IN THE DATA CENTER

Software Defined Networks

Virtualized Network Services SDN solution for enterprises

Network Security Demonstration - Snort based IDS Integration -

Transcription:

How OpenFlow-based SDN can increase network security Charles Ferland, IBM System Networking Representing the ONF ferland@de.ibm.com +49 151 1265 0830

Important elements The objective is to build SDN networks as secure or more than traditional network SDN networks are very different than traditional networks, hence how to protect them as well Existing security threats might not apply to SDN network, but new ones can SDN holds a huge potential to increase overall security within the networks October 2012 Representing the ONF: Charles Ferland, IBM System Networking 2

The best security is the no touch security A simple PING from one server to another requires several configuration touch point Several different manufacturers/vendors Several different functional groups Configuration touch point ROUTER v v The more manual work required, the more potential error and therefore security risks are introduce October 2012 Representing the ONF: Charles Ferland, IBM System Networking 3

The best security is the no touch security A single logical configuration touch point Network configuration is flow & application driven instead of physical ports & features Less manual configuration reduce the risk of errors, especially in a highly dynamic environment Single Config touch point ROUTER v v Single logical configuration touch point, regardless of vendors, etc. October 2012 Representing the ONF: Charles Ferland, IBM System Networking 4

In or out of band management A separate & dedicated Network can be setup for the communication between the Controller and the networking devices Low latency, lossless The management network can be a traditional network, not -aware Production traffic is not mixing with the traffic October 2012 Representing the ONF: Charles Ferland, IBM System Networking 5

IBM PNC Example Configuration An example of a network configured with IBM PNCs in a redundant manner is as follows. Interface name IBM PNC#1 Floating IP Interface name IBM PNC#2 eth0 192.168.1.1/24 192.168.1.10 eth0 192.168.1.2/24 eth2 192.168.2.1/24 192.168.2.10 eth2 192.168.2.2/24 eth4 192.168.3.1/24 192.168.3.10 eth4 192.168.3.2/24 Bond0 eth3 eth3 192.168.0.1/24 - bond1 eth5 eth5 192.168.0.2/24 Floating IP1 IBM PNC control Network IBM PNC #1 eth2 eth0 eth3 eth5 eth4 bond0 bond0 For cluster (connected directly) eth3 eth5 eth2 eth0 eth4 IBM PNC #2 Floating IP2 Floating IP3 Network for controlling OpenFlow switches October 2012 Representing the ONF: Charles Ferland, IBM System Networking 6

SDN Security in 3 acts Controller must be secure OS security Apps security Errors are a magnitude more important Protocol must be secure TLS session establishment protocol for communication Mutual authentication via certificate exchange Limited control plane messaging options Device must be secure Authentication against the controller CPU capabilities to encrypt control plane messages Slice resources for multi-tenants October 2012 Representing the ONF: Charles Ferland, IBM System Networking 7

Cloud Multi Tenancy If no flows are configure between customers, traffic can safely co-exist Customer 1 Virtual Network Customer 2 Virtual Network Customer 3 Virtual Network VM VM VM VM VM VM VM VM VM VM VM VM Customer 1 OpenFlow Controller Customer 2 OpenFlow Controller Customer 3 OpenFlow Controller October 2012 Representing the ONF: Charles Ferland, IBM System Networking 8

SDN: Smarter use of Network and Appliances SDN Controller Global topology view global link state Server/App Feedback Controller Appliance sharing let s network provider use the resources more effectively October 2012 Representing the ONF: Charles Ferland, IBM System Networking 9

Advancement route control Route control by OpenFlow (1) Efficient use of the network band by the route control on a per-flow basis (2) Improve ease of maintenance of network devices by one-sided flows Specific functions become available through the OpenFlow controller: (3) Specify which devices (such as LB and FW) the packet go through Controller (2) One sided flows (1) Flow 1 Flow 2 App 1 App 2 Server App 1 App 2 (2) Capable of maintenance (1) (3) Firewall Load balancer October 2012 Representing the ONF: Charles Ferland, IBM System Networking 10

SDN/OpenFlow SPAN and Tap Diagnostic Compliance Monitoring Auditing Parallel network for diagnostics, compliance, auditing Open, standards-based costeffective solution Move flows from SPAN or TAP to OpenFlow switches Cost-effective alternative to specialpurpose devices October 2012 Representing the ONF: Charles Ferland, IBM System Networking 11

Redirecting live traffic Record/Audit Selected & interesting traffic can be mirror to additional switch ports Dynamic rules can define the mirror traffic No TAP or similar devices needed, hence every port can be mirrored Recording or audit technology can monitor network traffic October 2012 Representing the ONF: Charles Ferland, IBM System Networking 12

IPS/IDS interaction IPS/IDS IPS/IDS software can analyze network traffic and communicate with the controller possible actions Deny communication of suspicious traffic between servers FortNOX Reflector Nets demo October 2012 Representing the ONF: Charles Ferland, IBM System Networking 13

Security : Rule conflict analysis FortNOX incorporates a live rule conflict detection engine Rule Conflict: arises when a new candidate rule enables or disables a network flow that is otherwise inversely prohibited (or allowed) by existing rules Alias set rule reduction a method detecting flow rule conflicts, even when set operations are used SEE DEMO 1 Security Constraints Enforcement [high res.mov or Youtube! ] H1 /= H4 H1 = H2 H3 = H4 October 2012 H1 H2 H3 H4 Representing the ONF: Charles Ferland, IBM System Networking Phillip Porras, Martin Fong, Vinod Yegneswaran, Mabry Tyson Computer Science Laboratory, SRI International 14

Software customization Previously closed Network Operating Systems are now open to software development Security threats can rapidly be developed and deployed across a large network infrastructure Security Application App App App App App App Operating System Specialized Packet Forwarding Hardware Network Operating System App App App Operating System Specialized Packet Forwarding Hardware App App App App App App Operating System Specialized Packet Forwarding Hardware Simple Packet Forwarding Hardware Simple Packet Forwarding Hardware Simple Packet Forwarding Hardware Operating System Specialized Packet Forwarding Hardware Simple Packet Forwarding Hardware October 2012 Representing the ONF: Charles Ferland, IBM System Networking 15

Opening the door to applications Smart Analytics Credit card fraud Financial threats Known malicious security patterns Specialized security software can be utilized Clever analytics, trends analysis, complex security detection, etc. controller provides a common and standard based platform October 2012 Representing the ONF: Charles Ferland, IBM System Networking 16

Opening the door to applications Known security signature Since the controller can potentially see all traffic, specialized software can be loaded to recognized known security threats Messages from the controller to the data plane can intercept the security threats Virus signature, etc. October 2012 Representing the ONF: Charles Ferland, IBM System Networking 17

Application & Controller communication Web- Basic feature sets such as VTN creation and Flow info collection are available https Request OpenFlow Controller https Reply Client To enable WEB-, firewall setting and certification for SSL are required on Controller RESTful XML 1.0 and Jason Applications can securely communicate with the controller and request resources, configuration changes, etc. controller can also modify Applications behavior October 2012 Representing the ONF: Charles Ferland, IBM System Networking 18

Radware s Integration in NEC PFlow Content provided by Radware DoS Secured VTN provides: Monitoring of traffic statistics based on OpenFlow L3-L4 counters Learning normal VTN traffic baselines Detects deviation from normal traffic baselines Using P-Flow traffic diversion abilities to: Divert suspicious traffic to scrubbing center Re-inject clean traffic to original destination Back to normal after attack termination VTN C VTN B VTN A ProgrammableFlow Controller Suspicious Radware DoS attack activities detection detected app October 2012 Representing the ONF: Charles Ferland, IBM System Networking Attack Mitigation System Slide 19

Key points SDN architecture is different but no less secure than existing network infrastructure Secure messaging, isolated/protected network and redundant controller are recommended security practices OpenFlow route manipulation can deploy security devices anywhere and any time -> seriously increase your overall network infrastructure Split between the data and control plane allows a multitude of security applications to be develop October 2012 Representing the ONF: Charles Ferland, IBM System Networking 20

Questions? (and hopefully answers) October 2012 Representing the ONF: Charles Ferland, IBM System Networking 21