Extended data plane architecture for in-network security services in software-defined networks

被引:10
作者
Kim, Jinwoo [1 ]
Kim, Yeonkeun [2 ]
Yegneswaran, Vinod [4 ]
Porras, Phillip [4 ]
Shin, Seungwon [3 ]
Park, Taejune [5 ]
机构
[1] Kwangwoon Univ, Seoul, South Korea
[2] S2W Inc, Seoul, South Korea
[3] Korea Adv Inst Sci & Technol, Seoul, South Korea
[4] SRI Int, Menlo Pk, CA USA
[5] Chonnam Natl Univ, Gwangju, South Korea
关键词
Software-defined networking (SDN); Network security; Openflow; Data plane; Network function virtualization (NFV);
D O I
10.1016/j.cose.2022.102976
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software-Defined Networking (SDN)-based Network Function Virtualization (NFV) technologies improve the dependability and resilience of networks by enabling administrators to spawn and scale-up traffic management and security services in response to dynamic network conditions. However, in practice, they often suffer from poor performance and require complex configurations because network packets must be 'detoured' to each virtualized security service, which expends bandwidth and increases network propagation delay. To address these challenges, we propose a new SDN-based data plane architecture, called DPX (Data Plane eXtension), that natively supports in-network security services. The DPX action model reduces redundant processing caused by frequent packet parsing and provides administrators with a simplified (and less error-prone) method for configuring security services into the network. DPX also increases the efficiency of enforcing complex security policies by introducing a novel technique called action clustering , which aggregates security actions from multiple flows into a small number of synthetic rules. Also, the application of action clustering (i.e., advanced and global) provides more diverse policies and network-wide detection. We present an implementation of DPX in hardware using NetFPGA-SUME and in software using Open vSwitch. We evaluate the performance of the DPX prototype and the effi-cacy of its flow-table simplifications against a range of complex network policies exposed to line rates of 10 Gbps.(c) 2022 Elsevier Ltd. All rights reserved.
引用
收藏
页数:19
相关论文
共 65 条
[1]  
Anderson JW, 2012, PROCEEDINGS OF THE EIGHTH ACM/IEEE SYMPOSIUM ON ARCHITECTURES FOR NETWORKING AND COMMUNICATIONS SYSTEMS (ANCS'12), P49
[2]  
[Anonymous], Network Intrusion Detection Prevention System
[3]  
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[4]  
ARping, 2022, PING DEST DEV INT AR
[5]  
Berde P., 2014, P 3 WORKSH HOT TOP S, P1, DOI 10.1145/
[6]  
BlueCat Networks, 2022, MAK CAS SDN REAL WOR
[7]   Programming Protocol-Independent Packet Processors [J].
Bosshart, Pat ;
Daly, Dan ;
Gibb, Glen ;
Izzard, Martin ;
McKeown, Nick ;
Rexford, Jennifer ;
Schlesinger, Cole ;
Talayco, Dan ;
Vahdat, Amin ;
Varghese, George ;
Walker, David .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2014, 44 (03) :87-95
[8]   OpenBox: A Software-Defined Framework for Developing, Deploying, and Managing Network Functions [J].
Bremler-Barr, Anat ;
Harchol, Yotam ;
Hay, David .
PROCEEDINGS OF THE 2016 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION (SIGCOMM '16), 2016, :511-524
[9]   Ethane: Taking control of the enterprise [J].
Casado, Martin ;
Freedman, Michael J. ;
Pettit, Justin ;
Luo, Jianying ;
McKeown, Nick ;
Shenker, Scott .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2007, 37 (04) :1-12
[10]  
Cha S, 2016, INT CONF CONTR AUTO, P1, DOI 10.1109/ICCAIS.2016.7822425