firewall offloading based on sdn and nfv - tum info viii ...524_2016/itg522+524_2016... · firewall...

20
Chair of Communication Networks Department of Electrical and Computer Engineering Technical University of Munich ©2016 Technical University of Munich Firewall offloading based on SDN and NFV ITG 5.2.2/5.2.4 05.12.2016 Raphael Durner [email protected]

Upload: nguyendang

Post on 04-Jun-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

Chair of Communication NetworksDepartment of Electrical and Computer EngineeringTechnical University of Munich

©2016 Technical University of Munich

Firewall offloading based on SDN and NFVITG 5.2.2/5.2.4 05.12.2016

Raphael Durner

[email protected]

Introduction

Motivation

Main security requirements

Network Function Virtualization

State of the Art

SDN & NFV Architecture

Offloading Approach

ByteLim Logic

Conclusion and open Questions

2

Overview

Software Defined Networking:

Central control improves programmability and makes innovations easier

Network Function Virtualization:

Run Network Functions on Commodity Hardware and in the cloud

Reduce costs

Use available resources flexible

How can we guarantee a certain security level in these environments?

How can security related network functions be virtualized?

3

Motivation

Isolation of services

Authentication and Authorization of devices/users/services

Isolation of flows

Stateless firewalling

Stateful Firewalling

Check states of protocols

e.g. TCP, SIP

Normalization

e.g. filter non-standard DNS replys, filter html

4

Main Security Requirements

Stateless < Stateful < Application Layer

State of the Art Firewalls

5

• Firewall Resides on the Networks‘ Edge

• Control Plane (State) and Forwarding Plane not decoupled

External

NetworkClient

Internal

Network

6

SDN and NFV Network Security Architecture

External

Network

Client Client Client

SDN

SDN SDN

SDN

SDN

Private Cloud

Application 1

Application 2

VNF 1

VNF 2

No distinct edge of the network

Firewall has to filter „everywhere“

Higher Load on Firewalls

Potentially higher security

Combine NFV and SDN

Traffic steering with SDN

Some parts of the Network function with

SDN

Some parts offloaded to NE

- More Complex

+ leverages benefits of both approaches

Example TCP:

1. Connection Setup using VNF

2. Established connection using

Hardware

7

Offloading Approach

Client Client

SDN Controller

1.2.

Optimizer

CP

DP

vFirewall

DP

VNF

CP

Building Blocks

8

VNFOffloading

Logic

Data

Plane

• VNF signals connection state to Logic

• Logic decides for Offloading Flow

• Command to SDN Controller

• SDN Controller installs necessary rules in Hardware

SDN

Controller

Flow setup in switch

Can cause duplicates, packet loss and (short time) connection

interruption

Lack of Hardware

Current OpenFlow switches handle header rewrite in software – very low

throughput

Offloading Decision:

Flow classification algorithms needed

Which Flows can be offloaded and what are the gains?

9

Challenges

Which Flows can be offloaded and what are the gains?

What limits the usage of Offloading?

Flow capactiy in the hardware

Flow Setup Rate

Delay from decision to active Offloading

10

Challenges

VNF Logic Switch

t_v

t_p

t_v

Constraint: Delay in the complete system

t_p

t_p

t_v

Controller

TCP handshake

finished

Flow handeled in

Hardware

11

Total Delay

Building Blocks Realisation

12

VNF LogicData

Plane

SDN

Controller

IpTablesLogic

(Python)

OVS/

PICA/

NEC

Ryu SDN

Controller

Conntrack REST OpenFlow

Realisation

Total Delays

13

Results:

~ 100 ms for OVS & NEC

Implications:

Not feasible for short lived

flows like DNS

Delay > RTT

Effects on TCP algorithm

Effects of Logic on Performance

14

VNF LogicData

Plane

SDN

Controller

Oracle

Which Flow metrics must be estimated by the Oracle?

Gain i.e. cost of flow through VNF proportional to packet count

Offload Flows with many Packets

Bytelimit Logic

Logic decides based on Flowsize

Flows above a threshold are offloaded

Oracle predicts Flowsize based on used application

Mathematical Description:

𝒇 𝒙 : PDF of flow size

𝑥: Flow size

𝑃 𝑥 : PDF of Packets

𝑃 𝑥 = 𝑓 𝑥 ∗ x = න𝑓 𝑥 ∙ 𝑥 𝑑𝑥

𝑑𝑖𝑠𝑐𝑟𝑒𝑡𝑒P = F ∙ 𝑋

15

Bytelimit Logic

16

Example: Negative Exponentially distributed Flowsize

Share of Flows f(x) Share of Packets P(x)

𝑃 𝑥 = 𝑓 𝑥 ∗ x = න𝑓 𝑥 ∙ 𝑥 𝑑𝑥

𝑑𝑖𝑠𝑐𝑟𝑒𝑡𝑒P = F ∙ 𝑋

Bytelimit Logic

17

Simulation vs Theory

Trendline similar

Very big flows are hard to

simulate

Bytelimit Logic

18

Simulation vs Theory

Trendline similar

Offset between simulation

and theory

Very big flows are hard to

simulate

Conclusion and Open Questions

19

Basic building blocks for offloading developed

Bytlim logic shows promising results

Difference between simulation and theory should be evaluated

Open:

How to predict Bytesize?

Simple classification by {source IP, Port}

Questions?