sdn--based security services using i2nsfbased security

15
SDN SDN SDN SDN SDN SDN SDN SDN- - - - -based Security Services using I2NSF based Security Services using I2NSF based Security Services using I2NSF based Security Services using I2NSF based Security Services using I2NSF based Security Services using I2NSF based Security Services using I2NSF based Security Services using I2NSF (draft (draft (draft (draft (draft (draft (draft (draft- - - - -jeong jeong jeong jeong jeong jeong jeong jeong- - - - -i2nsf i2nsf i2nsf i2nsf i2nsf i2nsf i2nsf i2nsf- - - - -sdn sdn sdn sdn sdn sdn sdn sdn- - - - -security security security security security security security security- - - - -services services services services services services services services- - - - -03) 03) 03) 03) 03) 03) 03) 03) http://datatracker.ietf.org/doc/draft http://datatracker.ietf.org/doc/draft http://datatracker.ietf.org/doc/draft http://datatracker.ietf.org/doc/draft- - -jeong jeong jeong jeong- - -i2nsf i2nsf i2nsf i2nsf- - -sdn sdn sdn sdn- - -security security security security- - -services/ services/ services/ services/ Jaehoon (Paul) Jeong [email protected]

Upload: others

Post on 23-Dec-2021

2 views

Category:

Documents


0 download

TRANSCRIPT

SDNSDNSDNSDNSDNSDNSDNSDN--------based Security Services using I2NSFbased Security Services using I2NSFbased Security Services using I2NSFbased Security Services using I2NSFbased Security Services using I2NSFbased Security Services using I2NSFbased Security Services using I2NSFbased Security Services using I2NSF(draft(draft(draft(draft(draft(draft(draft(draft--------jeongjeongjeongjeongjeongjeongjeongjeong--------i2nsfi2nsfi2nsfi2nsfi2nsfi2nsfi2nsfi2nsf--------sdnsdnsdnsdnsdnsdnsdnsdn--------securitysecuritysecuritysecuritysecuritysecuritysecuritysecurity--------servicesservicesservicesservicesservicesservicesservicesservices--------03)03)03)03)03)03)03)03)

http://datatracker.ietf.org/doc/drafthttp://datatracker.ietf.org/doc/drafthttp://datatracker.ietf.org/doc/drafthttp://datatracker.ietf.org/doc/draft----jeongjeongjeongjeong----i2nsfi2nsfi2nsfi2nsf----sdnsdnsdnsdn----securitysecuritysecuritysecurity----services/services/services/services/

Jaehoon (Paul) [email protected]

Architecture for SDN-based Security Services

Next Steps

IIII

IIIIIIII

IIIIIIIIIIII

2

Architecture (1/2)Architecture (1/2)Architecture (1/2)Architecture (1/2)Architecture (1/2)Architecture (1/2)Architecture (1/2)Architecture (1/2)

� High-level Architecture for SDN-based Security Services

• An administrator enforces security policies for the security services.

• Access control rules are applied to

Security Functions(Firewall, Web Filter,

DDoS-Attack Mitigator, DPI)

Application Support

Orchestration

Application Layer

(Application-Control Interface)

SDN Controller • Access control rules are applied to network by SDN controller.

• Network resources (e.g., switches) act to mitigate network attacks.� e.g., dropping packets for

security policies or suspicious patterns

Orchestration

Abstraction

Control Support

Data Transport and Processing

SDN Controller Layer

(Resource-Control Interface)

ResourceLayer

4

ArchitectureArchitectureArchitectureArchitectureArchitectureArchitectureArchitectureArchitecture (2/2(2/2(2/2(2/2(2/2(2/2(2/2(2/2))))))))

Client/AppGW

Security Controller

1. Service Layer Interface

Vendor SystemVendor Facing Interface

2. Capability Layer Interface

A framework to support SDN-based security services using I2NSF

1. Client/AppGW asks for securityservices with high-level security policies toSecurity Controller via Service LayerInterface.

2. Security Controller calls function-level

Security Function 1

3. Northbound Interface

4. Southbound Interface

Security Function n

Switch n

Security Function 2

Switch 2

2. Capability Layer Interface2. Security Controller calls function-levelsecurity services via Capability LayerInterface.

3. Security Function tells SwitchController its required security services viaNorthbound Interface.

4. Switch Controller sets up forwardingrules for the security services on Switchesvia Southbound Interface.

Switch Controller

Switch 1

5

Web FilterFirewall

Switch Controller

App Gateway

1. Service Layer Interface(e.g., RESTCONF, SUPA)

Security Controller

2. Capability Layer Interface(e.g., NETCONF/YANG)

3. Northbound Interface(e.g., NETCONF/YANG)

SecurityFunction

ClientsClientsClients

Procedure of SDN-based Security Services

Switch Controller

Switch2

Switch3

Switch1

Install new rules(e.g., drop packets with

security policy)Incoming packets

Outgoing packets

Valid packets

Invalid packets

4. Southbound Interface(e.g., NETCONF/YANG, I2RS)

5. Traffic Generation

6. Packet Filtering

7. Filtered Packets6

Firewall

Switch Controller

DDoS-Attack Mitigator

Security Functions

2

3

4

Web Filter, DPI, etc.

Use Cases of SDN-based Security Services

Switch Controller

Switch2

Switch3

Switch1

Incoming packets Filtered packets

1 5

6

7

Procedure for SDNProcedure for SDNProcedure for SDNProcedure for SDN----based Firewall Filteringbased Firewall Filteringbased Firewall Filteringbased Firewall FilteringClient Server

Hello

Hello

Edit-config for filtering with “IP address” (RPC)

Edit-config (RPC-reply)

Attacker

(1)

(2)

(4)

(3)

SDN

1. Client and Server make a session by using NETCONF/YANG.

2. Client configures the firewall table of Server to block specific IP addresses.

3. Server (as Security Function in virtual machine) asks firewall filtering to be set up in Switches through Switch Controller.

4. After the configuration of the firewall table, packets from Attacker are dropped.

SDN Network

9

YANG Data Modeling for IP Address FilteringYANG Data Modeling for IP Address FilteringYANG Data Modeling for IP Address FilteringYANG Data Modeling for IP Address FilteringYANG Data Modeling for IP Address FilteringYANG Data Modeling for IP Address FilteringYANG Data Modeling for IP Address FilteringYANG Data Modeling for IP Address Filtering

IP Address IP Address Filtering

10

NETCONF Command for IP Address Filtering (1/4)NETCONF Command for IP Address Filtering (1/4)NETCONF Command for IP Address Filtering (1/4)NETCONF Command for IP Address Filtering (1/4)NETCONF Command for IP Address Filtering (1/4)NETCONF Command for IP Address Filtering (1/4)NETCONF Command for IP Address Filtering (1/4)NETCONF Command for IP Address Filtering (1/4)

IP Address IP Address Filtering

For Malicious Node 1

11

IP Address

NETCONF Command for IP Address Filtering (2/4)NETCONF Command for IP Address Filtering (2/4)NETCONF Command for IP Address Filtering (2/4)NETCONF Command for IP Address Filtering (2/4)NETCONF Command for IP Address Filtering (2/4)NETCONF Command for IP Address Filtering (2/4)NETCONF Command for IP Address Filtering (2/4)NETCONF Command for IP Address Filtering (2/4)

IP Address Filtering

For Malicious Node 2

12

NETCONF Command for IP Address Filtering (3/4)NETCONF Command for IP Address Filtering (3/4)NETCONF Command for IP Address Filtering (3/4)NETCONF Command for IP Address Filtering (3/4)NETCONF Command for IP Address Filtering (3/4)NETCONF Command for IP Address Filtering (3/4)NETCONF Command for IP Address Filtering (3/4)NETCONF Command for IP Address Filtering (3/4)

NETCONF Command

IP Addresses for Filtering

13

NETCONF Command for IP Address Filtering (4/4)NETCONF Command for IP Address Filtering (4/4)NETCONF Command for IP Address Filtering (4/4)NETCONF Command for IP Address Filtering (4/4)NETCONF Command for IP Address Filtering (4/4)NETCONF Command for IP Address Filtering (4/4)NETCONF Command for IP Address Filtering (4/4)NETCONF Command for IP Address Filtering (4/4)

Drop Rules for Firewall

14

Next StepsNext StepsNext StepsNext Steps• We will design and implement our Framework of

SDN-based Security Services using I2NSF:– Service Layer Interface

• Use SUPA WG’s Policy Abstractionand RESTCONF

– Capability Layer Interface• Use draft -xia-i2nsf-capability-interface-im-04• Use draft -xia-i2nsf-capability-interface-im-04

– Northbound Interface• Use NETCONF/YANG and OpenDayLight

– Southbound Interface• Use NETCONF/YANG and SFC WG’s Service Chaining• Construct SDN Network using Mininet

15