skip to main content
10.1145/3230833.3232853acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

Security Wrapper Orchestration in Cloud

Published:27 August 2018Publication History

ABSTRACT

We present an architecture and implementation of the security wrapper concept for the protection of virtualized network functions in a cloud environment. The security wrapper is the enclosing of a set of virtualized resources within a data plane transparent protective envelope in the network forwarding graph. The extent and capabilities of this envelope are dynamic. We present a prototype implementation of the security wrapper and analyze its behaviour in different operation scenarios. Measurements of the wrapper orchestration delays, resource overhead and data plane traffic impact indicate that the proposed mechanism can be deployed in virtualized networks with little overhead while remaining relatively transparent to the traffic traversing the security wrapper boundary.

References

  1. iPerf. https://iperf.fr/. Accessed: 2018-02-01.Google ScholarGoogle Scholar
  2. Linux Foundation, Open vSwitch. http://openvswitch.org/. Accessed: 2018-02-01.Google ScholarGoogle Scholar
  3. MongoDB. www.mongodb.com. Accessed: 2018-02-01.Google ScholarGoogle Scholar
  4. Neutron Firewall as a Service. https://github.com/openstack/neutron-fwaas. Accessed: 2018-02-01.Google ScholarGoogle Scholar
  5. OpenStackNeutron. http://specs.openstack.org/openstack/neutron-specs/. Accessed: 2018-02-01.Google ScholarGoogle Scholar
  6. OpenStack Project. http://www.openstack.org. Accessed: 2018-02-01.Google ScholarGoogle Scholar
  7. sFlow. http://www.sflow.org/. Accessed: 2018-02-01.Google ScholarGoogle Scholar
  8. B. Addis, D. Belabed, M. Bouet, and S. Secci. Virtual network functions placement and routing optimization. In 2015 IEEE 4th International Conference on Cloud Networking (CloudNet), pages 171--177, Oct 2015.Google ScholarGoogle ScholarCross RefCross Ref
  9. Benoit Claise. Cisco Systems NetFlow Services Export Version 9. RFC 3954, October 2015.Google ScholarGoogle Scholar
  10. Network Functions Virtualisation ETSI Industry Specification Group. ETSI GS NFV-MAN 001 V1.1.1. Group Specification, December 2014.Google ScholarGoogle Scholar
  11. Evangelos Haleplidis, Jamal Hadi Salim, Spyros Denazis, and Odysseas Koufopavlou. Towards a Network Abstraction Model for SDN. Journal of Network and Systems Management, 23(2):309--327, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Joel M. Halpern and Carlos Pignataro. Service Function Chaining (SFC) Architecture. RFC 7665, October 2015.Google ScholarGoogle Scholar
  13. B. Jaeger. Security Orchestrator: Introducing a Security Orchestrator in the Context of the ETSI NFV Reference Architecture. In 2015 IEEE Trustcom/BigDataSE/ISPA, volume 1, pages 1255--1260, Aug 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Kalliola, K. Lee, H. Lee, and T. Aura. Flooding DDoS mitigation and traffic management with software defined networking. In Cloud Networking (CloudNet), 2015 IEEE 4th International Conference on, pages 248--254, Oct 2015.Google ScholarGoogle ScholarCross RefCross Ref
  15. István Pelle, Tamás Lévai, Felicián Németh, and András Gulyás. One Tool to Rule Them All: A Modular Troubleshooting Framework for SDN (and Other) Networks. In Proceedings of the 1st ACM SIGCOMM Symposium on Software Defined Networking Research, SOSR '15. ACM, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. M. Yoshida, W. Shen, T. Kawabata, K. Minato, and W. Imajuku. MORSA: A multi-objective resource scheduling algorithm for NFV infrastructure. In The 16th Asia-Pacific Network Operations and Management Symposium, Sept 2014.Google ScholarGoogle ScholarCross RefCross Ref
  17. F. Z. Yousaf and T. Taleb. Fine-grained resource-aware virtual network function management for 5G carrier cloud. IEEE Network, 30(2):110--115, March 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ARES '18: Proceedings of the 13th International Conference on Availability, Reliability and Security
    August 2018
    603 pages
    ISBN:9781450364485
    DOI:10.1145/3230833

    Copyright © 2018 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 27 August 2018

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    ARES '18 Paper Acceptance Rate128of260submissions,49%Overall Acceptance Rate228of451submissions,51%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader