4 research outputs found

    Security as a Service for Hybrid Clouds

    Get PDF
    Virtualization has increased amongst the IT service providers as a method for achieving more efficient server usage. This has led to the concept of cloud services, offered by large data centers with the help of virtualization techniques. Cloud service is an abstract service, which provides IT services as self-service for the end user. For example these services can provide virtual servers as on-demand. Virtual servers in the cloud are usually reachable from the Internet, so their protection is necessary. This master's thesis discusses firewalling virtual machines inside the cloud, together with virtual firewall distributions and their features. Cloud services are usually self-services and thus their cloud environment and firewall are managed centrally. Automated firewall provisioning and management for a cloud service is described. Main goal for the master's thesis was to find a feasible centrally managed security system. Vyatta was used as a virtual firewall software and the test environment was built on top of the Openstack cloud. Vyatta included firewall, VPN and routing features suitable for enterprise usage. The deployed virtual firewall performed well in the test environment with the necessary features and also the central management worked without problems. The central management system was feasible and reusable with other projects. Also the automatic deployment of Openstack cloud was a feasible choice. However, using Vyatta requires a lot of changes at least to the Openstack cloud platform, and hence the network setup and management is difficult. There are on-going efforts to virtualize networking devices in the data center as well. This will allow the whole service platform to be centrally managed using a single interface. Thus all changes to the network and new virtual service requests can be executed as the customer demands them. Software Defined Networking (SDN) and Network Fuctions Virtualization (NFV) both drive the systems to more virtualized and centrally managed environments, thus providing an important research topic in this field

    On the Edge of Secure Connectivity via Software-Defined Networking

    Get PDF
    Securing communication in computer networks has been an essential feature ever since the Internet, as we know it today, was started. One of the best known and most common methods for secure communication is to use a Virtual Private Network (VPN) solution, mainly operating with an IP security (IPsec) protocol suite originally published in 1995 (RFC1825). It is clear that the Internet, and networks in general, have changed dramatically since then. In particular, the onset of the Cloud and the Internet-of-Things (IoT) have placed new demands on secure networking. Even though the IPsec suite has been updated over the years, it is starting to reach the limits of its capabilities in its present form. Recent advances in networking have thrown up Software-Defined Networking (SDN), which decouples the control and data planes, and thus centralizes the network control. SDN provides arbitrary network topologies and elastic packet forwarding that have enabled useful innovations at the network level. This thesis studies SDN-powered VPN networking and explains the benefits of this combination. Even though the main context is the Cloud, the approaches described here are also valid for non-Cloud operation and are thus suitable for a variety of other use cases for both SMEs and large corporations. In addition to IPsec, open source TLS-based VPN (e.g. OpenVPN) solutions are often used to establish secure tunnels. Research shows that a full-mesh VPN network between multiple sites can be provided using OpenVPN and it can be utilized by SDN to create a seamless, resilient layer-2 overlay for multiple purposes, including the Cloud. However, such a VPN tunnel suffers from resiliency problems and cannot meet the increasing availability requirements. The network setup proposed here is similar to Software-Defined WAN (SD-WAN) solutions and is extremely useful for applications with strict requirements for resiliency and security, even if best-effort ISP is used. IPsec is still preferred over OpenVPN for some use cases, especially by smaller enterprises. Therefore, this research also examines the possibilities for high availability, load balancing, and faster operational speeds for IPsec. We present a novel approach involving the separation of the Internet Key Exchange (IKE) and the Encapsulation Security Payload (ESP) in SDN fashion to operate from separate devices. This allows central management for the IKE while several separate ESP devices can concentrate on the heavy processing. Initially, our research relied on software solutions for ESP processing. Despite the ingenuity of the architectural concept, and although it provided high availability and good load balancing, there was no anti-replay protection. Since anti-replay protection is vital for secure communication, another approach was required. It thus became clear that the ideal solution for such large IPsec tunneling would be to have a pool of fast ESP devices, but to confine the IKE operation to a single centralized device. This would obviate the need for load balancing but still allow high availability via the device pool. The focus of this research thus turned to the study of pure hardware solutions on an FPGA, and their feasibility and production readiness for application in the Cloud context. Our research shows that FPGA works fluently in an SDN network as a standalone IPsec accelerator for ESP packets. The proposed architecture has 10 Gbps throughput, yet the latency is less than 10 µs, meaning that this architecture is especially efficient for data center use and offers increased performance and latency requirements. The high demands of the network packet processing can be met using several different approaches, so this approach is not just limited to the topics presented in this thesis. Global network traffic is growing all the time, so the development of more efficient methods and devices is inevitable. The increasing number of IoT devices will result in a lot of network traffic utilising the Cloud infrastructures in the near future. Based on the latest research, once SDN and hardware acceleration have become fully integrated into the Cloud, the future for secure networking looks promising. SDN technology will open up a wide range of new possibilities for data forwarding, while hardware acceleration will satisfy the increased performance requirements. Although it still remains to be seen whether SDN can answer all the requirements for performance, high availability and resiliency, this thesis shows that it is a very competent technology, even though we have explored only a minor fraction of its capabilities

    On the Edge of Secure Connectivity via Software-Defined Networking

    Get PDF
    Securing communication in computer networks has been an essential feature ever since the Internet, as we know it today, was started. One of the best known and most common methods for secure communication is to use a Virtual Private Network (VPN) solution, mainly operating with an IP security (IPsec) protocol suite originally published in 1995 (RFC1825). It is clear that the Internet, and networks in general, have changed dramatically since then. In particular, the onset of the Cloud and the Internet-of-Things (IoT) have placed new demands on secure networking. Even though the IPsec suite has been updated over the years, it is starting to reach the limits of its capabilities in its present form. Recent advances in networking have thrown up Software-Defined Networking (SDN), which decouples the control and data planes, and thus centralizes the network control. SDN provides arbitrary network topologies and elastic packet forwarding that have enabled useful innovations at the network level. This thesis studies SDN-powered VPN networking and explains the benefits of this combination. Even though the main context is the Cloud, the approaches described here are also valid for non-Cloud operation and are thus suitable for a variety of other use cases for both SMEs and large corporations. In addition to IPsec, open source TLS-based VPN (e.g. OpenVPN) solutions are often used to establish secure tunnels. Research shows that a full-mesh VPN network between multiple sites can be provided using OpenVPN and it can be utilized by SDN to create a seamless, resilient layer-2 overlay for multiple purposes, including the Cloud. However, such a VPN tunnel suffers from resiliency problems and cannot meet the increasing availability requirements. The network setup proposed here is similar to Software-Defined WAN (SD-WAN) solutions and is extremely useful for applications with strict requirements for resiliency and security, even if best-effort ISP is used. IPsec is still preferred over OpenVPN for some use cases, especially by smaller enterprises. Therefore, this research also examines the possibilities for high availability, load balancing, and faster operational speeds for IPsec. We present a novel approach involving the separation of the Internet Key Exchange (IKE) and the Encapsulation Security Payload (ESP) in SDN fashion to operate from separate devices. This allows central management for the IKE while several separate ESP devices can concentrate on the heavy processing. Initially, our research relied on software solutions for ESP processing. Despite the ingenuity of the architectural concept, and although it provided high availability and good load balancing, there was no anti-replay protection. Since anti-replay protection is vital for secure communication, another approach was required. It thus became clear that the ideal solution for such large IPsec tunneling would be to have a pool of fast ESP devices, but to confine the IKE operation to a single centralized device. This would obviate the need for load balancing but still allow high availability via the device pool. The focus of this research thus turned to the study of pure hardware solutions on an FPGA, and their feasibility and production readiness for application in the Cloud context. Our research shows that FPGA works fluently in an SDN network as a standalone IPsec accelerator for ESP packets. The proposed architecture has 10 Gbps throughput, yet the latency is less than 10 µs, meaning that this architecture is especially efficient for data center use and offers increased performance and latency requirements. The high demands of the network packet processing can be met using several different approaches, so this approach is not just limited to the topics presented in this thesis. Global network traffic is growing all the time, so the development of more efficient methods and devices is inevitable. The increasing number of IoT devices will result in a lot of network traffic utilising the Cloud infrastructures in the near future. Based on the latest research, once SDN and hardware acceleration have become fully integrated into the Cloud, the future for secure networking looks promising. SDN technology will open up a wide range of new possibilities for data forwarding, while hardware acceleration will satisfy the increased performance requirements. Although it still remains to be seen whether SDN can answer all the requirements for performance, high availability and resiliency, this thesis shows that it is a very competent technology, even though we have explored only a minor fraction of its capabilities

    Security as a Service for Hybrid Clouds

    Get PDF
    Virtualization has increased amongst the IT service providers as a method for achieving more efficient server usage. This has led to the concept of cloud services, offered by large data centers with the help of virtualization techniques. Cloud service is an abstract service, which provides IT services as self-service for the end user. For example these services can provide virtual servers as on-demand. Virtual servers in the cloud are usually reachable from the Internet, so their protection is necessary. This master's thesis discusses firewalling virtual machines inside the cloud, together with virtual firewall distributions and their features. Cloud services are usually self-services and thus their cloud environment and firewall are managed centrally. Automated firewall provisioning and management for a cloud service is described. Main goal for the master's thesis was to find a feasible centrally managed security system. Vyatta was used as a virtual firewall software and the test environment was built on top of the Openstack cloud. Vyatta included firewall, VPN and routing features suitable for enterprise usage. The deployed virtual firewall performed well in the test environment with the necessary features and also the central management worked without problems. The central management system was feasible and reusable with other projects. Also the automatic deployment of Openstack cloud was a feasible choice. However, using Vyatta requires a lot of changes at least to the Openstack cloud platform, and hence the network setup and management is difficult. There are on-going efforts to virtualize networking devices in the data center as well. This will allow the whole service platform to be centrally managed using a single interface. Thus all changes to the network and new virtual service requests can be executed as the customer demands them. Software Defined Networking (SDN) and Network Fuctions Virtualization (NFV) both drive the systems to more virtualized and centrally managed environments, thus providing an important research topic in this field
    corecore