期刊文献+

Research and Practice of Dynamic Network Security Architecture for IaaS Platforms 被引量:6

Research and Practice of Dynamic Network Security Architecture for IaaS Platforms
原文传递
导出
摘要 Network security requirements based on virtual network technologies in laaS platforms and corresponding solutions were reviewed. A dynamic network security architecture was proposed, which was built on the technologies of software defined networking, Virtual Machine (VM) traffic redirection, network policy unified management, software defined isolation networks, vulnerability scanning, and software updates. The proposed architecture was able to obtain the capacity for detection and access control for VM traffic by redirecting it to configurable security appliances, and ensured the effectiveness of network policies in the total life cycle of the VM by configuring the policies to the right place at the appropriate time, according to the impacts of VM state transitions. The virtual isolation domains for tenants' VMs could be built flexibly based on VLAN policies or Netfilter/Iptables firewall appliances, and vulnerability scanning as a service and software update as a service were both provided as security supports. Through cooperation with IDS appliances and automatic alarm mechanisms, the proposed architecture could dynamically mitigate a wide range of network-based attacks. The experimental results demonstrate the effectiveness of the proposed architecture. Network security requirements based on virtual network technologies in laaS platforms and corresponding solutions were reviewed. A dynamic network security architecture was proposed, which was built on the technologies of software defined networking, Virtual Machine (VM) traffic redirection, network policy unified management, software defined isolation networks, vulnerability scanning, and software updates. The proposed architecture was able to obtain the capacity for detection and access control for VM traffic by redirecting it to configurable security appliances, and ensured the effectiveness of network policies in the total life cycle of the VM by configuring the policies to the right place at the appropriate time, according to the impacts of VM state transitions. The virtual isolation domains for tenants' VMs could be built flexibly based on VLAN policies or Netfilter/Iptables firewall appliances, and vulnerability scanning as a service and software update as a service were both provided as security supports. Through cooperation with IDS appliances and automatic alarm mechanisms, the proposed architecture could dynamically mitigate a wide range of network-based attacks. The experimental results demonstrate the effectiveness of the proposed architecture.
出处 《Tsinghua Science and Technology》 SCIE EI CAS 2014年第5期496-507,共12页 清华大学学报(自然科学版(英文版)
基金 supported by the National Natural Science Foundation of China (No. 61272447) the National Key Technology Research and Development Program of China (No. 2012BAH18B05) the National New Generation Broadband Wireless Mobile Communication Network Major Project (03 Project) of China (No. 12H1510)
关键词 cloud computing network security LAAS life cycle network policy cloud computing network security laaS life cycle network policy
  • 相关文献

参考文献1

二级参考文献15

  • 1Greenberg A, Hjalmtysson G, Maltz D A, et al. A clean slate 4D approach to network control and management[J]. ACM SIGCOMM Computer Communication Review, 2005, 35(5): 41-54.
  • 2Casado M, Freedman M J, Pettit J, et al. Ethane: taking control of the enterprise[C]//Proceedings of the 2007 Conference on Applications, Technologies, Architectures, and Pro- tocols for Computer Communications (SIGCOMM '07), Kyoto, 2007. New York, NY, USA: ACM, 2007: 1-12.
  • 3Mckeown N, Anderson T, Balakrishnan H, et al. OpenFlow: enabling innovation in campus networks[J]. ACM SIGCOMM Computer Communication Review, 2008, 38(2): 69-74.
  • 4Gude N, Koponen T, Pettit J, et al. NOX: towards an operating system for networks[J]. ACM SIGCOMM Computer Com- munication Review, 2008, 38(3): 105-110.
  • 5Erickson D. The Beacon openflow controller[C]//Proceedings of the 2nd ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN '13). New York, NY, USA: ACM, 2013: 13-18.
  • 6Tootoonchian A, Ganjali ~. HyperFlow: a distributed con- trol plane for OpenFlow[C]//Proceedings of the 2010 Inter- net Network Management Workshop/Workshop on Research on Enterprise Networking (1NM/WREN '10), San Jose, 2010. Berkeley, CA, USA: USENIX Association, 2010: 3.
  • 7Koponen T, Casado M, Gude N, et al. Onix: a distributed control platform for large-scale production networks[C]// Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI '10), Vancouver, 2010. Berkeley, CA, USA: USENIX Association, 2010: 1-6.
  • 8YeganehS H, Ganjali Y. Kandoo: a framework for efficient and scalable offloading of control applications[C]//Proceedings of the 1st Workshop on Hot Topics in Software Defined Networks (HotSDN '12), Helsinki, 2012. New York, NY, USA: ACM, 2012: 19-24.
  • 9Cai Zheng, Cox A L, Ng T S E. Maestro: a system for scal- able OpenFlow control, TR10-11 [R]. Department of Com- puter Science, Rice University, 2010.
  • 10YaZlCl V, Sunay M O, Ercan A 0. Controlling a software- defined network via distributed controllers[C]//Proceedings of the 2012 NEM Summit, Ozyegin University, [stanbul, Turkey, 2012: 16-20.

共引文献26

同被引文献30

引证文献6

二级引证文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部