skip to main content
research-article

SIMPLE-fying middlebox policy enforcement using SDN

Authors Info & Claims
Published:27 August 2013Publication History
Skip Abstract Section

Abstract

Networks today rely on middleboxes to provide critical performance, security, and policy compliance capabilities. Achieving these benefits and ensuring that the traffic is directed through the desired sequence of middleboxes requires significant manual effort and operator expertise. In this respect, Software-Defined Networking (SDN) offers a promising alternative. Middleboxes, however, introduce new aspects (e.g., policy composition, resource management, packet modifications) that fall outside the purvey of traditional L2/L3 functions that SDN supports (e.g., access control or routing).

This paper presents SIMPLE, a SDN-based policy enforcement layer for efficient middlebox-specific "traffic steering''. In designing SIMPLE, we take an explicit stance to work within the constraints of legacy middleboxes and existing SDN interfaces. To this end, we address algorithmic and system design challenges to demonstrate the feasibility of using SDN to simplify middlebox traffic steering. In doing so, we also take a significant step toward addressing industry concerns surrounding the ability of SDN to integrate with existing infrastructure and support L4-L7 capabilities.

References

  1. Mininet. http://yuba.stanford.edu/foswiki/bin/view/OpenFlow/Mininet.Google ScholarGoogle Scholar
  2. NEC's Simple Middlebox Configuration (SIMCO) Protocol. RFC 4540.Google ScholarGoogle Scholar
  3. Open vSwitch. http://openvswitch.org/.Google ScholarGoogle Scholar
  4. Palo Alto Networks. http://www.paloaltonetworks.com/.Google ScholarGoogle Scholar
  5. POX Controller. http://www.noxrepo.org/pox/about-pox/.Google ScholarGoogle Scholar
  6. Top million US websites. http://ak.quantcast.com/quantcast-top-million.zip.Google ScholarGoogle Scholar
  7. World Enterprise Network Security Markets. http://www.abiresearch.com/research/product/1006059-world-enterprise-network-and-data-security/.Google ScholarGoogle Scholar
  8. A. Anand et al. Packet Caches on Routers: The Implications of Universal Redundant Traffic Elimination. In Proc.\ SIGCOMM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. W. Anderson, R. Braud, R. Kapoor, G. Porter, and A. Vahdat. xOMB: Extensible Open Middleboxes with Commodity Servers. In Proc.\ ANCS, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. T. Benson, A. Akella, A. Shaikh, and S. Sahu. CloudNaaS: A Cloud Networking Platform for Enterprise Applications. In Proc.\ SOCC, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. T. Benson, A. Anand, A. Akella, and M. Zhang. The Case for Fine-Grained Traffic Engineering in Data Centers. In Proc.\ INM/WREN, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. Casado et al. Ethane: Taking Control of the Enterprise. In Proc.\ SIGCOMM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. T. Cormen, C. Leiserson, R. Rivest, and C. Stein. The Rabin--Karp algorithm. Introduction to Algorithms, 2001.Google ScholarGoogle Scholar
  14. A. R. Curtis et al. DevoFlow: Scaling Flow Management for High-Performance Networks. In Proc.\ SIGCOMM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. M. Dobrescu et al. RouteBricks: Exploiting Parallelism to Scale Software Routers. In Proc.\ SOSP, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. S. Fayazbakhsh, V. Sekar, M. Yu, and J. Mogul. FlowTags: Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions. In Proc.\ HotSDN, 2013 (to appear). Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. A. Feldmann et al. Deriving Traffic Demands for Operational IP Networks: Methodology and Experience. In Proc.\ SIGCOMM, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. A. Gember, P. Prabhu, Z. Ghadiyali, and A. Akella. Toward Software-Defined Middlebox Networking. In Proc.\ HotNets-XI, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. G. Gibb, H. Zeng, and N. McKeown. Outsourcing Network Functionality. In Proc.\ HotSDN, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. P. Gill et al. Understanding Network Failures in Data Centers: Measurement, Analysis, and Implications. In Proc.\ SIGCOMM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. A. Greenlagh et al. Flow Processing and the Rise of Commodity Network Hardware. In CCR, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. N. Gude et al. NOX: Towards an Operating System for Networks. In CCR, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. V. Heorhiadi, M. K. Reiter, and V. Sekar. New Opportunities for Load Balancing in Network-Wide Intrusion Detection Systems. In Proc.\ CoNEXT, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. X. Jin, L. E. Li, L. Vanbever, and J. Rexford. SoftCell: Taking Control of Cellular Core Networks. In TR-950--13, Princeton University, 2013.Google ScholarGoogle Scholar
  25. D. Joseph and I. Stoica. Modeling middleboxes. IEEE Network, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. D. A. Joseph, A. Tavakoli, and I. Stoica. A Policy-aware Switching Layer for Data Centers. In Proc.\ SIGCOMM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. P. Kazemian, G. Varghese, and N. McKeown. Header Space Analysis: Static Checking for Networks. In Proc.\ NSDI, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek. The Click Modular Router. ACM TOS, Aug 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. T. Koponen et al. Onix: A Distributed Control Platform for Large-scale Production Network. In Proc.\ OSDI, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. L. E. Li et al. PACE: Policy-Aware Application Cloud Embedding. In Proc.\ INFOCOM, 2013.Google ScholarGoogle Scholar
  31. C. Monsanto, J. Reich, N. Foster, J. Rexford, and D. Walker. Composing Software Defined Networks. In Proc.\ NSDI, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. M. Moshref, M. Yu, A. Sharma, and R. Govindan. vCRIB: Virtualized Rule Management in the Cloud. In Proc.\ NSDI, 2013.Google ScholarGoogle Scholar
  33. V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. In Computer Networks, pages 2435--2463, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. H. Pucha, D. G. Andersen, and M. Kaminsky. Exploiting Similarity for Multi-Source Downloads using File Handprints. In Proc.\ NSDI, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. S. Raza et al. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring. In Proc.\ INFOCOM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. C. Rotsos, N. Sarrar, S. Uhlig, R. Sherwood, and A. Moore. OFLOPS: An Open Framework for Openflow Switch Evaluation. In Proc.\ PAM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. V. Sekar et al. The middlebox manifesto: enabling innovation in middlebox deployment. In Proc.\ HotNets, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. V. Sekar et al. Design and Implementation of a Consolidated Middlebox Architecture. In Proc.\ NSDI, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. J. Sherry et al. Making Middleboxes Someone Else's Problem: Network Processing as a Cloud Service. In Proc.\ SIGCOMM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. N. Spring, R. Mahajan, and D. Wetherall. Measuring ISP Topologies with Rocketfuel. In Proc.\ SIGCOMM, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. M. Stiemerling, J. Quittek, and T. Taylor. Middlebox communication (MIDCOM) protocol semantics. RFC 5189.Google ScholarGoogle Scholar
  42. R. Wang, D. Butnariu, and J. Rexford. Openflow-Based Server Load Balancing Gone Wild. In Proc.\ Hot-ICE, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Z. Wang, Z. Qian, Q. Xu, Z. Mao, and M. Zhang. An Untold Story of Middleboxes in Cellular Networks. In Proc.\ SIGCOMM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. B. White et al. An Integrated Experimental Environment for Distributed Systems and Networks. In Proc. of OSDI, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. M. Yu, J. Rexford, M. J. Freedman, and J. Wang. Scalable Flow-Based Networking with DIFANE. In Proc.\ SIGCOMM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Y. Zhang and V. Paxson. Detecting Stepping Stones. In Proc.\ USENIX Security Symposium, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. SIMPLE-fying middlebox policy enforcement using SDN

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM SIGCOMM Computer Communication Review
        ACM SIGCOMM Computer Communication Review  Volume 43, Issue 4
        October 2013
        595 pages
        ISSN:0146-4833
        DOI:10.1145/2534169
        Issue’s Table of Contents
        • cover image ACM Conferences
          SIGCOMM '13: Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
          August 2013
          580 pages
          ISBN:9781450320566
          DOI:10.1145/2486001

        Copyright © 2013 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 27 August 2013

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader