Study of security issues on SDN network architectures

With the steady increase in the size and complexity of computer networks it is necessary to move into more efficient solutions. Software Defined Network (SDN) technology is an approach for creating and managing networks, which enables the separation of the network's control plane from the da...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Σχοινάς, Κωνσταντίνος
Άλλοι συγγραφείς: Δενάζης, Σπυρίδων
Μορφή: Thesis
Γλώσσα:English
Έκδοση: 2019
Θέματα:
Διαθέσιμο Online:http://hdl.handle.net/10889/11885
Περιγραφή
Περίληψη:With the steady increase in the size and complexity of computer networks it is necessary to move into more efficient solutions. Software Defined Network (SDN) technology is an approach for creating and managing networks, which enables the separation of the network's control plane from the data plane. Network Function Virtualization (NFV) turns common network functions into virtualized network functions. This is achieved by splitting each functionality to a single item with minimum vital resources. Virtual networks require components that will cloak not only existing features like routing or switching but will also be able to scale for future problems. Both SDN and NFV are technologies that can work independently because they perform two separate tasks; however, they complement each other. In this paper, we focus on a virtual network function (VNF) that does deep packet inspection inside a virtual network. This VNF is a routing application that inspects packets during the handshake session that takes place in Transport Layer Security (TLS). Handshake Protocol is responsible for the authentication and key exchange necessary to establish or resume secure connections. The primary target of the VNF is to disallow users from entering forbidden websites. To achieve that the firewall parses the Client Hello message during the handshake, extracts the server name, checking it against a blacklist and it either grants or denies access to the user depending on the name. This VNF was developed with Data Plane Development Kit, a set of data plane libraries and network interface controller drivers for fast packet processing. This application was placed inside a virtual network as a virtual machine (VM) associated with two other VMs. These components were created in a Linux-host environment and were connected via a virtual switch, specifically Open vSwitch. Open vSwitch rules delineates packet flows specifically to go through the security routing application. As discussed above, this firewall either forwards or drops traffic determined by the situation. The remaining two VMs were a client that is trying to connect through OpenSSL to support secure socket layer and an apache2 server that acts as the banned site. So, this security block TLS application is obligated to check the transparency of the server when an applicant is requesting to establish a secure connection with it. This deployment presents one of the many use-cases of VNFs in the field of security and the scalability of an SDN network environment.