Initial Security Orchestrator Report

Initial Security Orchestrator Report

D3.2 Initial Security Orchestrator Report This deliverable presents the first results of the ANASTACIA Task 3.2 which aims to provide efficient orchestration of the SDN, NFV and IoT domains in order to enforce the security policies. Distribution level PU Contractual date 30.06.2018 [M18] Delivery date 02.07.2018 [M19] WP / Task WP3 / T3.2 WP Leader AALTO Authors T. Taleb, Y. Khettab, A. Laghrissi (AALTO), D. Rivera (MONT), R.Marín Pérez (ODINS), J. Bernal, A. Molina (UMU), D.Belabed (THALES), A.Mady, P.Sobonski, D. Mehta (UTRC), EC Project Officer Carmen Ifrim [email protected] Project Coordinator SoftecoSismatSpA Stefano Bianchi Via De Marini 1, 16149 Genova – Italy +39 0106026368 [email protected] Project website www.anastacia-h2020.eu ANASTACIA has received funding from the European Union’s Horizon 2020 research and innovation programmeunder Grant Agreement N° 731558 and from the Swiss State Secretariat for Education, Research and Innovation. This document only reflects the ANASTACIA Consortium’s view. The European Commission is not responsible for any use that may be made of the information it contains. Table of contents PUBLIC SUMMARY ............................................................................................................................................. 3 1 Introduction ............................................................................................................................................... 4 1.1 Aims of the document ....................................................................................................................... 4 1.2 Applicable and reference documents ............................................................................................... 4 1.3 Revision History ................................................................................................................................. 5 1.4 Acronyms and Definitions ................................................................................................................. 5 2 Refinement of security policies for enforcement ...................................................................................... 6 2.1 Interactions with Policy Interpreter for refining security policies ..................................................... 6 2.1.1 Proactive approach .................................................................................................................... 6 2.1.2 Reactive approach ............................................................................................................................ 7 2.2 Interactions with Security Enabler Provider for selecting the appropriate security enablers .......... 8 2.3 Security Resource Planning module .................................................................................................. 9 2.4 Interactions with the Monitoring agents .......................................................................................... 9 2.4.1 MMT-Probe Monitoring Agent ......................................................................................................... 9 3 Orchestration of security enablers and relevant controls....................................................................... 12 3.1 SDN networking ............................................................................................................................... 12 3.2 Virtual Network Functions ............................................................................................................... 14 3.3 IoT security controls ........................................................................................................................ 14 3.4 Security Orchestrator System Model .............................................................................................. 16 3.5 Orchestration Strategies .................................................................................................................. 18 3.5.1 Orchestration Tools ................................................................................................................. 18 3.5.2 Sample Orchestration Scenario ...................................................................................................... 19 3.6 REST APIs and Basic Mechanisms .................................................................................................... 21 4 Use cases description for the Security Orchestrator ............................................................................... 23 4.1 BMS.2: Insider attack on the fire suppression system .................................................................... 23 4.2 MEC.3: DoS/DDoS attacks using smart cameras and IoT devices ................................................... 24 4.3 BMS.3: Remote attack on the building energy microgrid .............................................................. 25 4.4 BMS.4: Cascade attack on a megatall building ................................................................................ 27 5 Implementation of the Security Orchestrator ......................................................................................... 28 5.1 Security Orchestrator Code Base ..................................................................................................... 28 5.2 Open Source Mano .......................................................................................................................... 29 5.3 ONOS SDN Controller ...................................................................................................................... 29 5.4 IoT Controller ................................................................................................................................... 30 Page 1 of 34 6 Conclusions .............................................................................................................................................. 32 7 References ............................................................................................................................................... 33 Index of figures Figure 1 Main interactions between the Policy Interpreter and the Security Orchestrator in proactive approach ............................................................................................................................................................ 6 Figure 2 main interactions between the Policy Interpreter and the Security Orchestrator in reactive approach ............................................................................................................................................................ 7 Figure 3Security Enablers Provider Interactions ............................................................................................... 8 Figure 4 MMT-Probe General Pipeline ............................................................................................................ 10 Figure 5 SDN Networking Architecture & Management ................................................................................. 13 Figure 6 Different planes and APIs contemplated for the IoT controller architecture ................................... 15 Figure 7 System Model Data Structure ........................................................................................................... 16 Figure 8 Security Orchestrator architecture .................................................................................................... 19 Figure 9 Sequence diagram for Security orchestration (processing and enforcement) ................................. 20 Figure 10 Sequence diagram for use case BMS.2 ............................................................................................ 24 Figure 11 Sequence diagram for MEC.3 use case interactions with Security Orchestrator ............................ 24 Figure 12 Sequence diagram for the BMS.3 use case ..................................................................................... 26 Figure 13 Sequence diagram for the BMS.4 use case ..................................................................................... 27 Figure 14 Structure of the Security Orchestrator Code Base .......................................................................... 28 Figure 15Overview of Open Source Mano components ................................................................................. 29 Figure 16 SDN Topology View ......................................................................................................................... 30 Figure 17 IoT controller implementation elements ........................................................................................ 30 Figure 18 Northbound API JSON input example ............................................................................................. 31 Page 2 of 34 PUBLIC SUMMARY This deliverable presents the first results of the ANASTACIA Task 3.2 which aims to provide efficient orchestration of the SDN, NFV and IoT domains in order to enforce the security policies. It plays a major role in the ANASTACIA architecture accounting for it interactions with other components of the framework [1]. IoT devices are prone to various security attacks varying from Denial of Service (DoS) to Man-in- the-Middle attacks which are hindering their wide adoption. In this vein, SDN and NFV represent key technologies towards a novel concept of on-demand security countermeasures provisioning based on programmability and advanced virtualization technologies.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    34 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us