Making Middleboxes Someone Else's Problem: Network Processing As a Cloud Service

Making Middleboxes Someone Else's Problem: Network Processing As a Cloud Service

Making Middleboxes Someone Else’s Problem: Network Processing as a Cloud Service Justine Sherry Shaddi Hasan Colin Scott UC Berkeley UC Berkeley UC Berkeley Arvind Krishnamurthy Sylvia Ratnasamy Vyas Sekar University of Washington UC Berkeley Intel Labs ABSTRACT §2, middleboxes come with high infrastructure and management Modern enterprises almost ubiquitously deploy middlebox process- costs, which result from their complex and specialized processing, ing services to improve security and performance in their networks. variations in management tools across devices and vendors, and the Despite this, we find that today’s middlebox infrastructure is ex- need to consider policy interactions between these appliance and pensive, complex to manage, and creates new failure modes for the other network infrastructure. networks that use them. Given the promise of cloud computing to The above shortcomings mirror the concerns that motivated en- decrease costs, ease management, and provide elasticity and fault- terprises to transition their in-house IT infrastructures to managed tolerance, we argue that middlebox processing can benefit from cloud services. Inspired by this trend, we ask whether the promised outsourcing the cloud. Arriving at a feasible implementation, how- benefits of cloud computing—reduced expenditure for infrastruc- ever, is challenging due to the need to achieve functional equiva- ture, personnel and management, pay-by-use, the flexibility to try lence with traditional middlebox deployments without sacrificing new services without sunk costs, etc.—can be brought to middle- performance or increasing network complexity. box infrastructure. Beyond improving the status quo, cloud-based In this paper, we motivate, design, and implement APLOMB, a middlebox services would also make the security and performance practical service for outsourcing enterprise middlebox processing benefits of middleboxes available to users such as small businesses to the cloud. Our discussion of APLOMB is data-driven, guided by and home and mobile users who cannot otherwise afford the asso- a survey of 57 enterprise networks, the first large-scale academic ciated costs and complexity. study of middlebox deployment. We show that APLOMB solves real We envision enterprises outsourcing the processing of their traf- problems faced by network administrators, can outsource over 90% fic to third-party middlebox service providers running in the cloud. of middlebox hardware in a typical large enterprise network, and, Our proposal represents a significant change to enterprise networks, in a case study of a real enterprise, imposes an average latency and hence we first validate that this exercise is worthwhile by ex- penalty of 1.1ms and median bandwidth inflation of 3.8%. amining what kind of a burden middleboxes impose on enterprises. The research literature, however, offers surprisingly few real-world Categories and Subject Descriptors studies; the closest study presents anecdotal evidence from a single C.2.0 [Computer-Communication Networks]: General—Secu- large enterprise [42]. We thus start with a study of 57 enterprise rity and firewalls; C.2.1 [Network Architecture and Design]: [Dis- networks, aimed at understanding (1) the nature of real-world mid- tributed applications]; C.2.3 [Network Operations]: [Network man- dlebox deployments (e.g., types and numbers of middleboxes), (2) agement] “pain points” for network administrators, and (3) failure modes. General Terms Our study reveals that middleboxes do impose significant infras- Design, Management, Measurement tructure and management overhead across a spectrum of enterprise networks and that the typical number of middleboxes in an enter- Keywords prise is comparable to its traditional L2/L3 infrastructure! Middlebox, Cloud, Outsourcing Our study establishes the costs associated with middlebox de- ployments and the potential benefits of outsourcing them. We then 1. INTRODUCTION examine different options for architecting cloud-based middlebox Today’s enterprise networks rely on a wide spectrum of special- services. To be viable, such an architecture must meet three chal- ized appliances or middleboxes. Trends such as the proliferation lenges: of smartphones and wireless video are set to further expand the (1) Functional equivalence. A cloud-based middlebox must offer range of middlebox applications [19]. Middleboxes offer valuable functionality and semantics equivalent to that of an on-site middle- benefits, such as improved security (e.g., firewalls and intrusion de- box – i.e., a firewall must drop packets correctly, an intrusion detec- tection systems), improved performance (e.g., proxies) and reduced tion system (IDS) must trigger identical alarms, etc. In contrast to bandwidth costs (e.g., WAN optimizers). However, as we show in traditional endpoint applications, this is challenging because mid- dlebox functionality may be topology dependent. For example, traffic compression must be implemented before traffic leaves the enterprise access link, and an IDS that requires stateful processing Permission to make digital or hard copies of all or part of this work for must see all packets in both directions of a flow. Today, these re- personal or classroom use is granted without fee provided that copies are quirements are met by deliberately placing middleboxes ‘on path’ not made or distributed for profit or commercial advantage and that copies at network choke points within the enterprise – options that are not bear this notice and the full citation on the first page. To copy otherwise, to readily available in a cloud-based architecture. As we shall see, republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. these topological constraints complicate our ability to outsource SIGCOMM’12, August 13–17, 2012, Helsinki, Finland. middlebox processing. Copyright 2012 ACM 978-1-4503-1419-0/12/08 ...$15.00. 13 (2) Low complexity at the enterprise. As we shall see, an out- $1M-50M sourced middlebox architecture still requires some supporting func- tionality at the enterprise. We aim for a cloud-based middlebox $500K-1M architecture that minimizes the complexity of this enterprise-side $50K-500K functionality: failing to do so would detract from our motivation for outsourcing in the first place. $5K-50K (3) Low performance overhead. Middleboxes today are located on 5 Year Expenditure <$5K the direct path between two communicating endpoints. Under our 1 10 100 1000 10000 proposed architecture, traffic is instead sent on a detour through the Number of Middleboxes cloud leading to a potential increase in packet latency and band- Figure 2: Administrator-estimated spending on middlebox width consumption. We aim for system designs that minimize this hardware per network. performance penalty. We explore points in a design space defined by three dimensions: 500+ the redirection options available to enterprises, the footprint of the cloud provider, and the complexity of the outsourcing mechanism. 100-500 We find that all options have natural tradeoffs across the above re- 26-100 quirements and settle on a design that we argue is the sweet spot 6-25 in this design space, which we term APLOMB, the Appliance for 2-5 Outsourcing Middleboxes. We implement APLOMB and evalu- Number of Personnel 1 ate our system on EC2 using real end-user traffic and an analysis 1 10 100 1000 10000 of traffic traces from a large enterprise network. In our enterprise Number of Middleboxes evaluation, APLOMB imposes an average latency increase of only Figure 3: Administrator-estimated number of personnel per 1 ms and a median bandwidth inflation of 3.8%. network. To summarize, our key contributions are: • A study of costs and concerns in 57 real-world middlebox de- We augment our analysis with measurements from a large enter- ployments, across a range of enterprise scenarios. prise with approximately 600 middleboxes and tens of international • A systematic exploration of the requirements and design space sites; we elaborate on this dataset in §5.3. for outsourcing middleboxes. Our analysis highlights several key challenges that enterprise ad- • The design, implementation, and evaluation of the ministrators face with middlebox deployments: large deployments APLOMB architecture. with high capital expenses and operating costs (§2.1), complex • A case study of how our system would impact the middlebox management requirements (§2.2), and the need for overprovision- deployment of a large enterprise. ing to react to failure and overload scenarios (§2.3). We argue these A core question in network design is where network function- factors parallel common arguments for cloud computation, and thus ality should be embedded. A wealth of research has explored this make middleboxes good candidates for the cloud. question for various network functionality, such as endpoints vs. routers for congestion control [20, 35, 29] and on-path routers vs. 2.1 Middlebox Deployments off-path controllers for routing control plane functions [28, 39]. Our data illustrates that typical enterprise networks are a com- Our work follows in this vein: the functionality we focus on is plex ecosystem of firewalls, IDSes, web proxies, and other de- advanced traffic processing (an increasingly important piece of the vices. Figure 1 shows a box plot of the number of middleboxes network data plane) and we weigh the relative benefits of embed- deployed in networks of all sizes, as well as the number of routers ding such processing in the cloud vs. on-path middleboxes, under

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    12 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us