Deep Packet Inspection As a Service

Deep Packet Inspection As a Service

Deep Packet Inspection as a Service Anat Bremler-Barr Yotam Harchol School of Computer Science School of Computer Science and Engineering The Interdisciplinary Center The Hebrew University Herzliya, Israel Jerusalem, Israel [email protected] [email protected] David Hay Yaron Koral School of Computer Science and Engineering School of Computer Science and Engineering The Hebrew University The Hebrew University Jerusalem, Israel Jerusalem, Israel [email protected] [email protected] ABSTRACT L2-L4 Tr. FW IDS AV Shaper Middleboxes play a major role in contemporary networks, as for- warding packets is often not enough to meet operator demands, and other functionalities (such as security, QoS/QoE provisioning, and load balancing) are required. Traffic is usually routed through a sequence of such middleboxes, which either reside across the net- (a) Without DPI service: Multiple mid- work or in a single, consolidated location. Although middleboxes dleboxes perform DPI on packets. provide a vast range of different capabilities, there are components that are shared among many of them. DPI L2-L4 Service IDS AV Tr. A task common to almost all middleboxes that deal with L7 pro- FW Instance Shaper tocols is Deep Packet Inspection (DPI). Today, traffic is inspected from scratch by all the middleboxes on its route. In this paper, we propose to treat DPI as a service to the middleboxes, implying that (b) With DPI service: Packets go through DPI traffic should be scanned only once, but against the data of all mid- once. dleboxes that use the service. The DPI service then passes the scan results to the appropriate middleboxes. Having DPI as a service has Figure 1: Examples of the chain of middleboxes (a.k.a. policy significant advantages in performance, scalability, robustness, and chains [41]) with and without DPI as a service. as a catalyst for innovation in the middlebox domain. Moreover, technologies and solutions for current Software Defined Networks (SDN) (e.g., SIMPLE [41]) make it feasible to implement such a service and route traffic to and from its instances. task and it may take most of the middlebox processing time.1 Thus, 1. INTRODUCTION great effort was invested over the years in optimizing it. As detailed in [41], and referenced therein, traffic nowadays goes Inspired by current suggestions for Network Function Virtualiza- through a chain of middleboxes before reaching its destination. tion (NFV) and the flexible routing capabilities of Software Defined This implies that traffic is scanned over and over again by middle- Networks (SDN), this paper calls for finding common tasks among boxes with a DPI component [39] (see Figure 1(a)). Alternatively, middleboxes and offering these tasks as services. an opposite trend is to consolidate middleboxes in a single location Specifically, we focus on Deep Packet Inspection (DPI), where (or even a hardware device) [4,45]. However, the different compo- the payload of packets is inspected against a set of patterns. DPI nents of this consolidated middlebox perform DPI separately, from is a common task in many middleboxes. A partial list is shown in scratch. Table 1. In many of these devices, DPI is the most time-consuming Our proposed framework extracts the DPI engine from the dif- ferent middleboxes and provides it as a service for various mid- Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed dleboxes in the network. This service is provided by deploying for profit or commercial advantage and that copies bear this notice and the full cita- one or more service instances around the network, all controlled tion on the first page. Copyrights for components of this work owned by others than by a logically-centralized DPI Controller. Thus, a packet in such ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or re- network would go through a single DPI service instance and then publish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. CoNEXT’14, December 02-05, 2014, Sydney, Australia. 1 Copyright 2014 ACM 978-1-4503-3279-8/14/12 ...$15.00. In an experiment we conducted on Snort IDS [48], DPI slows http://dx.doi.org/10.1145/2674005.2674984. packet processing by a factor of at least 2:9. 271 DPI Service Instance IDS1 with DPI IDS2 with DPI IDS1 IDS2 no DPI no DPI DPI Service Instance (a) Without a DPI Service (b) With a DPI Service Figure 2: Pipelined middlebox scenario. With DPI Service, resources are used for running multiple instances of the service while middleboxes do not have to re-scan the packets. DPI Service IDS1 IDS1 with DPI Instance no DPI HTTP P2P IDS2 with DPI DPI Service IDS2 Instance no DPI (a) Without a DPI Service (b) With a DPI Service Figure 3: An example of multiple service chains scenario. With DPI Service, flows are multiplexed to multiple DPI Service instances. This allows dynamic load balancing on the DPI engines without adding middleboxes. visit middleboxes according to its policy chain.2 Its payload would not have to be scanned again as the results of the scan are pro- vided along with the original packet (or instead without the origi- nal packet if the latter is not needed anymore).3 Upon receiving the results from the DPI Service, each middlebox applies the rules cor- responding to the matched patterns according to its internal logic. Middlebox DPI patterns Examples Figures 2 and 3 show two configurations for using DPI as a service. Intrusion Detection Malicious SNORT [48], We elaborate on these scenarios and provide their corresponding System activity BRO [10] experimental results in Section 6.4. AntiVirus/SPAM Malicious activity ClamAV [12] It is important to note that while fields in a packet header might L7 Firewall Malicious Linux L7-filter, be modified along the path of the packet, the payload is usually activity ModSecurity [34] not changed, and thus, the DPI service may be used even in policy L7 Load Balancing Apps/URLs F5 [37], A10 [35] Leakage Prevention Leakage Check Point DLP [11] chains that contain NATs and other middleboxes that modify header System activity fields. Network Analytic Protocol IDs Qosmos [13] Our approach is shown to provide superior performance and also Traffic Shaper Applications Blue Coat reduces the memory footprint of the DPI engine data-structures. PacketShapper [8] The framework also allows dynamic resource sharing as the hard- ware used for DPI is decoupled from the specific middlebox, as shown in Section 6.4. Since DPI is performed once, the effect of Table 1: DPI in different types of middleboxes. decompression or decryption, which usually takes place prior to the DPI phase, may be reduced significantly, as these heavy processes are executed only once for each packet. 2We assume that patterns are either not proprietary or can be dis- closed to our service over a secure channel. 3Section 4.2 discusses this mechanism in detail. 272 We believe that having DPI and other shared functionalities as There are several pioneer works on middlebox virtualization. network services also creates necessary room for innovation in the Rajagopalan et al. [44] present a mechanism to place a middlebox, middlebox domain, which is usually closed and proprietary. For such as the Bro NIDS, in a virtual environment, where the VM example, when consolidating DPI to a single piece of software, might migrate between different machines. Gember et al. [23] deal one might find it beneficial to implement more advanced DPI func- with standardization of unified control to middleboxes, inspired by tionalities, such as decryption and decompression, or use special the SDN paradigm. Nevertheless, virtualizing middleboxes raises hardware accelerators. several issues that should be carefully dealt with, such as efficient Moreover, as a central component, security devices, and specifi- fault tolerance [26], availability [43], and management [22]. Our cally their DPI engines, are a preferred target for denial-of-service work mostly addresses algorithmic aspects of virtualized DPI, which attacks [50]. Recent works show that DPI components within the are orthogonal to these works. NIDS (such as Snort [48] and Bro [10]) expose the entire system to Middlebox consolidation and programmability: A different ap- attacks that may knock down the device [1]. Having DPI as a ser- proach to tackle the problem raised by managing multiple middle- vice is especially appealing in this case, since a developer is now boxes is to offer a consolidated solution [4,14,25,45] consisting of focused on strengthening the DPI only at a single implementation, a single hardware, possibly programmable, that consolidates mul- rather than tailoring the security solution for each middlebox that tiple logical middleboxes. DPI as a service may complement such uses DPI. Furthermore, as most DPI solutions nowadays use soft- consolidated architectures to improve the overall performance, ei- ware, one can easily deploy more and more instances of the DPI to ther by extracting the DPI engine from these boxes to a virtual ser- servers across the network, and thus mitigate attacks and uninten- vice, or by using our algorithm to merge multiple DPI engines and tional failures. utilize shared hardware better. Note that in such a case, several Our contribution in this paper is two-fold. First, we detail a parts of our framework (such as message passing and routing be- framework in which DPI is deployed as a service, including an tween middleboxes) may be eliminated. algorithm that combines DPI patterns from different sources. Sec- ond, we implemented in Mininet over OpenFlow an SDN system Outsourcing middlebox functionality: To reduce the high equip- that enables deploying DPI as a service.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    12 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us