Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Copy of Intelligent network security agent for a virtual switch in a

No description

m v

on 31 May 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Copy of Intelligent network security agent for a virtual switch in a

Intelligent network monitoring agent for a virtual switch in a virtual data center
Guide: Prof. Suraj Chavan.

OpenFlow Protocol
Software Defined Networking
1. KVM installation
To design a Linux module to analyze packets reaching a virtual switch and redirect the traffic according to defined policies.
Inspecting the network flow passing through the switch.
Match the flows against a configured set of policies.
Inspects the results of operations carried out by the services so the user can check flow of packets in the network.
Project Methodology
2. OpenvSwitch installation
3. OpenvSwitch cource code study
OpenFlow enables networks to evolve by giving a remote controller the power to modify the behavior of network devices, through a well-defined "forwarding instruction set".

4. Set up Appliances
5. High level design and Low level design + coding for the module
6. Designing interface between SDN controller and appliance
7. Integration testing
8. Documentation and Demo preparation

KVM Virtualization
[1] Feng Zhao Weiping Yang Hai Jin Song Wu. Vnids:A virtual machine-based network intrusion detection system.
2008.IEEE, pages 254 – 259, July URL http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=4688384.

[2] Kenichi Kourai and Shigeru Chiba. Hyperspector: Virtual distributed monitoring environments for secure intrusion detection. Review of Scientific Instruments, April 2005. URL www.usenix.org/events/vee05/full_papers/p197-kourai.pdf.

[3] The bro network security monitor. . URL http://www.bro.org.

[4] Lawrence Berkeley National Laboratory Vern Paxson, Network Research Group. Bro: A system for detecting network intruders in real-time. pages 254 – 259, January 1998. URL https://www.usenix.org/legacy/publications/library/proceedings/sec98/full_papers/paxson/paxson.pdf.

[5] Margaret Rouse. Netfilter description. September 2005. URL http://searchenterpriselinux.techtarget.com/definition/netfilter.

[6] Mugdha Vairagade. Introduction to netfilters/iptables. September 2002. URL http://www.ibm.com/developerworks/library/s-netip/.

[7] Netfilter/iptables project homepage. . URL http://www.netfilter.org/.

[8] N Hyojoon Kim Feamster. Improving network management with software defined networking. IEEE, 2:114 – 119, February 2013. URL http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6461195&queryText%3DImproving+network+management+with+software+defined+networking.
Snort is a open source network intrusion prevention system (NIPS) and network intrusion detection system (NIDS)
Activities carried out by Snort :
Real-time traffic analysis
Packet logging on Internet Protocol (IP) networks
Content searching and content matching

Kernel Virtual Machine turns the Linux kernel itself into a hypervisor
It integrates the hypervisor capabilities with linux kernel which increases performance and simplifies management.
Floodlight Controller as a platform
Floodlight works with physical and virtual switches that speak the OpenFlow protocol (OpenFlow controller platform)
Written in Java with some REST APIs and some source tools in other langauges to interface with these APIs.
We propose to provide an intelligent framework built on top of a virtual switch and a set of virtual network services to eliminate various security threats possible in a virtual data center environment.
A virtual machine-

[9] Thomas Paradis. Software-defined networking. 2013. URL http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-143882.

[10] Scott-Hayward S Chouhan P.K. Fraser B. Lake D. Finnegan J. Viljoen N. MillerM. Rao N. IEEE, pages 36 – 43, July 2012. URL http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6553676&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6553676.

[11] ONF White paper. Software-defined networking:the new norm for networks. April2012.URL https://www.opennetworking.org/images/stories/downloads/sdn-resources/white-papers/wp-sdn-newnorm.pdf.

[12] Hari Balakrishnan MIT Nick McKeown Standford University. Openflow:enablinginnovation in campus networks. March 2008. URL http://archive.openflow.org/documents/openflow-wp-latest.pdf.

[13] Marc work LeClerc. The architecture. basics October of sdn 2013. and URL the openflow net-http://noviflow.com/the-basics-of-sdn-and-the-openflow-network-architecture/.

[14] William Stallings. Software-defined networks and openflow. Internet Protocol Journal, 16. URL http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_16-1/161_sdn.html.

[15] Floodlight controller. . URL www.projectfloodlight.org/floodlight.s
Full transcript