Abstract
Our goal in this chapter is to introduce a router-based filtering technology aimed at enhancing the availability and performance of cloud computing. When this technology is integrated with cloud auditing methods, it can make use of cloud auditing information to detect malicious intrusion and traffic anomalies, and to define appropriate filtering rules that can be exchanged between routers in the network, for filtering malicious traffic early and rerouting excessive legitimate requests to other suitable replicated servers. We first give an overview of the specification and generation of filtering rules used by routers. Then we present a theoretical model to find the best locations for hardware routers in a network to block malicious traffic, and discuss how to integrate this theoretical model with cloud auditing techniques. Finally, we present results of experiments that validate our router-based filtering approach.
“Approved for Public Release; Distribution Unlimited: 88ABW-2013-0140, 18-Jan-2013”
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abbes, T., Bouhoula, A., Rusinowitch, M.: An inference system for detecting firewall filtering rules anomalies. In: Proceedings of the 2008 ACM Symposium on Applied Computing, SAC’08, Fortaleza, pp. 2122–2128. ACM, New York (2008). doi:10.1145/1363686.1364197
Abramov, E., Mordvin, D., Makarevich, O.: Automated method for constructing of network traffic filtering rules. In: Proceedings of the 3rd International Conference on Security of Information and Networks, SIN’10, Taganrog, Rostov-on-Don, pp. 203–211. ACM, New York (2010). doi:10.1145/1854099.1854141
Agapi, A., Birman, K., Broberg, R.M., Cotton, C., Kielmann, T., Millnert, M., Payne, R., Surton, R., Renesse, R.v.: Routers for the cloud: can the Internet achieve 5-nines availability? IEEE Internet Comput. 15(5), 72–77 (2011). doi:10.1109/MIC.2011.122
Almquist, P.: ietf.org, RFC 1349 – type of service in the internet protocol suite. http://goo.gl/6O5jQ (1992)
Andersen, D.G., Snoeren, A.C., Balakrishnan, H.: Best-path vs. multi-path overlay routing. In: Proceedings of the 3rd ACM SIGCOMM Conference on Internet Measurement, IMC’03, Miami Beach, pp. 91–100. ACM, New York (2003). doi:10.1145/948205.948218
Bartal, Y., Mayer, A., Nissim, K., Wool, A.: Firmato: a novel firewall management toolkit. ACM Trans. Comput. Syst. 22(4), 381–420 (2004). doi:10.1145/1035582.1035583
Bleikertz, S., Schunter, M., Probst, C.W., Pendarakis, D., Eriksson, K.: Security audits of multi-tier virtual infrastructures in public infrastructure clouds. In: Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, CCSW’10, Chicago, pp. 93–102. ACM, New York (2010). doi:10.1145/1866835.1866853
Casalicchio, E., Silvestri, L.: An inter-cloud outsourcing model to scale performance, availability and security. In: Proceedings of the 5th IEEE/ACM International Conference on Utility and Cloud Computing, UCC’12, Chicago, pp. 151–158. IEEE Computer Society, Washington, DC (2012). doi:10.1109/UCC.2012.16
Chen, S., Nahrstedt, K.: An overview of quality of service routing for next-generation high-speed networks: problems and solutions. Netw. Manage. Global Internetwork. 12(6), 64–79 (1998). doi:10.1109/65. 752646
Dainotti, A., King, A., Claffy, K., Papale, F., Pescapè, A.: Analysis of a “/0” stealth scan from a botnet. In: Proceedings of the 2012 ACM Conference on Internet Measurement Conference, IMC’12, Boston, pp. 1–14. ACM, New York (2012). doi:10.1145/2398776.2398778
Duvivier, B.: cisco.com, Cisco BGP security enhancements. http://goo.gl/7NDpc (2011)
Esposito, C., Cotroneo, D., Gokhale, A.: Reliable publish/subscribe middleware for time-sensitive internet-scale applications. In: Proceedings of the 3rd ACM International Conference on Distributed Event-Based Systems, DEBS’09, Nashville, pp. 16:1–16:12. ACM, New York (2009). doi:10.1145/1619258.1619280
François, J., Aib, I., Boutaba, R.: FireCol: a collaborative protection network for the detection of flooding DDoS attacks. ACM Trans. Comput. Syst. 20(6), 1828–1841 (2012). doi:10.1109/TNET.2012. 2194508
Ghosh, D., Sarangan, V., Acharya, R.: Quality-of-service routing in IP networks. IEEE Trans. Multimed. 3(2), 200–208 (2001). doi:10.1109/ 6046.923819
Gill, P., Schapira, M., Goldberg, S.: Let the market drive deployment: a strategy for transitioning to bgp security. In: Proceedings of the 2011 ACM SIGCOMM Conference, SIGCOMM’11, Toronto, pp. 14–25. ACM, New York (2011). doi:10.1145/2018436.2018439
Gregori, E., Improta, A., Lenzini, L., Rossi, L., Sani, L.: On the incompleteness of the AS-level graph: a novel methodology for BGP route collector placement. In: Proceedings of the 2012 ACM Conference on Internet Measurement Conference, IMC’12, Boston, pp. 253–264. ACM, New York (2012). doi:10.1145/2398776.2398803
Houmansadr, A., Nguyen, G.T., Caesar, M., Borisov, N.: Cirripede: circumvention infrastructure using router redirection with plausible deniability. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS’11, Chicago, pp. 187–200. ACM, New York (2011). doi:10.1145/2046707.2046730
Huang, C.T., Han, K.J., Perretta, J.: Automatic selection of routers for placing early filters of malicious traffic. In: Proceedings of IEEE GLOBECOM 2011, Houston, pp. 1–5. IEEE (2011). doi:10.1109/ GLOCOM.2011.6133640
Juels, A., Oprea, A.: New approaches to security and availability for cloud data. Commun. ACM 56(2), 64–73 (2013). doi:10.1145/2408776. 2408793
juniper.net, Enabling BGP to carry flow-specification routes. http://goo.gl/zxv8C (2010)
Kalakota, P., Huang, C.T.: On the benefits of early filtering of botnet unwanted traffic. In: Proceedings of the 18th International Conference on Computer Communications and Networks, ICCCN’09, San Francisco, pp. 1–6. IEEE Computer Society, Washington, DC (2009). doi:10.1109/ ICCCN.2009.5235325
Li, J., Guidero, M., Wu, Z., Purpus, E., Ehrenkranz, T.: BGP routing dynamics revisited. SIGCOMM Comput. Commun. Rev. 37(2), 5–16 (2007). doi:10.1145/1232919.1232921
Li, Y., Liljenstam, M., Liu, J.: Real-time security exercises on a realistic interdomain routing experiment platform. In: Proceedings of the 23rd ACM/IEEE/SCS Workshop on Principles of Advanced and Distributed Simulation, PADS’09, Lake Placid, pp. 54–63. IEEE Computer Society, Washington, DC (2009). doi:10.1109/PADS.2009.12
Li, C., Li, L.: An efficient resource allocation for maximizing benefit of users and resource providers in Ad Hoc grid environment. Inf. Syst. Front. 14(5), 987–998 (2012). doi:10.1007/s10796-011-9310-4
Mansmann, F., Göbel, T., Cheswick, W.: Visual analysis of complex firewall configurations. In: Proceedings of the 9th International Symposium on Visualization for Cyber Security, VizSec’12, Seattle, pp. 1–8. ACM, New York (2012). doi:10.1145/2379690.2379691
Marques, P., Sheth, N., Raszuk, R., Greene, B., Mauch, J., McPherson, D.: ietf.org, RFC 5575 – Dissemination of flow specification rules. http://goo.gl/y8XVq (2009)
Nazario, J.: DDoS: DDoS attack evolution. Netw. Secur. 2008(7), 7–10 (2008). doi:10.1016/S1353-4858(08)70086-2
nongnu.org, Quagga routing software suite. http://goo.gl/FqSJE
Oreku, G.S., Li, J., Pazynyuk, T.: An application-driven perspective on wireless devises security: the case of distributed denial-of-service (DDOS). In: Proceedings of the 2nd ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired networks, PM2HW2N’07, Chania, pp. 81–83. ACM, New York (2007). doi:10.1145/1298275.1298292
Rai, A., Bhagwan, R., Guha, S.: Generalized resource allocation for the cloud. In: Proceedings of the 3rd ACM Symposium on Cloud Computing, SoCC’12, San Jose, pp. 15:1–15:12. ACM, New York (2012). doi:10.1145/2391229.2391244
Rekhter, Y., Li, T., Hares, S.: RFC 4271 – a border gateway protocol 4 (BGP-4). http://goo.gl/7NDpc (2006)
Rodolakis, G., Siachalou, S., Georgiadis, L.: Replicated server placement with QoS constraints. In: Proceedings of the 3rd International Conference on Quality of Service in Multiservice IP Networks, QoS-IP’05, Catania, pp. 207–220. Springer, Berlin/Heidelberg (2005). doi:10.1007/ 978-3-540-30573-6_16
Siachalou, S., Georgiadis, L.: Efficient QoS routing. Comput. Netw. 43(3), 351–367 (2003). doi:10.1016/S1389-1286(03)00286-X
Soldo, F., Argyraki, K., Markopoulou, A.: Optimal source-based filtering of malicious traffic. IEEE/ACM Trans. Netw. 20(2), 381–395 (2012). doi:10.1109/TNET.2011.2161615
sourceforge.net, Iperf. http://goo.gl/4ubV5 (2008)
Sun, H., Hughes, H.D.: Adaptive QoS routing by cross-layer cooperation in Ad Hoc networks. EURASIP J. Wirel. Commun. Netw. 2005(5), 661–671 (2005). doi:10.1155/WCN.2005.661
Tague, P., Nabar, S., Ritcey, J.A., Poovendran, R.: Jamming-aware traffic allocation for multiple-path routing using portfolio selection. IEEE/ACM Trans. Netw. 19(1), 184–194 (2011). doi:10.1109/TNET. 2010.2057515
Uludag, S., Lui, K.S., Nahrstedt, K., Brewster, G.: Analysis of topology aggregation techniques for QoS routing. ACM Comput. Surv. 39(3) (2007). doi:10.1145/1267070.1267071
Undheim, A., Chilwan, A., Heegaard, P.: Differentiated availability in cloud computing SLAs. In: Proceedings of the 12th IEEE/ACM International Conference on Grid Computing, GRID’11, Lyon, pp. 129–136. IEEE Computer Society, Washington, DC (2011). doi:10. 1109/Grid.2011.25
West, A.G., Lee, I.: Towards the effective temporal association mining of spam blacklists. In: Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, CEAS’11, Perth, pp. 73–82. ACM, New York (2011). doi:10.1145/2030376.2030385
Wiebelitz, J., Brenner, M., Kunz, C., Smith, M.: Early defense: enabling attribute-based authorization in grid firewalls. In: Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing, HPDC’10, Chicago, pp. 336–339. ACM, New York (2010). doi:10.1145/1851476.1851524
Xia, L., Cui, Z., Lange, J.R., Tang, Y., Dinda, P.A., Bridges, P.G.: VNET/P: bridging the cloud and high performance computing through fast overlay networking. In: Proceedings of the 21st International Symposium on High-Performance Parallel and Distributed Computing, HPDC’12, Delft, pp. 259–270. ACM, New York (2012). doi:10.1145/ 2287076.2287116
Xu, L., Hu, J., Mkandawire, S., Jiang, H.: SHHC: a scalable hybrid hash cluster for cloud backup services in data centers. In: Proceedings of the 31st International Conference on Distributed Computing Systems Workshops, ICDCSW’11, Minneapolis, pp. 61–65. IEEE Computer Society, Washington, DC (2011). doi:10.1109/ICDCSW.2011.31, http://dx.doi.org/10.1109/ICDCSW.2011.31
Zegura, E.W., Ammar, M.H., Fei, Z., Bhattacharjee, S.: Application-layer anycasting: a server selection architecture and use in a replicated web service. IEEE/ACM Trans. Netw. 8(4), 455–466 (2000). doi:10.1109/90.865074
Acknowledgements
This material is based upon work partially supported by the National Science Foundation (NSF) grants CNS-0916857, the Air Force Office of Scientific Research (AFOSR) Summer Faculty Fellow Program (SFFP), the Air Force Research Laboratory (AFRL) Visiting Faculty Research Program (VFRP), and AFOSR/AFRL LRIR 11RI01COR.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media New York
About this chapter
Cite this chapter
Huang, CT., Carroll, H., Perretta, J. (2014). Improving Cloud Performance with Router-Based Filtering. In: Han, K., Choi, BY., Song, S. (eds) High Performance Cloud Auditing and Applications. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-3296-8_13
Download citation
DOI: https://doi.org/10.1007/978-1-4614-3296-8_13
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-3295-1
Online ISBN: 978-1-4614-3296-8
eBook Packages: EngineeringEngineering (R0)