+ All Categories
Home > Documents > Verifiable Network Function Outsourcing Seyed K. FayazbakhshMichael K. ReiterVyas Sekar 1.

Verifiable Network Function Outsourcing Seyed K. FayazbakhshMichael K. ReiterVyas Sekar 1.

Date post: 31-Mar-2015
Category:
Upload: layton-belger
View: 214 times
Download: 1 times
Share this document with a friend
Popular Tags:
23
Verifiable Network Function Outsourcing Seyed K. Fayazbakhsh Michael K. Reiter Vyas Sekar 1
Transcript
Page 1: Verifiable Network Function Outsourcing Seyed K. FayazbakhshMichael K. ReiterVyas Sekar 1.

Verifiable Network Function Outsourcing

Seyed K. Fayazbakhsh Michael K. Reiter Vyas Sekar

1

Page 2: Verifiable Network Function Outsourcing Seyed K. FayazbakhshMichael K. ReiterVyas Sekar 1.

Case for Network Function Outsourcing (NFO)

Internet

Cloud Provider

+ Economies of scale, pay-per use+ Simplifies configuration & deployment

2

Today:High CapEx, OpEx, Delay in innovation

Page 3: Verifiable Network Function Outsourcing Seyed K. FayazbakhshMichael K. ReiterVyas Sekar 1.

Concerns with ceding control

Internet

Cloud Provider

e.g., Is this equivalent to in-house?e.g., Am I really getting cost reduction?

3

Page 4: Verifiable Network Function Outsourcing Seyed K. FayazbakhshMichael K. ReiterVyas Sekar 1.

Our Vision: Verifiable NFO

4

• Our focus is meeting customer expectations

• Key correctness properties:– Behavior– Performance– Accounting

• Other issues outside our scope: isolation, privacy, bandwidth costs ..

Page 5: Verifiable Network Function Outsourcing Seyed K. FayazbakhshMichael K. ReiterVyas Sekar 1.

What makes this challenging?

• Lack of visibility into the workload

• Dynamic, traffic-dependent, and potentially proprietary actions of the middleboxes

• Stochastic effects introduced by the network

5

Page 6: Verifiable Network Function Outsourcing Seyed K. FayazbakhshMichael K. ReiterVyas Sekar 1.

6

Outline

• Motivation for verifiable NFO

• Formalizing properties

• A roadmap for vNFO

• Ongoing work and discussion

Page 7: Verifiable Network Function Outsourcing Seyed K. FayazbakhshMichael K. ReiterVyas Sekar 1.

Formal Framework

ManagementInterface

f1 fn

….σ1

σn

BCPU, BMem, BNet

Customer

CPU,Mem

Net CPU,Mem

π1in, π2

in,… π1out, π2

out,...

State SpacePacket Space Reference implementation

7

Page 8: Verifiable Network Function Outsourcing Seyed K. FayazbakhshMichael K. ReiterVyas Sekar 1.

Behavioral equivalence?

8

Are packets being modified or incorrectly processed?

Cloud IPS

Customer

Page 9: Verifiable Network Function Outsourcing Seyed K. FayazbakhshMichael K. ReiterVyas Sekar 1.

Blackbox Behavioral Correctness

….σ1

σn

π1in π1

out

visible to customer

….σ’1 σ’n

π1in

Is there some viable state?

π1out

? ?

9

Page 10: Verifiable Network Function Outsourcing Seyed K. FayazbakhshMichael K. ReiterVyas Sekar 1.

Snapshot Behavioral Correctness

….σ1

σn

π1in π1

out

visible to customer

….σ1

σn

π1in

Would I get the same output?

π1out?

10

Page 11: Verifiable Network Function Outsourcing Seyed K. FayazbakhshMichael K. ReiterVyas Sekar 1.

Performance impact?

11

Is the cloud processing introducing delays?

11

Cloud IPS

t1t2t3

Customer

Page 12: Verifiable Network Function Outsourcing Seyed K. FayazbakhshMichael K. ReiterVyas Sekar 1.

Performance Correctness

….σ1

σn

π1in, π2

in,… π1out, π2

out,...

….σ1

σn

π1in, π2

in,…

π1out, π2

out,...

Would it reallytake this long?

t1out, t2

out,...

t’1out, t’2

out,...

observed provider performance ≈ reference performance12

Page 13: Verifiable Network Function Outsourcing Seyed K. FayazbakhshMichael K. ReiterVyas Sekar 1.

Accounting correctness?

Is the provider overcharging me?

Cloud IPS

Customer

13

Page 14: Verifiable Network Function Outsourcing Seyed K. FayazbakhshMichael K. ReiterVyas Sekar 1.

“Did-It” Accounting Correctness

….σ1

σn

π1in, π2

in,… π1out, π2

out,...

Did It actuallyconsume?

Charged value of resource r ≈ Consumption of resource r by provider

14

Page 15: Verifiable Network Function Outsourcing Seyed K. FayazbakhshMichael K. ReiterVyas Sekar 1.

“Should-It” Accounting Correctness

….σ1

σn

π1in, π2

in,… π1out, π2

out,...

Should It reallycost this much?

15

Consumption of resource r by provider ≈ Consumption of resource r by reference implementation

Page 16: Verifiable Network Function Outsourcing Seyed K. FayazbakhshMichael K. ReiterVyas Sekar 1.

16

Summarizing Correctness Properties

• Behavioral correctness– Blackbox: Function states are not visible to customer.– Snapshot: Function states are visible to customer

• Performance correctness– Is performance metric within Δ (SLA) of reference?

• Accounting correctness– Did-It: Were resources actually consumed?– Should-It: Was the consumption necessary?

Page 17: Verifiable Network Function Outsourcing Seyed K. FayazbakhshMichael K. ReiterVyas Sekar 1.

17

Outline

• Motivation for NFO + vNFO

• Formalizing vNFO properties

• A roadmap for vNFO

• Ongoing work and discussion

Page 18: Verifiable Network Function Outsourcing Seyed K. FayazbakhshMichael K. ReiterVyas Sekar 1.

Verifiable NFO (vNFO) OverviewManagement

Interface BCPU, BMem, BNet

Customer

CPU,Mem

Net CPU,Mem

π1in, π2

in,… π1out, π2

out,...Cloud OS

Trusted Shim

Cloud Platform

VM1

Cloud OS

Trusted Shim

Cloud Platform

VMn….

Each function is implemented as a virtual appliance.NFO provider deploys a trusted shim for logging.

18

Page 19: Verifiable Network Function Outsourcing Seyed K. FayazbakhshMichael K. ReiterVyas Sekar 1.

Idealized viewManagement

Interface BCPU, BMem, BNet

Customer

CPU,Mem

Net CPU,Mem

π1in, π2

in,… π1out, π2

out,...Cloud OS

Trusted Shim

Cloud Platform

VM1

Cloud OS

Trusted Shim

Cloud Platform

VMn….

Shim logs every packet, instantaneous VM state, and resource usage, timestamps per packet

19

Page 20: Verifiable Network Function Outsourcing Seyed K. FayazbakhshMichael K. ReiterVyas Sekar 1.

Challenges with Idealized viewManagement

Interface BCPU, BMem, BNet

Customer

CPU,Mem

Net CPU,Mem

π1in, π2

in,… π1out, π2

out,...Cloud OS

Trusted Shim

Cloud Platform

VM1

Cloud OS

Trusted Shim

Cloud Platform

VMn….

1. Middlebox actions make it difficult to correlate logs2. Scalability and performance impact due to logging

20

Page 21: Verifiable Network Function Outsourcing Seyed K. FayazbakhshMichael K. ReiterVyas Sekar 1.

21

Potential solutions to challenges

1. Lack of visibility into middlebox actions:– Packets may be modified by middleboxes.

2. Scalability– Infeasible to log all packets and processing stats.

FlowTags

Trajectory Sampling

Page 22: Verifiable Network Function Outsourcing Seyed K. FayazbakhshMichael K. ReiterVyas Sekar 1.

22

Ongoing work

• Leveraging nested virtualization– NFO provider does not need any platform change

• Adding hooks to KVM– Trustworthy accounting (CPU, memory)– Trajectory sampling + FlowTags– Instantaneous snapshotting

• Benchmark memory/time overheads associate with:– Packet sampling– Resource consumption calculations– Snapshotting

Page 23: Verifiable Network Function Outsourcing Seyed K. FayazbakhshMichael K. ReiterVyas Sekar 1.

Discussion

• Does the customer trust the NFO provider?

• Is the NFO provider willing to deploy the shim layer?– Market forces: Premium service, competitive edge, etc.

• What are the market factors for customers?– Can customer easily switch to a different NFO provider?

• What is the role of SLA?– Can the billed amount always be formulated in terms of

resource consumption?

• …23


Recommended