Preface |
|
xvii | |
Acknowledgments |
|
xxiii | |
About the Authors |
|
xxv | |
Part I Foundations of Virtual Networking and Security |
|
|
1 Introduction of Computer Networks |
|
|
7 | (32) |
|
1.1 Foundations of Computer Networks |
|
|
8 | (3) |
|
|
8 | (1) |
|
1.1.2 Networking Services and Packet Encapsulation |
|
|
9 | (2) |
|
|
11 | (13) |
|
|
12 | (1) |
|
|
13 | (7) |
|
1.2.2.1 Classless Inter-Domain Routing |
|
|
14 | (5) |
|
|
19 | (1) |
|
|
20 | (3) |
|
1.2.3.1 Address Representation |
|
|
20 | (1) |
|
1.2.3.2 Address Uniqueness |
|
|
21 | (1) |
|
1.2.3.3 Link-local Address |
|
|
22 | (1) |
|
1.2.3.4 Global Addressing |
|
|
22 | (1) |
|
|
23 | (1) |
|
1.3 Physical, Logical, and Overlay Networks |
|
|
24 | (3) |
|
|
24 | (1) |
|
|
24 | (2) |
|
|
26 | (1) |
|
1.4 Computer Networking Services |
|
|
27 | (9) |
|
1.4.1 Address Resolution Protocol |
|
|
27 | (2) |
|
1.4.2 Dynamic Host Configuration Protocol |
|
|
29 | (1) |
|
|
30 | (1) |
|
1.4.4 Network Address Translation |
|
|
31 | (3) |
|
|
31 | (1) |
|
1.4.4.2 PREROUTING and POSTROUTING |
|
|
32 | (1) |
|
1.4.4.3 Netfilter and NAT |
|
|
33 | (1) |
|
|
34 | (5) |
|
1.4.5.1 Tables in iptables |
|
|
34 | (1) |
|
1.4.5.2 Chains in iptables |
|
|
35 | (1) |
|
1.4.5.3 Targets in iptables' Chains |
|
|
36 | (1) |
|
|
36 | (2) |
|
|
38 | (1) |
|
|
39 | (42) |
|
|
39 | (8) |
|
2.1.1 Basis of Virtual Networks |
|
|
39 | (2) |
|
2.1.2 Abstraction vs. Virtualization |
|
|
41 | (1) |
|
2.1.3 Benefits of Virtualizing Networks |
|
|
42 | (2) |
|
2.1.4 Orchestration and Management of Virtual Networks |
|
|
44 | (1) |
|
2.1.5 Virtual Networking Embedding Problems |
|
|
44 | (3) |
|
2.1.5.1 VNE Problem Description |
|
|
45 | (1) |
|
2.1.5.2 VNE Formal Definition |
|
|
46 | (1) |
|
2.2 Layer-2 Virtual Networking |
|
|
47 | (14) |
|
|
49 | (8) |
|
2.2.1.1 Data Structures of Linux Bridge |
|
|
50 | (1) |
|
2.2.1.2 Linux Bridge Configuration |
|
|
51 | (1) |
|
2.2.1.3 Linux Bridge Frame Processing |
|
|
52 | (2) |
|
2.2.1.4 Use Cases of Linux Bridge |
|
|
54 | (3) |
|
2.2.2 Open Virtual Switches |
|
|
57 | (4) |
|
2.2.2.1 Linux Bridge vs. Open Virtual Switch |
|
|
57 | (1) |
|
2.2.2.2 Open Virtual Switch Supporting Features |
|
|
58 | (1) |
|
2.2.2.3 Open Virtual Switch Internal Modules |
|
|
59 | (1) |
|
2.2.2.4 Packet Processing in OVS |
|
|
60 | (1) |
|
2.3 Tunneling Protocols and Virtual Private Networks |
|
|
61 | (15) |
|
|
63 | (9) |
|
|
64 | (3) |
|
|
67 | (5) |
|
2.3.2 Virtual Extensible LAN |
|
|
72 | (3) |
|
2.3.2.1 VXLAN Design Requirements and Challenges |
|
|
73 | (1) |
|
|
73 | (2) |
|
2.3.3 Generic Routing Encapsulation |
|
|
75 | (7) |
|
|
75 | (1) |
|
|
76 | (1) |
|
2.4 Virtual Routing and Forwarding |
|
|
76 | (2) |
|
|
78 | (3) |
|
|
81 | (28) |
|
|
81 | (1) |
|
3.2 Network Functions Virtualization |
|
|
82 | (6) |
|
3.2.1 Background and Motivation behind NFV |
|
|
82 | (1) |
|
|
83 | (1) |
|
3.2.3 Benefits and Challenges of NFV |
|
|
84 | (1) |
|
|
84 | (1) |
|
|
85 | (3) |
|
3.3 Software-Defined Networks |
|
|
88 | (16) |
|
3.3.1 Benefits and Challenges of SDN |
|
|
89 | (2) |
|
|
91 | (1) |
|
|
91 | (1) |
|
|
92 | (1) |
|
|
92 | (1) |
|
|
93 | (1) |
|
3.3.7 Open Virtual Switch |
|
|
94 | (1) |
|
|
95 | (4) |
|
3.3.8.1 RCP: Routing Control Platform |
|
|
95 | (1) |
|
|
96 | (1) |
|
3.3.8.3 RF IP Routing: IP Routing Services over RouteFlow-based SDN |
|
|
96 | (1) |
|
3.3.8.4 VRS: Virtual Routers as a Service |
|
|
97 | (1) |
|
3.3.8.5 RFCP: RouteFlow Routing Control Platform over SDN |
|
|
98 | (1) |
|
3.3.8.6 RaaS: Routing as a Service |
|
|
98 | (1) |
|
3.3.8.7 CAR-Cloud Assisted Routing |
|
|
99 | (1) |
|
|
99 | (3) |
|
3.3.10 Distributed SDN Environments |
|
|
102 | (1) |
|
3.3.11 Distributed SDN Controller Considerations |
|
|
103 | (1) |
|
3.3.12 Challenges in Multiple-Controller Domain |
|
|
104 | (1) |
|
3.4 Advanced Topic: Deep Programmability |
|
|
104 | (3) |
|
3.4.1 P4 Forwarding Model |
|
|
105 | (1) |
|
3.4.2 P4 Programming Language |
|
|
105 | (2) |
|
3.4.3 Protocol Independent Switch Architecture |
|
|
107 | (1) |
|
|
107 | (2) |
|
4 Network Security Preliminaries |
|
|
109 | (18) |
|
4.1 Basic Concepts of Computer Network Security |
|
|
109 | (5) |
|
4.1.1 Threat, Risk, and Attack |
|
|
109 | (2) |
|
|
111 | (1) |
|
|
112 | (2) |
|
4.2 Network Reconnaissance |
|
|
114 | (2) |
|
|
114 | (1) |
|
|
115 | (1) |
|
4.2.3 Vulnerability Scanning and Penetration Testing |
|
|
115 | (1) |
|
4.3 Preventive Techniques |
|
|
116 | (5) |
|
|
116 | (4) |
|
4.3.2 Intrusion Prevention |
|
|
120 | (1) |
|
4.4 Detection and Monitoring |
|
|
121 | (4) |
|
4.4.1 Intrusion Detection |
|
|
121 | (1) |
|
|
122 | (3) |
|
4.5 Network Security Assessment |
|
|
125 | (1) |
|
|
126 | (1) |
|
|
127 | (28) |
|
|
127 | (2) |
|
5.1.1 An Overview of Security Challenges in NFV |
|
|
127 | (2) |
|
5.1.1.1 NFV Threat Vectors |
|
|
128 | (1) |
|
5.1.1.2 NFV Security Goals |
|
|
128 | (1) |
|
|
129 | (8) |
|
5.2.1 NFV Security Classification |
|
|
129 | (1) |
|
5.2.1.1 Intra-VNF Security |
|
|
129 | (1) |
|
5.2.1.2 Extra-VNF Security |
|
|
130 | (1) |
|
5.2.2 NFV Security Lifecycle |
|
|
130 | (2) |
|
5.2.3 Use Case: DNS Amplification Attack |
|
|
132 | (1) |
|
5.2.4 NFV Security Countermeasures |
|
|
133 | (4) |
|
5.2.4.1 Topology Verification and Enforcement |
|
|
133 | (1) |
|
5.2.4.2 Securing the Virtualization Platform |
|
|
134 | (1) |
|
5.2.4.3 Network and I/O Partitioning |
|
|
134 | (1) |
|
5.2.4.4 Authentication, Authorization, and Accounting |
|
|
135 | (1) |
|
5.2.4.5 Dynamic State Management, and Integrity Protection |
|
|
136 | (1) |
|
|
137 | (12) |
|
5.3.1 SDN Security Classification |
|
|
137 | (3) |
|
5.3.1.1 SDN Security Threat Vectors |
|
|
139 | (1) |
|
5.3.2 Design of Secure and Dependable SDN Platform |
|
|
140 | (3) |
|
5.3.3 SDN Data Plane Attacks and Countermeasures |
|
|
143 | (2) |
|
5.3.3.1 SDN Data Plane Attacks |
|
|
143 | (1) |
|
5.3.3.2 SDN Data Plane Attack Countermeasures |
|
|
144 | (1) |
|
5.3.4 SDN-Specific Security Challenges |
|
|
145 | (1) |
|
|
145 | (1) |
|
5.3.4.2 Integration with Legacy Protocols |
|
|
146 | (1) |
|
5.3.4.3 Cross-Domain Connection |
|
|
146 | (1) |
|
5.3.5 OpenFlow Protocol and OpenFlow Switch Security Analysis |
|
|
146 | (14) |
|
|
146 | (1) |
|
5.3.5.2 Protocol-Specific Analysis |
|
|
147 | (2) |
|
|
149 | (6) |
Part II Advanced Topics on Software-Defined and Virtual Network Security |
|
|
|
155 | (26) |
|
6.1 From Firewall to Microsegmentation |
|
|
155 | (5) |
|
6.2 Distributed Firewalls |
|
|
160 | (6) |
|
6.2.1 Issues of Conventional Firewalls |
|
|
160 | (2) |
|
6.2.2 Introduction of Distributed Firewalls |
|
|
162 | (2) |
|
6.2.3 Implementation of Distributed Firewalls |
|
|
164 | (2) |
|
|
166 | (5) |
|
6.3.1 Design Microsegmentation and Considerations |
|
|
166 | (3) |
|
6.3.1.1 Software-Defined and Programmability |
|
|
166 | (1) |
|
6.3.1.2 Fine-Grained Data Flow Control and Policy Management |
|
|
167 | (1) |
|
6.3.1.3 Applying Network Analytic Models to Understand Data Traffic Pattern |
|
|
167 | (1) |
|
|
168 | (1) |
|
6.3.1.5 Tools for Supporting Legacy Networks |
|
|
168 | (1) |
|
6.3.1.6 Leveraging Cloud-Based Resource Management and Support |
|
|
168 | (1) |
|
6.3.2 MicroSegmentation Defined |
|
|
169 | (1) |
|
6.3.3 NIST Cybersecurity Recommendations for Protecting Virtualized Workloads |
|
|
170 | (1) |
|
6.4 Case Study: VMware NSX Microsegmentation |
|
|
171 | (9) |
|
|
172 | (1) |
|
|
172 | (1) |
|
6.4.3 Security Service Function Chaining |
|
|
172 | (2) |
|
6.4.4 Network and Guest Introspection |
|
|
174 | (1) |
|
6.4.5 Security Service Abstraction |
|
|
175 | (7) |
|
|
175 | (2) |
|
|
177 | (1) |
|
6.4.5.3 Intelligent Grouping |
|
|
177 | (2) |
|
|
179 | (1) |
|
|
180 | (1) |
|
|
181 | (24) |
|
|
181 | (1) |
|
|
182 | (6) |
|
7.2.1 Security Modeling-based MTD |
|
|
183 | (2) |
|
|
183 | (1) |
|
|
183 | (2) |
|
|
185 | (1) |
|
7.2.2 Implementation Layer-based MTD |
|
|
185 | (3) |
|
7.2.2.1 Network Level MTD |
|
|
186 | (1) |
|
|
187 | (1) |
|
7.2.2.3 Application Level MTD |
|
|
187 | (1) |
|
|
188 | (6) |
|
7.3.1 Network Mapping and Reconnaissance Protection |
|
|
189 | (1) |
|
7.3.1.1 Service Version and OS Hiding |
|
|
189 | (1) |
|
7.3.2 OpenFlow Random Host Mutation |
|
|
190 | (1) |
|
7.3.3 Frequency Minimal MID Using SDN |
|
|
191 | (2) |
|
7.3.4 SDN-based Scalable MTD in Cloud |
|
|
193 | (1) |
|
7.4 Game Theoretic MTD Models |
|
|
194 | (7) |
|
7.4.1 Game Theoretic Approach to IP Randomization |
|
|
194 | (1) |
|
7.4.2 Game Theoretic Approach to Feedback Driven Multi-Stage MTD |
|
|
195 | (1) |
|
7.4.3 Game Theory-based Software Diversity |
|
|
196 | (2) |
|
7.4.4 Markov Game-based MTD |
|
|
198 | (3) |
|
7.4.4.1 IP Hopping Using Markov Game Modeling |
|
|
199 | (1) |
|
7.4.4.2 Winning Strategy for Adversary |
|
|
200 | (1) |
|
|
201 | (2) |
|
7.5.1 Quantitative Metrics for MTD Evaluation |
|
|
201 | (1) |
|
7.5.2 MTD Analysis and Evaluation Framework |
|
|
202 | (1) |
|
|
203 | (2) |
|
|
205 | (20) |
|
|
205 | (5) |
|
8.1.1 Cybersecurity Metrics |
|
|
206 | (1) |
|
8.1.2 Common Vulnerability Scoring System (CVSS) |
|
|
206 | (1) |
|
|
207 | (1) |
|
8.1.4 Attack Scenario Analysis |
|
|
208 | (1) |
|
8.1.5 Qualitative and Quantitative Metrics |
|
|
209 | (1) |
|
|
210 | (5) |
|
8.2.1 Probabilistic Attack Graphs |
|
|
212 | (1) |
|
8.2.2 Risk Mitigation Using Probability Metrics |
|
|
213 | (1) |
|
8.2.3 Attack Graph Ranking |
|
|
214 | (1) |
|
|
215 | (1) |
|
8.4 Attack Countermeasure Tree |
|
|
216 | (5) |
|
8.4.1 ACT Qualitative and Quantitative Analysis |
|
|
217 | (4) |
|
8.5 Other Attack Representation Models |
|
|
221 | (2) |
|
|
221 | (1) |
|
|
221 | (1) |
|
8.5.3 Hierarchical Attack Representation Model |
|
|
222 | (1) |
|
8.6 Limitations of Attack Representation Methods |
|
|
223 | (1) |
|
|
224 | (1) |
|
9 Service Function Chaining |
|
|
225 | (22) |
|
|
225 | (2) |
|
|
227 | (5) |
|
|
229 | (3) |
|
9.3 SDN- and NFV-based SFC |
|
|
232 | (2) |
|
9.3.1 SDN as an Enabler of SFC |
|
|
233 | (1) |
|
|
234 | (3) |
|
9.4.1 T-Nova: SDN-NFV-based SFC |
|
|
234 | (2) |
|
9.4.2 Tacker: OpenStack-based SFC |
|
|
236 | (1) |
|
|
237 | (3) |
|
9.5.1 PGA: Graph-based Policy Expression and Reconciliation |
|
|
238 | (1) |
|
9.5.1.1 Policy Composition Example |
|
|
239 | (1) |
|
|
239 | (1) |
|
9.6 Secure Service Function Chaining |
|
|
240 | (6) |
|
9.6.1 Secure In Cloud Chaining |
|
|
242 | (1) |
|
9.6.2 SFC Using Network Security Defense Patterns |
|
|
243 | (3) |
|
|
246 | (1) |
|
10 Security Policy Management in Distributed SDN Environments |
|
|
247 | (34) |
|
|
248 | (2) |
|
|
250 | (3) |
|
10.2.1 Firewall Rule Conflicts |
|
|
250 | (1) |
|
10.2.2 SDN Security and SDN Policy Management |
|
|
251 | (2) |
|
|
253 | (5) |
|
10.3.1 Security Policies Using Flow Rules |
|
|
255 | (2) |
|
|
257 | (1) |
|
10.4 Flow Rule Management Challenges |
|
|
258 | (4) |
|
10.4.1 Motivating Scenarios |
|
|
259 | (3) |
|
10.4.1.1 Case Study 1: MTD |
|
|
260 | (1) |
|
10.4.1.2 Case Study 2: VPN Services |
|
|
261 | (1) |
|
10.4.1.3 Case Study 3: Load Balancing and IDS |
|
|
262 | (1) |
|
|
262 | (9) |
|
|
262 | (1) |
|
|
263 | (5) |
|
|
264 | (1) |
|
|
264 | (3) |
|
|
267 | (1) |
|
|
267 | (1) |
|
|
268 | (1) |
|
|
268 | (1) |
|
10.5.3 Cross-layer Policy Conflicts |
|
|
268 | (2) |
|
10.5.4 Traffic Engineering Flow Rules |
|
|
270 | (1) |
|
10.6 Controller Decentralization Considerations |
|
|
271 | (5) |
|
10.6.1 Clustered Controllers |
|
|
272 | (1) |
|
10.6.2 Host-based Partitioning |
|
|
272 | (2) |
|
10.6.3 Hierarchical Controllers |
|
|
274 | (1) |
|
10.6.4 Application-based Partitioning |
|
|
275 | (1) |
|
10.6.5 Heterogeneous Partitioning |
|
|
276 | (1) |
|
10.7 Flow Rule Conflict Resolution |
|
|
276 | (1) |
|
10.7.1 Conflict Severity Classification |
|
|
276 | (1) |
|
10.7.1.1 Tier-1 Conflicts |
|
|
276 | (1) |
|
10.7.1.2 Tier-2 Conflicts |
|
|
277 | (1) |
|
10.7.1.3 Tier-3 Conflicts |
|
|
277 | (1) |
|
10.8 Conflict Resolution Model |
|
|
277 | (2) |
|
10.8.1 Intelligible Conflicts |
|
|
277 | (1) |
|
10.8.2 Interpretative Conflicts |
|
|
278 | (3) |
|
|
278 | (1) |
|
10.8.2.2 Module Security Precedence |
|
|
278 | (1) |
|
10.8.2.3 Environment Calibrated |
|
|
279 | (1) |
|
10.8.2.4 Administrator Assistance |
|
|
279 | (1) |
|
|
279 | (2) |
|
11 Intelligent Software-Defined Security |
|
|
281 | (22) |
|
11.1 Intelligence in Network Security |
|
|
281 | (8) |
|
11.1.1 Application of Machine Learning and AI in Security |
|
|
281 | (1) |
|
11.1.2 Intelligent Cybersecurity Methods and Architectures |
|
|
282 | (2) |
|
|
282 | (1) |
|
|
282 | (1) |
|
11.1.2.3 Intelligent Agents |
|
|
283 | (1) |
|
|
283 | (1) |
|
|
283 | (1) |
|
11.1.2.6 Constraint Solving |
|
|
283 | (1) |
|
11.1.3 Application of AI in IDS |
|
|
284 | (1) |
|
|
284 | (1) |
|
11.1.3.2 Behavior Classification |
|
|
285 | (1) |
|
11.1.4 SDN-based Intelligent Network Security Solutions |
|
|
285 | (4) |
|
11.1.4.1 Topology Protection |
|
|
285 | (4) |
|
11.1.4.2 SDN-based DoS Protection |
|
|
289 | (1) |
|
11.2 Advanced Persistent Threats |
|
|
289 | (9) |
|
11.2.1 Traditional Attacks vs. APT |
|
|
290 | (1) |
|
|
290 | (3) |
|
|
293 | (3) |
|
|
294 | (1) |
|
|
295 | (1) |
|
11.2.4 APT Detection/Mitigation |
|
|
296 | (1) |
|
11.2.5 Orchestrating SDN to Disrupt APT |
|
|
296 | (2) |
|
11.2.5.1 SDN-based MicroSegmentation |
|
|
296 | (2) |
|
11.2.5.2 SDN-enabled Secured Service Function Chaining |
|
|
298 | (1) |
|
11.3 Problems in Application of Intelligence in Cybersecurity |
|
|
298 | (2) |
|
|
299 | (1) |
|
11.3.2 High Cost of Errors |
|
|
299 | (1) |
|
|
300 | (1) |
|
11.3.4 Variance in Network Traffic |
|
|
300 | (1) |
|
|
300 | (3) |
Bibliography |
|
303 | (20) |
Index |
|
323 | |