s nfv securing nfv states by using sgx
play

S-NFV: Securing NFV states by using SGX Ming-Wei Shih Mohan Kumar - PowerPoint PPT Presentation

S-NFV: Securing NFV states by using SGX Ming-Wei Shih Mohan Kumar Taesoo Kim Ada Gavrilovska Georgia Institute of Technology Network Function Virtualization (NFV) Virtualized Network Functions (VNFs) NAT IDS Web Caching VNF NF OS


  1. S-NFV: Securing NFV states by using SGX Ming-Wei Shih Mohan Kumar Taesoo Kim Ada Gavrilovska Georgia Institute of Technology

  2. Network Function Virtualization (NFV) Virtualized Network Functions (VNFs) NAT IDS Web Caching VNF NF OS OS OS OS VM VM VM VM Hypervisor Hardware NFV Infrastructure

  3. Stateful network functions Virtualized Network Functions (VNFs) NAT IDS Web Caching VNF IP address IP address Policy Policy Cached web Cached Web States States OS OS OS OS VM VM VM VM Hypervisor Hardware NFV Infrastructure

  4. “Introspection Risk for NFV 
 Hypervisor introspection, including administrative and process introspection, presents a risk to confidentiality , integrity , and availability of the NFV. Introspection can enable the ability to view , inject , and/or modify operational state information associate with NFV…” — ETSI GS NFV-SEC 003

  5. S-NFV: Design Goal • Threat Model • Underlying software is untrusted • How can remote parties gain trust on VNFs? • How to ensure the security of NFV stats? Service Customer Provider VNF VNF VNF Service Customer Provider NFV Infrastructure Service Customer Provider

  6. S-NFV: Design Goal • New NFV framework • Integrate with Intel SGX • Ensure the security of NFV applications’ states • Allow remote party to verify • Requires only application-level changes

  7. Intel Software Guard Extensions (Intel SGX) • Intel CPU extensions • Code/Data can be kept in a secure container ( enclave ) • Dedicated physical memory (Enclave Page Cache, EPC) • Different memory access semantics are enforced • Support remote attestation over enclave • Supported by Intel Skylake CPUs • SGX-enabled version is released on October 2015

  8. S-NFV Overview Virtualized Network Functions (VNFs) NAT IDS Web Caching VNF IP address Policy Cached Web States OS OS OS OS VM VM VM VM Hypervisor Hardware EPC S-NFV Framework

  9. S-NFV Overview • Decouple original VNF • S-NFV Enclave: contains states and related logics • S-NFV Host: the rest code of VNF Host process VNF Enclave Attestable memory VNF Logics S-NFV Enclave Data SGX loader SECS, TCS, SSA S-NFV Host VNF States Dynamically increasing

  10. S-NFV Overview • S-NFV Enclave Design • Clear Isolation • Separating out states and related operations from original VNF • Safe APIs • Provide interfaces to support host and enclave interactions without revealing states

  11. Remote Attestation • Leverage SGX’s remote attestation feature to attest S-NFV enclave • Secure bootstrap • Establish secure channel S-NFV Framework Deployment VNF Request Attestation Service Provider S-NFV Enclave Attestation Report SGX loader Quoting Enclave S-NFV Host (EPID)

  12. Case Study: Snort • Snort • Lightweight network intrusion detection system • States: IDS policy (TagNode data structure) • Configured during the bootstrap • Dynamically create/update and used to check packet during the runtime

  13. Implementation • Implement prototype on OpenSGX • Extract TagNode and Tag Operations from Snort • Port on SGX-supported machine (no available SDK as the time of submission) Host process Snort Enclave Attestable memory Tag Operations S-NFV Enclave Data SGX loader SECS, TCS, SSA S-NFV Host TagNode Dynamically increasing

  14. Case Study: Snort • Result • Modify 5 Tag operation APIs • 489 LoC changes to orignal Snort

  15. Evaluation • Based on Packet Performance Monitor plugin in Snort • ~20% overhead on packet processing • ~10% overhead on rule checking avg pkt time (usecs) avg rule time (usecs) 140 2 105 1.5 70 1 35 0.5 0 0 w/o sgx w/ sgx w/o sgx w/ sgx

  16. Conclusion • We take a first step toward protecting network function’s states by proposing new NFV framework • Use Snort as a case study • decoupling an original NFV application to fit S-NFV model • preliminary evaluation on real hardware

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend