Brocade
Brocade
3 Projects, page 1 of 1
assignment_turned_in Project2015 - 2017Partners:Lancaster University, Princeton University, Juniper Networks, Princeton University, VMware +11 partnersLancaster University,Princeton University,Juniper Networks,Princeton University,VMware,Lancaster University,Brocade,Samsung Advanced Institute of Technology,Fortinet,Juniper Networks,Brocade,VMware Inc,Fortinet,Samsung Advanced Institute of Technology,InMon Corp,InMon CorpFunder: UK Research and Innovation Project Code: EP/L022796/1Funder Contribution: 345,908 GBPHighly available information networks are an increasingly essential component of the modern society. Targeted attacks are a key threat to the availability of these networks. These attacks exploit weak components in network infrastructure and attack them, triggering side-effects that harm the ultimate victim. Targeted attacks are carried out using highly distributed attacker networks called botnets comprising between thousands and hundreds of thousands of compromised computers. A key feature is that botnets are programmable allowing the attacker to adapt to evolve and adapt to defences developed by infrastructure providers. However current network infrastructure is largely static and hence cannot adapt to a fast evolving attacker. To design effective responses, a programmable network infrastructure enabling large-scale cooperation is necessary. Our research will create a new form of secure network infrastructure which detects targeted attacks on itself. It then automatically restructures the infrastructure to maximise attack resilience. Finally, it self-verifies whether global properties of safety and correctness can be assured even though each part of the infrastructure only has a local view of the world. Our research will examine techniques to collect and merge inferences across distributed vantage points within a network whilst minimising risks to user privacy from data-aggregation using novel privacy techniques. We make a start on addressing the risks introduced by programmability itself, by developing smart assurance techniques that can verify evidence of good intention before the infrastructure is reprogrammed. We set three fundamental design objectives for our design: (1) Automated and seamless restructuring of network infrastructure to withstand attacks aimed at strategic targets on the infrastructure. (2) A measurement system that allows dynamic allocation of resources and fine control over the manner, location, frequency, and intensity of data collected at each monitoring location on the infrastructure. (3) Assurance of safety and compliance to sound principles of structural resilience when infrastructure is reprogrammed. Our aim is to develop future network defences based on a smart and evolving network infrastructure.
more_vert assignment_turned_in Project2016 - 2018Partners:NORDUnet, Airbnb, Google Inc, University of Edinburgh, Alcatel-Lucent (United States) +6 partnersNORDUnet,Airbnb,Google Inc,University of Edinburgh,Alcatel-Lucent (United States),Brocade,Google Inc,Airbnb,Brocade,NORDUnet,Alcatel-LucentFunder: UK Research and Innovation Project Code: EP/N033981/1Funder Contribution: 276,977 GBPRecent advances in server and network virtualisation have given rise to the Infrastructure-as-a-Service paradigm where businesses can lease resources from cloud datacentre operators, thus enabling the outsourcing of ICT. Such businesses can themselves be application and service providers who act as tenants of a shared data centre infrastructure. The tenants resize their ICT footprint through the pay-as-you-go pricing model, thereby maintaining low capital (and operational) expenditure and increasing their profit margin. This infrastructural abstraction allows tenants to focus solely on their business delivery model while leaving the infrastructure maintenance to the operators. However, the resulting lack of visibility to the dynamic state of the underlying infrastructure can immensely hurt the services of the tenants when its performance fluctuates in short timescales. This prohibits the more pervasive migration of businesses to the cloud who are instead forced to maintain their own, in-house infrastructures. Adding to the problem, security risks are more acute in the cloud. Attackers can leverage cloud servers to launch DDoS attacks to other tenants or faster portscan to identify vulnerable services. Especially tenants are completely excluded from detecting security threats and from taking remedial action autonomously as the incidents unfold. Vulnerable services can end up consuming immense amounts of compute and network resources, leading to unsustainable bills for tenants who ultimately may have to retreat their services from the cloud. Existing measurement and monitoring approaches are inadequate because they are architected specifically for accounting, traffic engineering or offline debugging. Measurements from these approaches provide no clue on whether an application suffers self-induced congestion or cyber-attacks, there are some other offending flows/applications, or unacceptable latencies are due to long queueing delay at certain switch or application components, and how many flows are impacted by them. While addressing these problems itself is important to cloud operators, doing so in a timely fashion is often simply impossible because software and hardware updates take time and new pathological traffic patterns may arise as applications evolve. The overarching goal of this project is to design and develop a native Network Measurement-as-a-Service (NMaaS) framework that will allow tenants to express their measurement needs, and to subsequently synthesise the corresponding complex service-level performance functions out of simple monitoring primitives. The required primitive measurement components will be dynamically and transparently instantiated when and where required throughout the infrastructure, exploiting the temporal available capacity of servers and network nodes. In particular, we aim to: - devise novel server and switch instrumentation capabilities for traffic monitoring and make them as a native part of an underlying infrastructure so that they can support diverse measurement functions while alleviating measurement errors and uncertainties - develop a network-wide, centrally-orchestrated algorithm for the synthesis of complex metrics through the optimal placement of server-based and switch-based measurement functions in virtual and physical network components - design and develop measurement requirement description APIs to parse high-level measurement specifications issued by tenants and transform them into low-level measurement indicators. Ultimately, we aim to demonstrate that the proposed framework will contribute significantly in maintaining the desired application performance while at the same time improving the utilisation of cloud resources. Given that the cloud is still a rapidly growing global business, we anticipate that the research outcome will greatly benefit the wider IT industry.
more_vert assignment_turned_in Project2018 - 2019Partners:Princeton University, University of Strathclyde, University of Strathclyde, Juniper Networks, Princeton University +11 partnersPrinceton University,University of Strathclyde,University of Strathclyde,Juniper Networks,Princeton University,VMware,InMon Corp,Samsung Advanced Institute of Technology,Fortinet,Brocade,VMware Inc,Juniper Networks,Brocade,Fortinet,Samsung Advanced Institute of Technology,InMon CorpFunder: UK Research and Innovation Project Code: EP/L022796/2Funder Contribution: 119,677 GBPHighly available information networks are an increasingly essential component of the modern society. Targeted attacks are a key threat to the availability of these networks. These attacks exploit weak components in network infrastructure and attack them, triggering side-effects that harm the ultimate victim. Targeted attacks are carried out using highly distributed attacker networks called botnets comprising between thousands and hundreds of thousands of compromised computers. A key feature is that botnets are programmable allowing the attacker to adapt to evolve and adapt to defences developed by infrastructure providers. However current network infrastructure is largely static and hence cannot adapt to a fast evolving attacker. To design effective responses, a programmable network infrastructure enabling large-scale cooperation is necessary. Our research will create a new form of secure network infrastructure which detects targeted attacks on itself. It then automatically restructures the infrastructure to maximise attack resilience. Finally, it self-verifies whether global properties of safety and correctness can be assured even though each part of the infrastructure only has a local view of the world. Our research will examine techniques to collect and merge inferences across distributed vantage points within a network whilst minimising risks to user privacy from data-aggregation using novel privacy techniques. We make a start on addressing the risks introduced by programmability itself, by developing smart assurance techniques that can verify evidence of good intention before the infrastructure is reprogrammed. We set three fundamental design objectives for our design: (1) Automated and seamless restructuring of network infrastructure to withstand attacks aimed at strategic targets on the infrastructure. (2) A measurement system that allows dynamic allocation of resources and fine control over the manner, location, frequency, and intensity of data collected at each monitoring location on the infrastructure. (3) Assurance of safety and compliance to sound principles of structural resilience when infrastructure is reprogrammed. Our aim is to develop future network defences based on a smart and evolving network infrastructure.
more_vert
