Table of Contents
– Cybersecurity Challenges
– Defending Against Attacks
– Datacenter Security
– Software Defined Security
– Where to Start
– Comprehensive Visibility
– Dataplane Visibility with IPFIX
– Accelerated sFlow
– Large Scale ACLs
– Security Monitoring with DANZ
– Choosing the Right Security Tools
– Scaling Next-Gen Security
– Dynamic Defense-In-Depth
– DFA During an Attack
Security ChallengesAdvanced cybersecurity threats threats are now more targeted and stealthy. They no longer focus on denial of service alone, but on the valuable data residing in the data center. Intrusions, DDoS attacks, APTs, undetectable back-door break-ins, complex multi-phase targeted attacks, are often nearly impossible to detect.
Defending Against AttacksActionable intelligence and normal base-lining are critical to defend enterprises of all types against attacks and data loss.
Detecting attack patterns early and responding to risks through automated approaches is vital to modern cyberdefense and loss mitigation strategy.
Solution ElementsEstablishing active monitoring policy and active response plans provides the best defense against targeted attacks using:
- Multi-tenant access and cross-tenant protection in virtualized cloud networks
- Transmitting Flow information over the network using IPFIX
- Accelerated sFlow for high capacity network security and application monitoring
- Large scale ACLs for data plane protection
- Continuous monitoring for data loss and threat protection using Arista DANZ
- Streamlined scalability and services integration with SDN triggers and automation
- DirectFlow Acceleration to provide cloud-scale >100Gbps performance with next generation firewalls
New Datacenter Security RequirementsWhether for government, service provider, or enterprise organizations a new trend toward targeted cyber-attacks has changed the landscape for defense strategies. Stealthy and dangerous multi-phase incursions are prevalent today, using combinations of Denial of Service (DoS), unauthorized access, insertion of malware, and widespread data theft. These advanced attacks are often led by cyber-criminals intent on gaining access to or destroying key data assets without detection.
Fortune 500 enterprises have been losing the war against cyber-criminal forces, according to the 2013 State of Cybercrime Survey from PwC and CSO magazine* which included responses from 500 U.S. executives, security experts, and others from both private and public sectors. These organizations are turning to the latest and best tools for self-defense while trying to determine what economic impact fighting cyber-crime will have on their organizations.
It is widely agreed that no single tool can provide protection against the myriad of attack modes and exploits extant today, while broader strategies can seem economically prohibitive at access speeds of 10Gbps and more. However, organizations with valuable data assets to protect can have high-fidelity threat intelligence that collectively and cost effectively scales to provide a clearer picture of the threat landscape while providing active defenses, by including:
- Distributed perimeter-less protection within the virtualized cloud
- Continuous end-to-end holistic network & system monitoring
- Detection, ranking and correlation of all potential threat activity
- Automated activation of controls and deeper inspection when needed
- Better management of in-placement and overall security cost
Security Imperatives in the Modern Software Defined DatacenterExploding operation complexities have led to many of the key situational factors causing unpreparedness in IT and Security operations to deal with key requirements. In fact, conflicting needs between network and security operations teams have led to high profile breaches in security and data protection. It is imperative that current data center IT and Security operations teams work together to address:
- Service assurance and continuity with limited resources
- Protection for valuable data assets and customer privacy
- Immediate response to mitigate attacks before loss of assets or service occurs
- Maximizing the ROI of security investments while migrating from 1/10Gbps to 40/100Gps
Tiered services providing machine-to-machine communications to provide a complete application add another layer of complexity to detecting and mitigating issues in today’s data center. These application architectures can increase the dependency on high volumes of east-west traffic to build scalable application services for the end-user. Furthermore, the integration of each tier with its corresponding clients through network based APIs can open a new realm for threat propagation that needs to be protected. Cross-tier application-centric visibility, as well as visibility into all east-west and inter-VM traffic, are increasingly becoming critical issues in securing and managing the data center workspace.
Figure 1: The east-west traffic pattern in cloud data centers creates new security challenges
Additionally, a key factor complicating security decisions for the software defined data center is the impact of compute, storage and network virtualization on visibility of east-west traffic. Inter-VM traffic is increasing, as is the importance of isolating and protecting different tenants within the same data center from each other. The impact on data center architectures and deployment of security tools can be profound.
Where to StartWith comprehensive visibility, active path mitigation, and flexible placement of advanced IT operational intelligence tools an IT organization can effectively defend against the emerging threat landscape even at cloud data center scale and with extensive virtualization. By using a flexible data center architecture based on Arista’s Software Driven Cloud Networking, IT and security operations teams are provided with software driven visibility and control that encompasses all in-band and out-of-band requirements for network and application visibility and can provide the automation, services and comprehensive visibility needed to:
- Allow actionable re-distribution of traffic when critical resources are compromised
- Provide a critical role in responding to and recording attacks programmatically
- Inspect all traffic according to profiled attack patterns and redirect it to tools for analysis
- Track what information is being sent to outside recipients (exfiltration)
- Maintain next-generation firewall security for at-risk traffic in-line while maintaining load balancing and HA
Comprehensive VisibilityDefense-in-depth threat protection strategy starts with a solid internal risk assessment and requires visibility into external actions and traffic patterns that could indicate that an attack is in progress. To detect and understand threat vectors effectively it is critical to first understand what is ‘normal’ by establishing effective monitoring and profiling of all network traffic.
Network access speeds above 10Gbps are causing scale issues for many tools designed to monitor traffic in the data center at lower speeds. Application Performance Management (APM), Network Performance Management (NPM) and security tool vendors have addressed the need for increasingly speedy network capture and analysis with faster and larger platforms, but the cost of comprehensive monitoring can still seem prohibitively high.
Arista offers a new approach to monitoring aggregation that delivers high density, non-blocking 10/40/100/400GbE networks powered by award-winning Arista EOS® software to deliver an order of magnitude improvement in the economics of building cloudscale monitoring.
Dataplane Visibility with IPFIXNetwork administrators require access to flow information that pass through various network elements. The IPFIX protocol provides network administrators with access to IP Flow information. The sampled IPFIX export feature is a feature meant to run on sFlowcapable HW. In this model the user can configure sFlow sampling, then use sampled packets to create flow records based on flow key configuration. The IPFIX format is then used to export flow records to a configured collector. This is both CPU and memory intensive functionality. The size of flow table depends on memory available on a particular HW, similarly the sampling interval will depend on the CPU. Arista Platforms with higher memory and high-performing CPUs are an extremely good fit to support IPFIX, which in turn provides the dataplane visibility and increased security at cloud-scale magnitudes.
Accelerated sFlowWithout hardware acceleration, all sFlow processing is done in software, which means that performance is heavily dependent on the capabilities of the host CPU, as seen below.
Large Scale ACLsAccess Control Lists (ACLs) have always been paramount for securing a network. ACLs are stored on TCAM and the TCAM resources get used for a variety of features, limiting the ACL scale on traditional platforms. Arista’s latest platforms provide the ability to increase the scale at least 4x items the previous generations thereby giving the network and security administrators granular control to secure the network and provide the ability to identify the offenders and take corrective action in a timely manner. The Arista Data ANalyZer (DANZ) solution delivers scalable end-to-end network and application monitoring with exceptional flexibility and precision, while enabling existing third-party monitoring tools to integrate directly and cost effectively with captured data while scaling to support 10/40/100/400Gbps.
Figure 2: DANZ - Access any traffic for real-time analysis
While raw packet data provides the best and most detailed source of insight for monitoring of security, performance, and troubleshooting information, there are other information sources that can also be valuable. These include coarse-grained flowanalysis data from sFlow, internal network operational data from machine logs and network event mechanisms made available through Splunk, and precision data such as LANZ queue analysis from Arista switches.
- High density, non-blocking, wire-speed packet capture with advanced traffic management capabilities so all network traffic can be monitored without loss.
- Software Defined Cloud Networking (SDCN) support, enabled by the programmability of Arista EOS, makes it possible to directly steer specific network flows to the desired analysis tools.
- Symmetric per-flow load balancing permits in-line security and monitoring tools to scale to support terabit speeds without loss of per-session awareness.
- The Latency ANalyZer (LANZ) feature enables detection of microbursts and congestion at tool ports so network operators can take appropriate action to maintain network visibility under heavy loads and assure security oversight with 100% fidelity.
- Support for emerging network virtualization models (e.g., vMotion, VXLAN, NVGRE) to maintain visibility of any workload in hyper-dynamic virtualized public and private clouds.
Triggers and automated actions are supported via direct APIs to the network infrastructure. Log monitoring, and packet capture can allow staff to respond quickly by alerting team members by email, and by automatically redirecting suspicious traffic and event logs to the SIEM and traffic recording tools so that responders have the fingerprints of the attackers and the details of the developing attack scenario immediately.
Adding Active Mitigation to Security Monitoring with DANZTypically, the tools that consume raw packet data from packet capture and monitoring architectures like DANZ are focused on providing performance analytics, identifying problems (troubleshooting), and detecting anomalies in complex cross-tier applications. However, a new approach to active mitigation of attacks using the intelligence of these tools now uses programmability of the network through Software Defined Networking (SDN) APIs to provide rapid active mitigation.
Figure 3: DANZ - Active Mitigation with Advanced Security Tools
Modern network monitoring architectures like DANZ use advanced network hardware capabilities to provide access to specific targeted data on the network for each tool and to condition the traffic before arrival at the tool for greatest efficiency. Out-of-band monitoring can complement in-line mitigation solutions where in-line security devices may otherwise increase latency and slow down overall network performance efficiency.
Choosing the Right Security Tools for Defense-In-DepthIn reality, no singular security tool or vendor can make the claim that their products are an InfoSec panacea nor should they. Most will make valid claims about the ineffectiveness of widely used security techniques, for example, the many flaws of signature-based or statistical-based approaches to threat detection. Actual solutions require a well thought out combination of knowledge, products and/or services to baseline normal behavior, and mitigation solutions to combat the increasingly skilled adversaries targeting businesses. Currently there are wide varieties of technologies available to allow teams to respond effectively to the mounting pressure to intercept attacks.
|Security Technologies - Perceived Strengths and Weaknesses|
|Network Traffic Monitors (Sniffers, IDS, IPS, Packet Recorders, Data Analytics)||Can provide insights on both normal and abnormal network traffic flows with adequate analysis. Traffic recorders can also be very valuable as forensic tools.||Unable to monitor secure data streams (IPSEC, HTTPS, encrypted tunnels), and poor resolution of security risks unless combined with SIEM data.|
|Active Network Scanners (Application Probes, Port Probes, to Identify Resources and exposed Personally Identifiable Information (PII))||Continuous probing and monitoring improves situational awareness and historical trail of when assets were in-placed on the network.||Can be expensive to deploy in a dynamic high performance segmented cloud. Storing and securing massive amounts of data is slow and complex analytics can prevent timely insight.|
|In-line Firewalls and Gateways (Stateful filtering, email monitoring, content scanning, anti-virus, etc.)||Only option to capture and block unknown zero-day exploits from outside sources. Less effective at capture inter-tenant vulnerabilities or those brought into the network by hosts.||Virtualized gateways and firewalls in the cloud are trivial to detect and evade with malware, and zero-day exploits can bypass signature-based gateways|
|Security Information and Event Analytics (SIEM)||Provides integration and analytics on macro (log) data from various tools, platforms, etc. Easiest way to manage a defense in depth strategy||Cannot operate alone and needs variety of other tools deployed to detect actual threat conditions and events. Consider this a complement to other tools.|
The best chance of a successful security strategy is to continually adapt to the arms race between emerging attack tools and best-inclass defenses, bringing together expertise with complementary devices and techniques that have proven themselves most capable in their respective arenas. By using a variety of tools to discover and baseline network and application behaviors, organizations can identify risks and focus areas that may indicate an actual active threat in progress.
In addition, detecting normal traffic patterns aids in the real-time and forensic discovery of attacks and probing that can precede attacks and allows actionable insights to be used in preparation of automated policies and triggers that can defend against an unknown or unexpected attacker. Broader use of IT operational intelligence capabilities, based on a variety of monitoring capabilities, has been shown to provide insight into new and emerging threats such as zero-day attacks and APTs better than monolithic monitoring architectures alone.
Scaling Next Generation Security with Arista SDNBy following SDN principles and techniques, requirements to insert tools in-line, such as for firewalls, can be accommodated while providing global visibility through out-of-band analytics. The SDN capabilities of Arista EOS network operating system include controller-independent architectures using DirectFlow and OpenFlow APIs, automated cloud integration with OpenStack and leading network and compute virtualization platforms such as VMware vSphere/NSX and Microsoft HyperV.
Further, security continuity in hyper-dynamic virtualized cloud environments can be assured through binding of security services with Arista’s VM-aware architecture dynamically. Whenever the virtualized network, virtualized compute and storage infrastructure changes to accommodate in-motion workloads, the relevant policies and tool configurations can be dynamically configured through network automation scripts. This model provides persistent visibility in any dynamic cloud environment. Providing active defense using continuous real-time monitoring, VM-aware visibility using Arista VMtracer and provision of trip-wires at all possible attack points are possible at scale.
Example of Dynamic Defense-In-Depth with Arista DirectFlow Assist (DFA)DirectFlow Assist (DFA) is an EOS extension that runs on an Arista switch to dynamically insert flow table entries via Arista’s DirectFlow API, in order to offload or assist an attached in-line or out-of-band security platform such as a firewall. By providing integrated control over network forwarding to the firewall, DFA allows dynamic security policies to be applied in the network based on intelligence derived from out-of-band monitoring, deep packet inspection (DPI), and other analysis technologies.
The scaling and performance benefits of DFA integration allow security platforms to scale performance up to 10-50x over static in-line deployments and provide a scaling model that can be applied in any virtualized or cloud based environment. Use cases for the DFA solution include DDoS attack mitigation and offload for next generation firewalls, content inspection platforms, and IDS/IPS among others.
- DDoS Attack Mitigation, selectively blocking packets in-flow based on DoS detection in attached analytic platforms.
- Elephant Flow Offload, inserting a flow entry to bypass the firewall for trusted application traffic such as backups.
- Firewall Scaling, providing flow-by-flow bypass and filtering based on firewall DPI discovery and classification.
- Redirection of target traffic to a ‘honeypot’ or decoy platform for both profiling and prosecution.
What Happens in DFA During an Attack?When an attack happens, an application can instruct the network comprised of SDN-capable switches to or drop the attack traffic flows in hardware without affecting the performance of the system or network.
Alternatively, suspect traffic may be redirected for deeper analysis by next-generation firewalls, IDS/IPS platforms, or other security solutions. Traffic manipulation that can be commanded with active mitigation can include:
- Bypass or block target flows in the network
- Capture and recording of suspect traffic for later analysis and prosecution of attackers
- Explicit traffic redirection to a target (such as a honeypot or traffic recorder)
- Other user-defined actions such as triggering alarms or other platforms to perform additional functions
Figure 4: Using SDN Firewall Insertion with DFA
When DFA receives a flow-classification message from the firewall it validates the message and then parses out a “DFA Flow Specification”. The Flow Specification includes a unique flow name, match criteria, desired action, priority and lifetime. Match criteria may include source and destination IP addresses, source and destination layer-4 ports and protocol (ICMP, TCP or UDP) depending on the type of flow and custom configuration file settings. The action on the switch will either be to drop packets in the flow or to output packets to a specific switch port in order to bypass the firewall or provide further analysis.
For bypassed flows, an additional Flow Specification is automatically created for the reverse direction return traffic flow to provide symmetry. Flow entries can use aging where EOS will delete the flow entry after a specified lifetime interval, or flows can be explicitly removed by the firewall.
Figure 5: Policy Insertion - Trigger and Action
From the Flow Specification DFA generates a sequence of EOS DirectFlow API configuration commands to create the flow table entry. It then uses eAPI to send this configuration command sequence to EOS. DFA includes a command line shell with various commands for monitoring currently active flows, deleting flows as well as starting and stopping the DirectFlow Assist process.
Figure 6: Policy Execution - DoS Mitigation Example
DFA is an example of the flexibility of Arista’s Software Driven Cloud Networking (SDCN) capabilities and uses a small subset of the capabilities of the Arista EOS operating system and its APIs. Arista SDCN combines the principles that have made cloud computing the unstoppable force that it is: automation, self service provisioning, and linear scaling of both performance and economics, coupled with network virtualization, custom programmability, simplified architectures, and extreme efficiency.
ConclusionThe combination of cloud features of the Arista EOS software platform for improved monitoring at scale, robust ACL support, DANZ for advanced network visibility, and DirectFlow Assist (DFA) create a unique, open, and best-in-class software foundation for maximizing the security of the network to both the enterprise and service provider data center: a new architecture for the most mission-critical location within the IT infrastructure that simplifies management and provisioning, speeds up service delivery, lowers costs while creating opportunities for service differentiation and places control and visibility back into the hands of the network, security and systems administrators.
Arista’s SDCN, in combination with our security partners, provides a comprehensive solution to the conundrum of scaling and integrating effective security in the modern cloud data center. These solutions are available today and address the growing need for defense-in-depth.
According to a 2013 study by Ponemon Institute, cyber-attacks, which target specific servers, caused 18% of data center outages in 2013, up from just 2% in 2010. These attacks have increased dramatically as commercially available attack tools have improved and network speeds have increased, making it easier to generate massive amounts of dummy traffic and overwhelm in-line defenses. Dealing with these attacks often requires specialized techniques, using advanced analytics and forensic expertise according to Ponemon.
*2013 State of Cybercrime Survey courtesy of PwC, CSO magazine, the U.S. Secret Service and the Software Engineering Institute CERT Program at CarnegieMellon University