SlideShare a Scribd company logo
Security & Fault Tolerance in FRESCO
AMIT LANJEWAR |SYMBIOSIS
Introduction
 Modular Compassable Security
Service
 An OF security application
development framework
 Facilitates rapid designing, modular
composition of modules.
 Offers a CLICK-inspired programming
framework.
 Designed with an intent to address
several key issues accelerating
composition of new OF-enabled
security services.
FRESCO
Exports scripting API.
Libraries represent the elementary processing units
in FRESCO.
16 re-usable modules.
FRESCO introduces minimal overhead.
Can produce flow rules, and thus provide an efficient
means to implement security directives.
Security Functions such as - simple address
blocking to complex flow redirection procedures.
Fresco Countermeasure module.
Fresco Response module.
Fresco Database module.
Summary – Simplifies development and deployment
of security services for OF n/w.
Enables rapid creation of popular security functions
with significantly (over 90%) fewer lines of code.
SDN Architecture
Security & fault tolerance in fresco
Security & fault tolerance in fresco
FRESCO DESIGN
FRESCO Framework
Application Layer Security Enforcement Kernel (SEK)
FRESCO Script Language
 To simplify development of security applications
 FRESCO provides its own script language.
 configure modules through a FRESCO script.
 Defining an instance is very similar to defining a function in C or C++.
Operational illustration of running FRESCO script
FRESCO Security Enforcement Kernel
 Security applications developed in FRESCO - security policies, such as
DROP, REDIRECT, QUARANTINE.
 These policies will be automatically translated into flow rules.
 Flow rules for non-security-critical applications:-
1. Rule Source Identification
2. Rule Conflict Detection
3. Conflict Resolution
Case Study
 Implementing Reflector Net
 Cooperating with a Legacy Security Application :-
Implementation of Fresco Architecture
 Implementation We have developed a prototype implementation of the
FRESCO architecture.
 The FRESCO Application Layer prototype is implemented in Python and
runs as an OpenFlow application on NOX.
 The prototype operates on NOX version 0.5.0 using the OpenFlow 1.1.0
protocol, and is implemented in approximately 3,000 lines of Python.
Fresco Services
1. FRESCO Scan Deflector Service
 2. FRESCO BotMiner Service
 FRESCO P2P Plotter Service
Advantages
 Enables rapid creation of popular security functions.
 Fewer lines of code.
 minimal overhead for use in live network environments.
 FRESCO also exports a high-level API in the FRESCO language that
abstracts away complexities relating to switch management and specific
controller implementations.
 can enforce diverse security policies
 Implementing Reflector Net FRESCO’s power stems from its ability to
use OpenFlow to effectively reprogram the underlying network
infrastructure to defend the network against an emerging threat
Thank You!

More Related Content

PDF
Make your OpenStack Cloud Self-Defending with VESPA!
PDF
message passing interface
DOCX
message passing interface
PDF
a famework for analyzing template security and privacy in biometric authenti...
PDF
Infrastructure as (Secure) Code
PDF
secureTF: A Secure TensorFlow Framework
PPTX
IP Security and its Components
Make your OpenStack Cloud Self-Defending with VESPA!
message passing interface
message passing interface
a famework for analyzing template security and privacy in biometric authenti...
Infrastructure as (Secure) Code
secureTF: A Secure TensorFlow Framework
IP Security and its Components

What's hot (18)

PDF
TEEMon: A continuous performance monitoring framework for TEEs
PDF
I psec cisco
PDF
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
PDF
Cns unit4
PPT
An Architectural Concept for Intrusion Tolerance in Air Traffic Networks
DOC
Network security
PPT
Tossim Accurate And Scalable Simulation Of Entire Tiny Os Applications Sensys03
PPTX
Lecture 07 networking
PPT
IT103Microsoft Windows XP/OS Chap11
PPTX
I psecurity
PDF
74080-1421272433
PDF
'Moon' Security Management System for OPNFV
PPT
1.Architecture
PDF
Generating Signatures for cyberattacks.
PPTX
Security protocols in constrained environments
PPTX
Ethical hacking Chapter 7 - Enumeration - Eric Vanderburg
PDF
IEEE NFV-SDN 2017 - On the establishment of trust in the cloud-based ETSI NFV...
DOCX
Effective key management in dynamic wireless sensor networks
TEEMon: A continuous performance monitoring framework for TEEs
I psec cisco
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
Cns unit4
An Architectural Concept for Intrusion Tolerance in Air Traffic Networks
Network security
Tossim Accurate And Scalable Simulation Of Entire Tiny Os Applications Sensys03
Lecture 07 networking
IT103Microsoft Windows XP/OS Chap11
I psecurity
74080-1421272433
'Moon' Security Management System for OPNFV
1.Architecture
Generating Signatures for cyberattacks.
Security protocols in constrained environments
Ethical hacking Chapter 7 - Enumeration - Eric Vanderburg
IEEE NFV-SDN 2017 - On the establishment of trust in the cloud-based ETSI NFV...
Effective key management in dynamic wireless sensor networks
Ad

Similar to Security & fault tolerance in fresco (20)

PDF
GitOps meets Serverless
PDF
Charlotte Gayton's OpenChain ISO 18974 Dissertation
PDF
Luncheon 2015-01-15 - Managing Security Requirements in Software Projects by ...
PDF
FRED: A Hosted Data Flow Platform for the IoT
PDF
Anomaly_Analysis_of_OpenStack_Firewall_Polices_Report
PDF
Putting the Sec into DevOps
PDF
Orion NTA Customer Training
PDF
DevSecOps: Putting the Sec into the DevOps
PDF
OS_File_systems_Consistency_Semantics.ppt
PPTX
SLIDE DECK - NFRs vs FRs.pptx
PDF
FASTEN H2020 project presentation at Paris Open Source Summit, December 2019.
PPT
Flux: A Language for Programming High-Performance Servers
PDF
software defined network, openflow protocol and its controllers
PPTX
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...
PDF
System Security @ NECSTLab
PPTX
Securing and automating your application infrastructure meetup 23112021 b
PDF
A story of the passive aggressive sysadmin of AEM
PDF
Reactive: Programming -> Systems -> Architecture
PDF
Agile integration: Decomposing the monolith
PDF
Secure software chapman
GitOps meets Serverless
Charlotte Gayton's OpenChain ISO 18974 Dissertation
Luncheon 2015-01-15 - Managing Security Requirements in Software Projects by ...
FRED: A Hosted Data Flow Platform for the IoT
Anomaly_Analysis_of_OpenStack_Firewall_Polices_Report
Putting the Sec into DevOps
Orion NTA Customer Training
DevSecOps: Putting the Sec into the DevOps
OS_File_systems_Consistency_Semantics.ppt
SLIDE DECK - NFRs vs FRs.pptx
FASTEN H2020 project presentation at Paris Open Source Summit, December 2019.
Flux: A Language for Programming High-Performance Servers
software defined network, openflow protocol and its controllers
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...
System Security @ NECSTLab
Securing and automating your application infrastructure meetup 23112021 b
A story of the passive aggressive sysadmin of AEM
Reactive: Programming -> Systems -> Architecture
Agile integration: Decomposing the monolith
Secure software chapman
Ad

Recently uploaded (20)

PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Basic Mud Logging Guide for educational purpose
PDF
RMMM.pdf make it easy to upload and study
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
Pharma ospi slides which help in ospi learning
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Complications of Minimal Access Surgery at WLH
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Pre independence Education in Inndia.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Computing-Curriculum for Schools in Ghana
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Basic Mud Logging Guide for educational purpose
RMMM.pdf make it easy to upload and study
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Pharma ospi slides which help in ospi learning
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Complications of Minimal Access Surgery at WLH
Insiders guide to clinical Medicine.pdf
Renaissance Architecture: A Journey from Faith to Humanism
Anesthesia in Laparoscopic Surgery in India
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Pre independence Education in Inndia.pdf
Supply Chain Operations Speaking Notes -ICLT Program
GDM (1) (1).pptx small presentation for students
Computing-Curriculum for Schools in Ghana
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
human mycosis Human fungal infections are called human mycosis..pptx
Pharmacology of Heart Failure /Pharmacotherapy of CHF

Security & fault tolerance in fresco

  • 1. Security & Fault Tolerance in FRESCO AMIT LANJEWAR |SYMBIOSIS
  • 2. Introduction  Modular Compassable Security Service  An OF security application development framework  Facilitates rapid designing, modular composition of modules.  Offers a CLICK-inspired programming framework.  Designed with an intent to address several key issues accelerating composition of new OF-enabled security services.
  • 3. FRESCO Exports scripting API. Libraries represent the elementary processing units in FRESCO. 16 re-usable modules. FRESCO introduces minimal overhead. Can produce flow rules, and thus provide an efficient means to implement security directives. Security Functions such as - simple address blocking to complex flow redirection procedures. Fresco Countermeasure module. Fresco Response module. Fresco Database module. Summary – Simplifies development and deployment of security services for OF n/w. Enables rapid creation of popular security functions with significantly (over 90%) fewer lines of code.
  • 7. FRESCO DESIGN FRESCO Framework Application Layer Security Enforcement Kernel (SEK)
  • 8. FRESCO Script Language  To simplify development of security applications  FRESCO provides its own script language.  configure modules through a FRESCO script.  Defining an instance is very similar to defining a function in C or C++.
  • 9. Operational illustration of running FRESCO script
  • 10. FRESCO Security Enforcement Kernel  Security applications developed in FRESCO - security policies, such as DROP, REDIRECT, QUARANTINE.  These policies will be automatically translated into flow rules.  Flow rules for non-security-critical applications:- 1. Rule Source Identification 2. Rule Conflict Detection 3. Conflict Resolution
  • 11. Case Study  Implementing Reflector Net  Cooperating with a Legacy Security Application :-
  • 12. Implementation of Fresco Architecture  Implementation We have developed a prototype implementation of the FRESCO architecture.  The FRESCO Application Layer prototype is implemented in Python and runs as an OpenFlow application on NOX.  The prototype operates on NOX version 0.5.0 using the OpenFlow 1.1.0 protocol, and is implemented in approximately 3,000 lines of Python.
  • 13. Fresco Services 1. FRESCO Scan Deflector Service
  • 14.  2. FRESCO BotMiner Service
  • 15.  FRESCO P2P Plotter Service
  • 16. Advantages  Enables rapid creation of popular security functions.  Fewer lines of code.  minimal overhead for use in live network environments.  FRESCO also exports a high-level API in the FRESCO language that abstracts away complexities relating to switch management and specific controller implementations.  can enforce diverse security policies  Implementing Reflector Net FRESCO’s power stems from its ability to use OpenFlow to effectively reprogram the underlying network infrastructure to defend the network against an emerging threat