More Videos...
 

NS2 PROJECTS CODE

We start from a simplified motivating example to illustrate the basic idea of NSV.In addition to basic elements such as machines (server/client) and forwarding hardware (switch/router), cloud networks typically consist of a large number of pre-installed (fixed-location) middleboxes and security devicesTo maximize the utilization of already installed security middle-boxes, ns2 projects code transparently redirect network flows to desirable security middle-boxes when needed. For example,if a security policy specifies that a network flow should be investigated by a security service, our NSV technology delivers or redirects the flow to the defined security middle-boxes (regardless of its actual physical location) automatically and transparently.Routing rule generator creates routing paths to control each network flow. ns2 projects code creating routing paths, this module investigates security polices (from each tenant) to satisfy their requirements. For example, if a tenant defines a security policy that specifies all network flows to port 80 should be inspected by a NIDS attached to a router A, then this module produces (a) routing path(s) to let all network packets heading to port 80 pass through the router A.It is not easy to realize network security virtualiza-tion (NSV) with traditional network technology because it lacks several features, such as network-wide monitoring,network configuration, network flow control, and response management. Device and policy manager is in charge of two main functions. First, it receives the information of security devices from a cloud administrator, and it stores that information into a device table in N ET S EC V ISOR for further usage. Second,this module also receives security requests from each network tenant, and it translates them into security policies and stores the policies into a policy table.The second approach is to find the shortest path between a start node and an end node passing through each intermediate security node. We start from a simplified motivating example to illustrate the basic idea of NSV.In addition ns2 projects code  elements such as machines (server/client) and forwarding hardware (switch/router), cloud networks typically consist of a large number of pre-installed (fixed-location) middleboxes and security devicesTo maximize the utilization of already installed security middle-boxes, we transparently redirect network flows to desirable security middle-boxes when needed. For example,if a security policy specifies that a network flow should be investigated by a security service, our NSV technology delivers or redirects the flow to the defined security middle-boxes (regardless of its actual physical location) automatically and transparently.Routing rule generator creates routing paths to control each network flow. When creating routing paths, this module investigates security polices (from each tenant) to satisfy their requirements. For example, if a tenant defines a security policy that specifies all network flows to port 80 should be inspected by a NIDS attached to a router A, then this module produces (a) routing path(s) to let all network packets heading to port 80 pass through the router A.It is not easy to realize network security virtualiza-tion (NSV) with traditional network technology because it lacks several features, such as network-wide monitoring,network configuration, network flow control, and response management. Device and policy manager is in charge of two main functions. First, it receives the information of security devices from a cloud administrator, and it stores that information into a device table in N ET S EC V ISOR for further usage. Second,this module also receives security requests from each network tenant, and it translates them into security policies and stores the policies into a policy table.The second approach is to find the shortest path between a start node and an end node passing through each intermediate security node. Find-ing this path is more complicated than finding the shortest path between two nodes, because in this case, we should make sure that the found path include all intermediate nodes.

Related Pages