Automating Security Configuration �in Virtualized Computer Networks
1
Daniele Bringhenti
XXXV PhD Cycle – 3rd Year Student
Advisors: Prof. Riccardo Sisto, Dott. Fulvio Valenza
August 29, 2022 – FOSAD PhD Forum
Security Management in Virtualized Networks�
In virtualized networks, security management has become a daunting task because of:
2
August 29, 2022 – FOSAD PhD Forum D. Bringhenti
Achieving a correct configuration for
virtual Network Security Functions (NSFs) is complex.
Security Misconfiguration
3
August 29, 2022 – FOSAD PhD Forum D. Bringhenti
82% of breaches involved the human errors for
security configuration in 2021.
:
Introducing Automation
Automation can help avoid security misconfiguration:
4
August 29, 2022 – FOSAD PhD Forum D. Bringhenti
Manual configuration is error-prone, unoptimized, time consuming.
Main problem:
Security Automation Proposal
My proposal is to pursue a Security Automation approach for the orchestration and configuration of NSFs in virtualized networks:
5
August 29, 2022 – FOSAD PhD Forum D. Bringhenti
Automation
Formal Verification
Optimization
Network Security
Related Work
In the literature, other works do not guarantee all these three features at the same time:
6
August 29, 2022 – FOSAD PhD Forum D. Bringhenti
VEREFOO
7
VErified REFinement and Optimized Orchestration
Automation
Formal Verification
Optimization
August 29, 2022 – FOSAD PhD Forum D. Bringhenti
VEREFOO Approach
8
Input
Output
Virtual Network Topology
NSFs allocation scheme
Network Security Policies
NSFs configurations
August 29, 2022 – FOSAD PhD Forum D. Bringhenti
Formal Verification in VEREFOO
9
Correctness-by-construction
Network formal models
August 29, 2022 – FOSAD PhD Forum D. Bringhenti
VErified REFinement and Optimized Orchestration
MaxSMT Problem Formulation�
Partial weighted MaxSMT: an optimization-enhanced version of the Satisfiability Modulo Theories (SMT) problem.
10
soft constraints
hard constraint
t
t
t
f
August 29, 2022 – FOSAD PhD Forum D. Bringhenti
Network Formal Models
11
11
August 29, 2022 – FOSAD PhD Forum D. Bringhenti
Optimization in VEREFOO
12
Correctness-by construction
Network formal models
Optimization objectives
Trade-off with performance
August 29, 2022 – FOSAD PhD Forum D. Bringhenti
VErified REFinement and Optimized Orchestration
Optimization Objectives (I)
VEREFOO has two optimization objectives.
13
August 29, 2022 – FOSAD PhD Forum D. Bringhenti
For each Allocation Place, a class of soft constraints is introduced:
The optimal allocation scheme does not have any allocated NSF – but, if a NSF is needed to enforce the NSPs, then it is allocated to satisfy the hard constraints.
Optimization Objectives (II)
14
August 29, 2022 – FOSAD PhD Forum D. Bringhenti
VEREFOO Framework
Integration:
15
Implementation:
August 29, 2022 – FOSAD PhD Forum D. Bringhenti
EU projects:
VEREFOO GUI
16
Virtual Network Topology
Network Security Policies
Network Configuration
August 29, 2022 – FOSAD PhD Forum D. Bringhenti
VEREFOO GitHub Repository and Demo
Demo:
(e.g., iptables, eBPF firewall, Open vSwitch)
17
GitHub Repository:
August 29, 2022 – FOSAD PhD Forum D. Bringhenti
VEREFOO Validation [8]
18
August 29, 2022 – FOSAD PhD Forum D. Bringhenti
Conclusions and Future Work
Future Work:
19
Conclusions:
August 29, 2022 – FOSAD PhD Forum D. Bringhenti
Daniele Bringhenti
VEREFOO GitHub Repository:
https://github.com/netgroup-polito/verefoo
VEREFOO Demo:
Thanks for your attention!
References
[1] Y. Bartal, A. Mayer, K. Nissim, and A. Wool, “Firmato: A novel firewall management toolkit,” ACM Trans. Comput. Syst., vol. 22, no. 4, pp. 381–420, Nov. 2004.
[2] P. Verma and A. Prakash, “FACE: A firewall analysis and configuration engine,” in 2005 IEEE/IPSJ International Symposium on Applications and the Internet, Trento, Italy, Feb. 2005.
[3] K. Adi, L. Hamza, and L. Pene, “Automatic security policy enforcement in computer systems,” Computers & Security, vol. 73, pp. 156–171, 2018.
[4] A. Gember-Jacobson, A. Akella, R. Mahajan, and H. H. Liu, “Automatically repairing network control planes using an abstract representation,” in Proceedings of the 26th Symposium on Operating Systems Principles, Shanghai, China, Oct. 2017.
[5] M. Yoon, S. Chen, and Z. Zhang, “Minimizing the maximum firewall rule set in a network with multiple firewalls,” IEEE Trans. Computers, vol. 59, no. 2, pp. 218–230, 2010.
[6] M. A. Rahman and E. Al-Shaer, “Automated synthesis of distributed network access controls: A formal framework with refinement,” IEEE Trans. Parallel Distrib. Syst., vol. 28, no. 2, pp. 416–430, 2017.
[7] D. Bringhenti, G. Marchetto, R. Sisto, S. Spinoso, F. Valenza and J. Yusupov, "Improving the Formal Verification of Reachability Policies in Virtualized Networks," in IEEE Transactions on Network and Service Management, vol. 18, no. 1, pp. 713-728, 2021.
[8] D. Bringhenti, G. Marchetto, R. Sisto, F. Valenza and J. Yusupov, "Automated firewall configuration in virtual networks," in IEEE Transactions on Dependable and Secure Computing, in press, 2022.
21
August 29, 2022 – FOSAD PhD Forum D. Bringhenti