OpenFlow-enabled dynamic DMZ for local networks
dc.contributor.author | Wu, Haotian | |
dc.date.accessioned | 2017-11-16T22:36:15Z | |
dc.date.available | 2017-11-16T22:36:15Z | |
dc.date.graduationmonth | December | en_US |
dc.date.issued | 2017-12-01 | en_US |
dc.date.published | 2017 | en_US |
dc.description.abstract | Cybersecurity is playing a vital role in today's network. We can use security devices, such as a deep packet inspection (DPI) device, to enhance cybersecurity. However, a DPI has a limited amount of inspection capability, which cannot catch up with the ever-increasing volume of network traffic, and that gap is getting even larger. Therefore, inspecting every single packet using DPI is impractical. Our objective is to find a tradeoff between network security and network performance. More explicitly, we aim at maximizing the utilization of security devices, while not decreasing network throughput. We propose two prototypes to address this issue in a demilitarized zone (DMZ) architecture. Our first prototype involves a flow-size based DMZ criterion. In a campus network elephant flows, flows with large data rate, are usually science data and they are mostly safe. Moreover, the majority of the network bandwidth is consumed by elephant flows. Therefore, we propose a DMZ prototype that we inspect elephant flows for a few seconds, and then we allow them to bypass DPI inspection, as long as they are identified as safe flows; and they can be periodically inspected to ensure they remain safe. Our second prototype is a congestion-aware DMZ scheme. Instead of determining whether a flow is safe or not by its size, we treat all flows identically. We measure the data rates of all flows, and use a global optimization algorithm to determine which flows are allowed to safely bypass a DPI. The objective is to maximize DPI utilization. Both prototypes are implemented using OpenFlow in this work, and extensive experiments are performed to test both prototypes' feasibility. The results attest that the two prototypes are effective in ensuring network security while not compromising network performance. A number of tools for SDN network configuring and testing are also developed. | en_US |
dc.description.advisor | Don M. Gruenbacher | en_US |
dc.description.advisor | Caterina M. Scoglio | en_US |
dc.description.degree | Doctor of Philosophy | en_US |
dc.description.department | Department of Electrical and Computer Engineering | en_US |
dc.description.level | Doctoral | en_US |
dc.identifier.uri | http://hdl.handle.net/2097/38231 | |
dc.language.iso | en_US | en_US |
dc.publisher | Kansas State University | en |
dc.subject | OpenFlow | en_US |
dc.subject | Software-defined Networking | en_US |
dc.subject | Security | en_US |
dc.subject | Traffic enginerring | en_US |
dc.subject | Demilitarized zone | en_US |
dc.subject | Local area network | en_US |
dc.title | OpenFlow-enabled dynamic DMZ for local networks | en_US |
dc.type | Dissertation | en_US |