Issues in Network Virtualization
Issues in Network Virtualization
Contents
What is network virtualization?..............................................................................1
Issues in network virtualization.............................................................................2
Issues faced by Infrastructure operators.........................................................3
Issues faced by Services providers..................................................................4
Security benefits of network virtualization............................................................5
Security Issues in network virtualization...............................................................5
Types of attacks in a virtualized network environment.......................................6
Attacks in Virtual Networks............................................................................. 6
Attacks in Network Infrastructure....................................................................6
Attacks to the Users........................................................................................ 6
Challenges in a virtualized network.......................................................................7
Defence mechanism for the challenges in virtual networks..................................7
Confidential Packet Forwarding..........................................................................8
Capabilities-Based Virtual Network Instance......................................................9
Conclusion............................................................................................................. 9
References........................................................................................................... 10
Figure 1 Binding of physical network to virtual network (The FP7 4WARD Project, 2008)
Infrastructure operators
Services providers
SAEED UR RAHMAN
Elasticity
Elasticity is a key feature for optimization of the required resources in response
to the services on-demand efficiently and rapidly. It is necessary to specify
protocols for real-time and highly scalable resources provisioning.
Programmability
Programmability on virtualization-enabled network equipment is to sustain
optimal network performance in accordance with service requests and to foster
technological innovations of network equipment towards new services and
applications.
Elasticity
Elasticity is of significant, which discovers the resources and functional
component to be reserved for service composition, discovers the composed
service itself, and configures the service automatically. The technology
contributes to maintain the service integrity and sustainability against both
internal causes (e.g., service modifications and feature changes) and external
causes (e.g., network condition change, resource availability change, and user
request change).
Centralized storage in a virtualized network mitigates data loss if an enduser device is compromised.
When virtual machines and applications are isolated, only one application
and one virtual machine is affected by an attack.
If a virtual machine is infected or compromised, it can be rolled back to a
prior state that exist before the attack.
Hardware reductions that occurs due to virtualization improves physical
security since there are fewer devices.
The system and network administrations access control as well as
separation of duties can be improved as certain individuals may be
assigned to only control VMs within the network while others only deal
with VMs in the DMZ.
Virtual switches dont perform the dynamic trunking necessary to conduct
inter-switch link tagging attacks. They also drop double encapsulated
packets so double encapsulation attacks arent effective. Virtual switches
also dont allow packets to leave their assigned broadcast domain.
Therefore, eliminates the multicast brute force attacks that rely on
overloading a switch to let packets broadcast to other VLAN domains.
SAEED UR RAHMAN
SAEED UR RAHMAN
Conclusion
Virtualization of network infrastructure is among the major involvement in the IT
industry. Network virtualization provides cost, manageability, scalability and
flexibility benefits with security and network performance enhancement.
However, it have also given rise to new some unique security and performance
issues that need to be studied and appropriate countermeasures need to been
considered before a implementation of a virtualized network.
SAEED UR RAHMAN
1
0
References
Advanced Network Virtualization: Definition, Benefits, Applications, and Technical
Challenges. (2011). 1st ed. [ebook] Network Virtualization Study Group, pp.16-21.
Available at: https://nvlab.nakao-lab.org/nv-study-group-white-paper.v1.0.pdf [Accessed
8 Nov. 2014].
Anon, (2014). [image] Available at: http://blog.ipspace.net/2011/10/vxlan-termination-onphysical-devices.html [Accessed 8 Nov. 2014].
Benefits of virtualizing. (2014). 1st ed. [ebook] Cisco. Available at:
http://docs.media.bitpipe.com/io_10x/io_104158/item_519976/Cisco_sServerVirt_IO
%23104158_E-Guide_030712.pdf [Accessed 8 Nov. 2014].
Chowdhury, . Mosharaf Kabir, N. and Boutaba, (2010). A survey of network virtualization.
1st ed. Computer Networks 54.
Computerweekly.com, (2014). VMware: five biggest challenges of server virtualisation.
[online] Available at: http://www.computerweekly.com/feature/VMware-five-biggestchallenges-of-server-virtualisation [Accessed 7 Nov. 2014].
Dhawan, A. (2014). Benefits of Network Virtualization to Enterprise Customers. [online]
Insights.wired.com. Available at: http://insights.wired.com/profiles/blogs/benefits-ofnetwork-virtualization-to-enterprise-customers#axzz3IT3EBvQI [Accessed 8 Nov.
2014].
Gentry, C. (2009). Fully homomorphic encryption using ideal lattices. Proceedings of the
41st annual ACM symposium on Symposium on theory of computing - STOC '09.
Hedlund, B. and Profile, A. (2013). What is Network Virtualization?. [online] BRAD
HEDLUND. Available at: http://bradhedlund.com/2013/05/28/what-is-networkvirtualization/ [Accessed 7 Nov. 2014].
Mekouar, L., Iraqi, Y. and Boutaba, R. (2010). Incorporating Trust in Network Virtualization.
2010 10th IEEE International Conference on Computer and Information Technology.
Mirzrak, A., Cheng, Y., Marzullo, K. and Savage, S. (2006). Detecting and isolating
SAEED UR RAHMAN
1
1
malicious routers. 3rd ed. IEEE Transactions on Dependable and Secure Computing.
Natarajan, S. (2012). SECURITY ISSUES IN NETWORK VIRTUALIZATION FOR THE
FUTURE INTERNET. [online] Scholarworks.umass.edu. Available at:
http://scholarworks.umass.edu/cgi/viewcontent.cgi?
article=1655&context=open_access_dissertations [Accessed 8 Nov. 2014].
Natrajan, S. and Wolf, T. (2012). Security Issues in Network Virtualization for the Future
Internet. 1st ed. [ebook] Amherst, MA, USA: Department of Electrical and Computer
Engineering University of Massachusetts. Available at:
http://www.ecs.umass.edu/ece/wolf/pubs/icnc2012.pdf [Accessed 8 Nov. 2014].
Routeviews.org, (2003). Route Views Project Page. [online] Available at:
http://www.routeviews.org/ [Accessed 8 Nov. 2014].
Tariq, M., Motiwala, M., Feamster, N. and Ammar, M. (2009). Detecting network neutrality
violations with causal inference. Proceedings of the 5th international conference on
Emerging networking experiments and technologies - CoNEXT '09.
The FP7 4WARD Project, (2008). WP3 - Network Virtualization. [image] Available at:
http://www.4ward-project.eu/index.php?s=overview&c=WP3 [Accessed 8 Nov. 2014].
SAEED UR RAHMAN
1
2