Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2342356.2342359acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free access

Making middleboxes someone else's problem: network processing as a cloud service

Published: 13 August 2012 Publication History

Abstract

Modern enterprises almost ubiquitously deploy middlebox processing services to improve security and performance in their networks. Despite this, we find that today's middlebox infrastructure is expensive, complex to manage, and creates new failure modes for the networks that use them. Given the promise of cloud computing to decrease costs, ease management, and provide elasticity and fault-tolerance, we argue that middlebox processing can benefit from outsourcing the cloud. Arriving at a feasible implementation, however, is challenging due to the need to achieve functional equivalence with traditional middlebox deployments without sacrificing performance or increasing network complexity.
In this paper, we motivate, design, and implement APLOMB, a practical service for outsourcing enterprise middlebox processing to the cloud.
Our discussion of APLOMB is data-driven, guided by a survey of 57 enterprise networks, the first large-scale academic study of middlebox deployment. We show that APLOMB solves real problems faced by network administrators, can outsource over 90% of middlebox hardware in a typical large enterprise network, and, in a case study of a real enterprise, imposes an average latency penalty of 1.1ms and median bandwidth inflation of 3.8%.

Supplementary Material

JPG File (sigcomm-i-02-networkprocessingasacloudservice.jpg)
MP4 File (sigcomm-i-02-networkprocessingasacloudservice.mp4)

References

[1]
Amazon Direct Connect. http://aws.amazon.com/directconnect/.
[2]
Amazon Route 53. http://aws.amazon.com/route53.
[3]
Amazon Virtual Private Cloud. http://aws.amazon.com/vpc/.
[4]
Amazon Web Services launches Brazil datacenters for its cloud computing platform. http://phx.corporate-ir.net/phoenix.zhtml?c= 176060&p=irol-newsArticle&ID=1639908.
[5]
Aryaka WAN Optimization. http://www.aryaka.com.
[6]
Barracuda Web Security Flex. http://www.barracudanetworks. com/ns/products/web_security_flex_overview.php.
[7]
Cisco: Quality of Service Design Overview. http: //www.ciscopress.com/articles/article.asp?p=357102.
[8]
Embrane. http://www.embrane.com/.
[9]
Network Monitoring Tools. http://slac.stanford.edu/xorg/nmtf/nmtf-tools.html.
[10]
OpenVPN. http://www.openvpn.com.
[11]
Palo Alto Networks. http://www.paloaltonetworks.com/.
[12]
Rightscale Cloud management. http://www.rightscale.com/.
[13]
Riverbed Virtual Steelhead. http://www.riverbed.com/us/ products/steelhead_appliance/virtual_steelhead.php.
[14]
Symantec: Data Loss Protection. http://www.vontu.com.
[15]
Tivoli Monitoring Software. http://ibm.com/software/tivoli/products/monitor.
[16]
Vyatta Software Middlebox. http://www.vyatta.com.
[17]
ZScaler Cloud Security. http://www.zscaler.com.
[18]
Cloud computing - 31 companies describe their experiences. http: //www.ipanematech.com/information-center/download. php?link=white-papers/White%20Book_2011-Cloud_Computing_OBS_Ipanema_Technologies_EBG.pdf, 2011.
[19]
Enterprise Network and Data Security Spending Shows Remarkable Resilience. http://www.abiresearch.com/press/3591, 2011.
[20]
M. Allman and V. Paxson. TCP congestion control. RFC 5681.
[21]
A. Anand, A. Gupta, A. Akella, S. Seshan, and S. Shenker. Packet Caches on Routers: The Implications of Universal Redundant Traffic Elimination. In Proc. of SIGCOMM, 2008.
[22]
D. Andersen, H. Balakrishnan, F. Kaashoek, and R. Morris. Resilient overlay networks. In SOSP, 2001.
[23]
M. Armbrust et al. A view of cloud computing. Commun. ACM, April 2010.
[24]
H. Ballani and P. Francis. CONMan: a step towards network manageability. In SIGCOMM, 2007.
[25]
T. Benson, A. Akella, A. Shaikh, and S. Sahu. Cloudnaas: a cloud networking platform for enterprise applications. In Proc. SOCC, 2011.
[26]
D. R. Choffnes and F. E. Bustamante. Taming the torrent: a practical approach to reducing cross-isp traffic in peer-to-peer systems. In SIGCOMM, 2008.
[27]
C. Dixon, H. Uppal, V. Brajkovic, D. Brandon, T. Anderson, and A. Krishnamurthy. ETTM: a scalable fault tolerant network manager. In NSDI, 2011.
[28]
N. Dukkipati and N. McKeown. Why flow-completion time is the right metric for congestion control. CCR, January 2006.
[29]
S. Floyd. HighSpeed TCP for large congestion windows. RFC 3649.
[30]
G. Gibb, H. Zeng, and N. McKeown. Outsourcing network functionality. In HotSDN, 2012.
[31]
K. P. Gummadi, H. V. Madhyastha, S. D. Gribble, H. M. Levy, and D. Wetherall. Improving the reliability of Internet paths with One-hop Source Routing. In Proc. OSDI, 2004.
[32]
M. Hajjat, X. Sun, Y.-W. E. Sung, D. A. Maltz, S. Rao, K. Sripanidkulchai, and M. Tawarmalani. Cloudward bound: Planning for beneficial migration of enterprise applications to the cloud. In SIGCOMM, 2012.
[33]
D. Joseph and I. Stoica. Modeling middleboxes. Network, IEEE, 22(5), 2008.
[34]
D. A. Joseph, A. Tavakoli, and I. Stoica. A policy-aware switching layer for data centers. In SIGCOMM, 2008.
[35]
D. Katabi, M. Handley, and C. Rohrs. Congestion control for high bandwidth-delay product networks. In SIGCOMM, 2002.
[36]
E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek. The Click modular router. ACM ToCS, August 2000.
[37]
V. Kundra. 25 Point Implementation Plan to Reform Federal Information Technology Management. Technical report, US CIO, 2010.
[38]
M57 packet traces. https://domex.nps.edu/corp/scenarios/2009-m57/net/.
[39]
N. McKeown et al. OpenFlow: enabling innovation in campus networks. CCR, March 2008.
[40]
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In CCS, 2009.
[41]
M. Roesch. Snort - Lightweight Intrusion Detection for Networks. In LISA, 1999.
[42]
V. Sekar, S. Ratnasamy, M. K. Reiter, N. Egi, and G. Shi. The middlebox manifesto: enabling innovation in middlebox deployment. In HotNets, 2011.
[43]
I. Stoica et al. Internet indirection infrastructure. ToN, April 2004.
[44]
A. Su, D. Choffnes, A. Kuzmanovic, and F. Bustamante. Drafting behind Akamai (Travelocity-based detouring). In SIGCOMM, 2006.
[45]
V. Valancius, N. Laoutaris, L. Massouli'e, C. Diot, and P. Rodriguez. Greening the internet with nano data centers. In Proc. CoNEXT, 2009.
[46]
Visolve. Transparent caching using Squid. http://www.visolve.com/squid/whitepapers/trans_caching.pdf, 2006.
[47]
M. Walfish, J. Stribling, M. Krohn, H. Balakrishnan, R. Morris, and S. Shenker. Middleboxes no longer considered harmful. In OSDI, 2004.

Cited By

View all
  • (2024)Programming Network Stack for Physical Middleboxes and Virtualized Network FunctionsIEEE/ACM Transactions on Networking10.1109/TNET.2023.330764132:2(971-986)Online publication date: Apr-2024
  • (2024)PrivRE: Regular Expression Matching for Encrypted Packet Inspection2024 IEEE 44th International Conference on Distributed Computing Systems (ICDCS)10.1109/ICDCS60910.2024.00123(1306-1317)Online publication date: 23-Jul-2024
  • (2024)Managing Cloud Networks: A Classification of SDN-Enabled Clouds2024 IEEE International Conference on Computing, Power and Communication Technologies (IC2PCT)10.1109/IC2PCT60090.2024.10486787(824-827)Online publication date: 9-Feb-2024
  • Show More Cited By

Index Terms

  1. Making middleboxes someone else's problem: network processing as a cloud service

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SIGCOMM '12: Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication
    August 2012
    474 pages
    ISBN:9781450314190
    DOI:10.1145/2342356
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 13 August 2012

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. cloud
    2. middlebox
    3. outsourcing

    Qualifiers

    • Research-article

    Conference

    SIGCOMM '12
    Sponsor:
    SIGCOMM '12: ACM SIGCOMM 2012 Conference
    August 13 - 17, 2012
    Helsinki, Finland

    Acceptance Rates

    Overall Acceptance Rate 462 of 3,389 submissions, 14%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)246
    • Downloads (Last 6 weeks)38
    Reflects downloads up to 15 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Programming Network Stack for Physical Middleboxes and Virtualized Network FunctionsIEEE/ACM Transactions on Networking10.1109/TNET.2023.330764132:2(971-986)Online publication date: Apr-2024
    • (2024)PrivRE: Regular Expression Matching for Encrypted Packet Inspection2024 IEEE 44th International Conference on Distributed Computing Systems (ICDCS)10.1109/ICDCS60910.2024.00123(1306-1317)Online publication date: 23-Jul-2024
    • (2024)Managing Cloud Networks: A Classification of SDN-Enabled Clouds2024 IEEE International Conference on Computing, Power and Communication Technologies (IC2PCT)10.1109/IC2PCT60090.2024.10486787(824-827)Online publication date: 9-Feb-2024
    • (2023)Make It Real: An End-to-End Implementation of A Physically Disaggregated Data CenterACM SIGOPS Operating Systems Review10.1145/3606557.360655957:1(1-9)Online publication date: 28-Jun-2023
    • (2023)Who Squats IPv4 Addresses?ACM SIGCOMM Computer Communication Review10.1145/3594255.359426053:1(48-72)Online publication date: 20-Apr-2023
    • (2023)Ethical AI is Not about AICommunications of the ACM10.1145/357693266:2(32-34)Online publication date: 20-Jan-2023
    • (2023)Four Ways to Add Active Learning to Computing CoursesCommunications of the ACM10.1145/357693066:2(26-29)Online publication date: 20-Jan-2023
    • (2023)The Premature Obituary of ProgrammingCommunications of the ACM10.1145/355536766:2(41-44)Online publication date: 20-Jan-2023
    • (2023)(Re)Use of Research Results (Is Rampant)Communications of the ACM10.1145/355497666:2(75-81)Online publication date: 20-Jan-2023
    • (2023)HPC ForecastCommunications of the ACM10.1145/355230966:2(82-90)Online publication date: 20-Jan-2023
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media