skip to main content
10.1145/2342356.2342359acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free Access

Making middleboxes someone else's problem: network processing as a cloud service

Published:13 August 2012Publication History

ABSTRACT

Modern enterprises almost ubiquitously deploy middlebox processing services to improve security and performance in their networks. Despite this, we find that today's middlebox infrastructure is expensive, complex to manage, and creates new failure modes for the networks that use them. Given the promise of cloud computing to decrease costs, ease management, and provide elasticity and fault-tolerance, we argue that middlebox processing can benefit from outsourcing the cloud. Arriving at a feasible implementation, however, is challenging due to the need to achieve functional equivalence with traditional middlebox deployments without sacrificing performance or increasing network complexity.

In this paper, we motivate, design, and implement APLOMB, a practical service for outsourcing enterprise middlebox processing to the cloud.

Our discussion of APLOMB is data-driven, guided by a survey of 57 enterprise networks, the first large-scale academic study of middlebox deployment. We show that APLOMB solves real problems faced by network administrators, can outsource over 90% of middlebox hardware in a typical large enterprise network, and, in a case study of a real enterprise, imposes an average latency penalty of 1.1ms and median bandwidth inflation of 3.8%.

Skip Supplemental Material Section

Supplemental Material

sigcomm-i-02-networkprocessingasacloudservice.mp4

mp4

80.6 MB

References

  1. Amazon Direct Connect. http://aws.amazon.com/directconnect/.Google ScholarGoogle Scholar
  2. Amazon Route 53. http://aws.amazon.com/route53.Google ScholarGoogle Scholar
  3. Amazon Virtual Private Cloud. http://aws.amazon.com/vpc/.Google ScholarGoogle Scholar
  4. Amazon Web Services launches Brazil datacenters for its cloud computing platform. http://phx.corporate-ir.net/phoenix.zhtml?c= 176060&p=irol-newsArticle&ID=1639908.Google ScholarGoogle Scholar
  5. Aryaka WAN Optimization. http://www.aryaka.com.Google ScholarGoogle Scholar
  6. Barracuda Web Security Flex. http://www.barracudanetworks. com/ns/products/web_security_flex_overview.php.Google ScholarGoogle Scholar
  7. Cisco: Quality of Service Design Overview. http: //www.ciscopress.com/articles/article.asp?p=357102.Google ScholarGoogle Scholar
  8. Embrane. http://www.embrane.com/.Google ScholarGoogle Scholar
  9. Network Monitoring Tools. http://slac.stanford.edu/xorg/nmtf/nmtf-tools.html.Google ScholarGoogle Scholar
  10. OpenVPN. http://www.openvpn.com.Google ScholarGoogle Scholar
  11. Palo Alto Networks. http://www.paloaltonetworks.com/.Google ScholarGoogle Scholar
  12. Rightscale Cloud management. http://www.rightscale.com/.Google ScholarGoogle Scholar
  13. Riverbed Virtual Steelhead. http://www.riverbed.com/us/ products/steelhead_appliance/virtual_steelhead.php.Google ScholarGoogle Scholar
  14. Symantec: Data Loss Protection. http://www.vontu.com.Google ScholarGoogle Scholar
  15. Tivoli Monitoring Software. http://ibm.com/software/tivoli/products/monitor.Google ScholarGoogle Scholar
  16. Vyatta Software Middlebox. http://www.vyatta.com.Google ScholarGoogle Scholar
  17. ZScaler Cloud Security. http://www.zscaler.com.Google ScholarGoogle Scholar
  18. Cloud computing - 31 companies describe their experiences. http: //www.ipanematech.com/information-center/download. php?link=white-papers/White%20Book_2011-Cloud_Computing_OBS_Ipanema_Technologies_EBG.pdf, 2011.Google ScholarGoogle Scholar
  19. Enterprise Network and Data Security Spending Shows Remarkable Resilience. http://www.abiresearch.com/press/3591, 2011.Google ScholarGoogle Scholar
  20. M. Allman and V. Paxson. TCP congestion control. RFC 5681.Google ScholarGoogle Scholar
  21. A. Anand, A. Gupta, A. Akella, S. Seshan, and S. Shenker. Packet Caches on Routers: The Implications of Universal Redundant Traffic Elimination. In Proc. of SIGCOMM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. D. Andersen, H. Balakrishnan, F. Kaashoek, and R. Morris. Resilient overlay networks. In SOSP, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. M. Armbrust et al. A view of cloud computing. Commun. ACM, April 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. H. Ballani and P. Francis. CONMan: a step towards network manageability. In SIGCOMM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. T. Benson, A. Akella, A. Shaikh, and S. Sahu. Cloudnaas: a cloud networking platform for enterprise applications. In Proc. SOCC, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. D. R. Choffnes and F. E. Bustamante. Taming the torrent: a practical approach to reducing cross-isp traffic in peer-to-peer systems. In SIGCOMM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. C. Dixon, H. Uppal, V. Brajkovic, D. Brandon, T. Anderson, and A. Krishnamurthy. ETTM: a scalable fault tolerant network manager. In NSDI, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. N. Dukkipati and N. McKeown. Why flow-completion time is the right metric for congestion control. CCR, January 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. S. Floyd. HighSpeed TCP for large congestion windows. RFC 3649. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. G. Gibb, H. Zeng, and N. McKeown. Outsourcing network functionality. In HotSDN, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. K. P. Gummadi, H. V. Madhyastha, S. D. Gribble, H. M. Levy, and D. Wetherall. Improving the reliability of Internet paths with One-hop Source Routing. In Proc. OSDI, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. M. Hajjat, X. Sun, Y.-W. E. Sung, D. A. Maltz, S. Rao, K. Sripanidkulchai, and M. Tawarmalani. Cloudward bound: Planning for beneficial migration of enterprise applications to the cloud. In SIGCOMM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. D. Joseph and I. Stoica. Modeling middleboxes. Network, IEEE, 22(5), 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. D. A. Joseph, A. Tavakoli, and I. Stoica. A policy-aware switching layer for data centers. In SIGCOMM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. D. Katabi, M. Handley, and C. Rohrs. Congestion control for high bandwidth-delay product networks. In SIGCOMM, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek. The Click modular router. ACM ToCS, August 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. V. Kundra. 25 Point Implementation Plan to Reform Federal Information Technology Management. Technical report, US CIO, 2010.Google ScholarGoogle Scholar
  38. M57 packet traces. https://domex.nps.edu/corp/scenarios/2009-m57/net/.Google ScholarGoogle Scholar
  39. N. McKeown et al. OpenFlow: enabling innovation in campus networks. CCR, March 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In CCS, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. M. Roesch. Snort - Lightweight Intrusion Detection for Networks. In LISA, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. V. Sekar, S. Ratnasamy, M. K. Reiter, N. Egi, and G. Shi. The middlebox manifesto: enabling innovation in middlebox deployment. In HotNets, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. I. Stoica et al. Internet indirection infrastructure. ToN, April 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. A. Su, D. Choffnes, A. Kuzmanovic, and F. Bustamante. Drafting behind Akamai (Travelocity-based detouring). In SIGCOMM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. V. Valancius, N. Laoutaris, L. Massouli'e, C. Diot, and P. Rodriguez. Greening the internet with nano data centers. In Proc. CoNEXT, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Visolve. Transparent caching using Squid. http://www.visolve.com/squid/whitepapers/trans_caching.pdf, 2006.Google ScholarGoogle Scholar
  47. M. Walfish, J. Stribling, M. Krohn, H. Balakrishnan, R. Morris, and S. Shenker. Middleboxes no longer considered harmful. In OSDI, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Making middleboxes someone else's problem: network processing as a cloud service

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SIGCOMM '12: Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication
      August 2012
      474 pages
      ISBN:9781450314190
      DOI:10.1145/2342356

      Copyright © 2012 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 13 August 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate554of3,547submissions,16%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader