1 / 43

Configuring, Diagnosing, and Securing Data Center Networks and Systems

Configuring, Diagnosing, and Securing Data Center Networks and Systems. Yan Chen Lab for Internet and Security Technology (LIST) Department of Electrical Engineering and Computer Science Northwestern University . Chicago. Northwestern. Statistics. Chicago: 3 rd largest city in US

livana
Download Presentation

Configuring, Diagnosing, and Securing Data Center Networks and Systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Configuring, Diagnosing, and Securing Data Center Networks and Systems Yan Chen Lab for Internet and Security Technology (LIST) Department of Electrical Engineering and Computer Science Northwestern University

  2. Chicago

  3. Northwestern

  4. Statistics • Chicago: 3rd largest city in US • NU: ranked #12 by US News & World Report • Established in 1851 • ~8000 undergrads • McCormick School of Engineering: ranked #20 • 180 faculty members • ~1400 undergrads and similar # of grad students

  5. Statistics of McCormick • National academy memberships: • National Academy of Engineering (NAE): 12 active, 7 emeriti • National Academy of Science (NAS): 3 active • Institute of Medicine (IoM): 1 emeritus • American Academy of Arts and Sciences (AAAS): 5 active, 3 emeriti • National Medal of Technology: 1 active

  6. Emerging Data Centers • Huge scale networks and server farms • Multi-tier distributed services • How to configure the DC networks? • How to diagnose cloud services in DC? • How to defend DC networks and systems?

  7. Our Solutions • How to configure the DC networks? • Generic and Automatic Address Configuration for Data Center Networks (DAC) • [SIGCOMM 10], also selected as one of three best papers for fast track to ACM/IEEE ToN. • How to diagnose cloud services in DC? • Rake: Semantics Assisted Network-based Tracing and Diagnosis (IWQoS 2011) • How to defend DC networks and systems? • NetShield: High Speed and Accurate Network-based IPS [SIGCOMM 10] • WebShield: Defending Web Attacks [NDSS11]

  8. RAKE: SEMANTICS ASSISTED NETWORK-BASED TRACING FRAMEWORK

  9. Motivation Large distributed systems involve thousands of or even 100s of thousands of nodes E.g. search system, CDN Host-based monitoring cannot infer the performance or detect bugs Hard to translate OS-level info (such as CPU load) into application performance App log may not be enough Hard to collect all the logs Task-based approach adopted in many diagnosis systems WAP5, Magpie, Sherlock 10

  10. Task-based Approaches The Critical Problem – Message Linking Link the messages in a task together into a path or tree 11

  11. Example of Message Linking in Search System URL URL URL Search keyword Search keyword Doc ID 12

  12. Task-based Approaches The Critical Problem – Message Linking Link the messages in a task together into a path or tree Challenges Accuracy Non-invasiveness Scalability to large computing platforms Applicability to a large number of applications 13

  13. Existing Approaches Black-box approaches Do not need to instrument the application or to understand its internal structure or semantics Time correlation to link messages Project 5, WAP5, Sherlock Rely on time Correlation Accuracy affected by cross traffic 14

  14. Existing Approaches White-box approaches Extracts application-level data and requires instrumenting the application and possibly understanding the application's source codes Insert a unique ID into messages in a task X-Trace, Pinpoint Invasive due to source code modification 15

  15. Related Work Invasiveness Application Knowledge 16

  16. Rake Key Observations Generally no unique ID linking the messages associated with the same request Exist polymorphic IDs in different stages of the request Semantic Assisted Use the semantics of the system to identify polymorphic IDs and link messages 17

  17. Message Linking Example URL URL URL Search keyword Search keyword Doc ID 18

  18. Architecture of Rake

  19. Questions on Semantics What Are the Necessary Semantics? Use data flow analysis to automatically extract the invariants (and its transformation) How Does Rake Use the Semantics? Naïve design is to implement Rake for each application with specific application semantics How Efficient Is the Rake with Semantics Can message linking be accurate? What’s the computational complexity of Rake? 20

  20. Utilize Semantics in Rake Implement Different Rakes for Different Application is time consuming Lesson learnt for implementing two versions of Rake for CoralCDN and IRC Design Rake to take general semantics A unified infrastructure Provide simple language for user to supply semantics 21

  21. Example of Rake Language (IRC) <?xml version="1.0" encoding="ISO-8859-1"?> <Rake> <Message name="IRC PRIVMSG"> <Signature> <Protocol> TCP </Protocol> <Port> 6667 </Port> </Signature> <Link_ID> <Type> Regular expression </Type> <Pattern> PRIVMSG\s+(.*) </Pattern> </Link_ID> <Follow_ID id="0"> <Type> Same as Link ID </Type> </Follow_ID> <Query_ID> <Type> No Return ID </Type> </Query_ID> </Message> </Rake> Follow_ID Link_ID = Query_ID P Q = 22 Response_ID S R

  22. Potential Applications Search Verified by Microsoft collaborator CDN CoralCDN is studied and evaluated Chat System IRC is tested Distributed File System Hadoop DFS is tested 23

  23. Accuracy Analysis One-to-one ID Transforming Examples In search, URL -> Keywords -> Canonical format In CoralCDN, URL -> Sha1 hash value Ideally no error if requests are distinct Request ambiguousness Search keywords Microsoft search data Less than 1% messages with duplication in 1s Web URL Two real http traces Less than 1% messages with duplication in 1s Chat messages No duplication with timestamps 24

  24. Evaluation Application CoralCDN Hadoop Experiment Employ PlanetLab hosts as web clients Retrieve URLs from real traces with different frequency Metrics Linking accuracy (false positive, false negative) Diagnosis ability Compared Approach WAP5 25

  25. CoralCDN Task Tree 26

  26. Message Linking Accuracy Use Log-Based Approach to Evaluate WAP5 and Rake Linking in CoralCDN 27

  27. Diagnosis Ability Controlled Experiments Inject junk CPU-intensive processes Calculated the packet processing time using WAP5 and Rake Obviously Rake can identify the slow machine, while WAP5 fails. 28

  28. Conclusions Feasibility/Applicability Rake works for many popular applications in different categories Easiness Rake allows user to write semantics via XML Necessary semantics are easy to obtained given our experience Accuracy Much more accurate than black-box approaches and probably matches white-box approaches Non-invasiveness 29

  29. Q & A? Thanks! 30

  30. Backup 31

  31. Necessary Semantics Intra-node linking The system semantics Inter-node link The protocol semantics Node P Q R S 32

  32. Signature Signature to Classify Messages <Signature> <Protocol> TCP </Protocol> <Port> 6667 </Port> </Signature> Formats of Signatures Socket information Protocol, port Expression for TCP/IP header udp [10]&128==0 Regular expression User defined function 33

  33. Link_ID and Follow_ID Follow_IDs The IDs will be in the triggered messages by this message One message may have multiple Follow_IDs for triggering multiple messages Link_ID The ID of the current message Match with Follow_ID previously seen Linking of Link_ID and Follow_ID Mainly for intra-node message linking 34

  34. Query_ID and Response_ID Query_IDs The communication is in Query/Response style, e.g. RPC call and DNS query/response. The IDs will be in the response messages to this message Response_ID The ID of the current message to match Query_ID previously seen By default requires the query and response to use the same socket Linking of Query_ID and Response_ID Mainly for inter-node message linking 35

  35. Complicated Semantics The process of generating IDs may be complicated XML or regular expression is not good at complex computations So let user provide own functions User provide share/dynamic libraries Specify the functions for IDs in XML Implementation using Libtool to load user defined function in runtime 36

  36. Example for DNS <?xml version="1.0" encoding="ISO-8859-1"?> <Rake> <Message name="DNS Query"> <Signature> <Protocol> UDP </Protocol> <Port> 53 </Port> <Expression> udp[10] & 128 == 0 </Expression> </Signature> <Link_ID > <Type> User Function </Type> <Libray> dns.so </Libray> <Function> Link_ID </Function> </Link_ID> <Follow_ID id="0"> <Type> Link_ID </Type> </Follow_ID> <Query_ID> <Type> Link_ID </Type> </Query_ID> </Message> …………………………….. Extract the queried host 37

  37. Semantics of Hadoop Get operation

  38. Semantics of Hadoop Grep operation

  39. Abused IPC Call in Hadoop It is a problem that we found in Hadoop source code. Four “getFileInfo”s are used here, while only one is enough.

  40. Running time of Hadoop steps

  41. Discussion Implementation Experience How hard for user to provide semantics CoralCDN – 1 week source code study DNS – a couple of hours Hadoop DFS – 1 week source code study Inter-process Communication Encryption Dynamic library interposition 42

  42. Conclusions Feasibility/Applicability Rake works for many popular applications in different categories Easiness Rake allows user to write semantics via XML Necessary semantics are easy to obtained given our experience Accuracy Much more accurate than black-box approaches and probably matches white-box approaches Non-invasiveness 43

More Related