DocumentCode
715285
Title
A heuristic migration logic between firewalls in a federated cloud network
Author
Waziri, Ibrahim ; Shropshire, Jordan
Author_Institution
Center for Educ. & Res. in Inf. Assurance & Security (CERIAS), Purdue Univ., West Lafayette, IN, USA
fYear
2015
fDate
9-12 April 2015
Firstpage
1
Lastpage
8
Abstract
The hyper-connected cloud landscape is reliant on a composite security framework of hardware and cloud firewalls. Often, these security devices are managed by separate groups and operate as functional silos rather than integrated security mechanisms. As a result, cloud traffic is subjected to inefficient and redundant packet filtering. Hardware firewalls are optimized for greater throughput while virtualized firewalls can scale to match DoS attempts. To maximize the utility of each form factor, we developed an inline firewall architecture with a variable filtering point. The primary filtering point changes between hardware and cloud firewalls based on real-time conditions. The architecture incorporates heuristic-based migration logic. To define the heuristics, a performance evaluation was conducted following two test scenarios: spike tests and endurance test. Packet throughput was also assessed using JMeter. The results indicate that a threshold approach to filter-point migration maximizes network throughout while offering the insurance of on-demand scalability.
Keywords
cloud computing; computer network performance evaluation; firewalls; virtualisation; DoS attempts; JMeter; cloud firewalls; cloud traffic; composite security framework; endurance test; federated cloud network; filter-point migration; functional silos; hardware firewalls; heuristic migration logic; heuristic-based migration logic; hyper-connected cloud landscape; inline firewall architecture; network throughout; on-demand scalability; packet throughput; performance evaluation; redundant packet filtering; spike tests; threshold approach; variable filtering point; virtualized firewalls; Computers; Filtering; Firewalls (computing); Hardware; Performance evaluation; Throughput; cloud computing; firewalls; network security; packet filtering; virtualization;
fLanguage
English
Publisher
ieee
Conference_Titel
SoutheastCon 2015
Conference_Location
Fort Lauderdale, FL
Type
conf
DOI
10.1109/SECON.2015.7132868
Filename
7132868
Link To Document