NEW! Mirantis Academy -   Learn confidently with expert guidance and On-demand content.   Learn More

< BLOG HOME

OpenStack Summit: IoT, VNFs, and Security Services - How do they work together?

Alexander Adamov - May 27, 2016
NFV and IoT were probably the most popular topics at the OpenStack Summit in Austin this year. After attending several sessions devoted to IoT and NFV implementation with OpenStack and talking, at the same time, about a new security architecture that leverages NFV, I came to some conclusions, which I would like to share below.

Internet of Things (IoT)

The IoT has come into our life, making our environment smarter. SmartCity, SmartHome, intelligent vehicles, and biosensors are far from a complete list of IoT applications.
IoT is a compound statement that includes hardware devices and computing infrastructure to process, store, and analyze incoming data. Jakub Pavlík from tcpcloud showed a real life example of using IoT in his keynote “Building a SmartCity with IoT”, where he showed an IoT infrastructure example that had been deployed in the Austin Convention Center, consisting of twenty sensors to measure carbon dioxide level, temperature, and humidity in the summit premises. The data was then publicly available over the web during the course of the summit.
Jakub Pavlik
Juniper Networks foresees a rise from 13.4 billion devices in 2015 to 38 billion by 2020. A Cisco report contains even more impressive numbers - 50 billion IoT devices by 2020. All these devices will generate a huge amount of data to be processed, stored, and analyzed. One immediate thought is that the OpenStack platform can be used to handle incoming data, solving scalability, big data analysis, and security issues.

Security Threats and IoT

As we discussed during the panel discussion “OpenStack and the IoT,” security is a major concern in IoT infrastructure. The IoT attack surface includes two main components of IoT infrastructure:
  • the endpoint IoT devices such as sensors, cameras, IoT routers, and so on
  • cloud computing, where the data from endpoint IoT devices is aggregated and analyzed
The media makes a fuss about ethical hackers compromising IoT devices such as SmartTV, traffic sensors, medical equipment, and so on, but those attacks were driven mostly by scientific interest. Investments to attack a single IoT device or a set of devices connected to the same router are too high to motivate criminals financially.
Cloud computing infrastructure is more attractive for an attacker than endpoint devices, as a cloud back end contains user-related information. Once attackers take over a cloud infrastructure, they can get access to users’ devices: webcams, door locks, cars, thermostats, and so forth. Some chipsets in IoT devices even contain hardcoded ssh keys to provide a manufacturer with access to troubleshoot devices. But what will happen if an attacker gets control over this information stored in the cloud?

VNFs and IoT

The IoT challenge for clouds is about processing of a fast growing amount of data coming from endpoint devices and providing the proper level of security at the same time, because failing to do so can lead to the compromise of millions of users’ IoT devices if attackers take over a communication channel or cloud infrastructure.
Clouds must be elastic and provide the needed security level at any scale, and must be capable of analyzing incoming IoT data for the presence of anomalies that can indicate network traffic altering or spoofing by an attacker.
IoT data processing is usually done with service chaining that includes the following steps:
  • aggregation
  • verification
  • transformation (if needed)
  • analysis
  • protection
As we can see, IoT assets protection is an essential part of the IoT service chain, especially when we talk about processing information from mission-critical sensors. To increase a protection level, a virtual firewall and Intrusion Detection System/Intrusion Protection System can be added into the IoT service chain.
To handle IoT data in a service chain in a fast and efficient way, NFVI provides a set of technologies to optimize CPU, memory, and network channel usage, including Data Plane Development Kit (DPDK), Single Root I/O Virtualization (SR-IOV), Non-Uniform Memory Access (NUMA), and Huge pages.

Security Services and IoT

VNFs provide a perfect way to process IoT data, enabling security services to function in a scalable and distributed manner. As an example, an open source security architecture based on VNFs was presented in the “Using Open Source Security Architecture to Defend against Targeted Attacks” session. This use case takes advantage of the OpenContrail SDN by Juniper, which can be easily deployed through a Fuel plugin, and shows how to enable a Network Intrusion Prevention System (IPS) as a VNF.
IPS is a signature-based traffic scanner that capable of detecting known network attacks and extracting malicious files from network traffic. IPS is a basic way to protect your cloud against attack. You may also choose to install an antivirus, but this solution is not flexible as it requires antivirus client to be installed on every user’s VM, which leads to performance degradation within an environment.
To improve your protection level with IPS, you can buy a subscription for an extended set of IPS rules being regularly updated with Indicators-of-Compromise (IoC) for the latest threats such as IPs and domains used in an attack.
You can do even more, such as using a malware sandbox to run and analyze all files coming into the cloud from the Internet such as email attachments and direct downloads from an attacker’s server. Intrusion Protection Systems, for example, Snort and Suricata, can parse application level protocols (HTTP and SMTP)  to extract suspicious files from the network stream. You can verify these files by requesting information in a whitelist and blacklist. If the file is unknown, you can forward it to a malware sandbox such as the open source Cuckoo Sandbox.

Moving forward

IoT presents a challenge for cloud infrastructure to handle all incoming data and process it in a fast and secure way. Fortunately, using OpenStack and NFV appropriately can help you to solve problems related to building a scalable and secured cloud computing infrastructure to meet the IoT growing market in an efficient way.

Choose your cloud native journey.

Whatever your role, we’re here to help with open source tools and world-class support.

GET STARTED
NEWSLETTER

Subscribe to our bi-weekly newsletter for exclusive interviews, expert commentary, and thought leadership on topics shaping the cloud native world.

JOIN NOW