A Novel Approach to Manage Asymmetric Traffic Flows for Secure Network Proxies
نویسنده
چکیده
A transparent secure network proxy intercepts web traffic such as HTTP requests and applies access policies to the intercepted traffic. The proxy will reinitiate a request on behalf of the client when policies permit. Depending on policy configuration, this proxy may masquerade as the client when generating the request. The response from the server may reach the client instead of the proxy due to asymmetric routing, and if so, would be rejected by the client as an invalid response. Consequently the proxy can not complete the original request. This paper presents a new protocol and a comprehensive mechanism that facilitates the formation of a cluster comprised of multiple proxies. This proxy cluster can cover a network that spans a large geographical area, and collaboratively discover and redirect asymmetrically routed traffic flows towards the appropriate member proxy. The protocol and the algorithms presented in this paper can operate in both IPv4 and IPv6 [1] networks.1 1 Background and Motivation Secure network proxies play an essential role in today's enterprise networks. These proxies can enforce access policies, conduct traffic monitoring, and perform content delivery acceleration through caching and WAN optimization. The various security requirements combined with reliability requirements present complex network architectures in which proxies cannot be deployed due to application breakage. The deploy-ability of a secure network proxy is measured by the types of policies the proxy can enforce without impeding applications. In other words, applications must continue to function even when application traffic is subject to processing at the proxy. This section provides a general introduction to the concept of a secure network proxy followed by descriptions of example problems challenging the proxy deployment.
منابع مشابه
A Novel Fuzzy Logic Base Scheduling Mechanism for Service Differentiation in IP Networks
Quality of Service (QoS) refers to a set of rules or techniques that help the network administrators use the available network resources optimally to manage the effects of congestion and to treat the applications according to their needs. The differentiated services architecture (DiffServ) allows providing quality of service to users. The major DiffServ premise is that individual flows with sim...
متن کاملBehavioral Analysis of Traffic Flow for an Effective Network Traffic Identification
Fast and accurate network traffic identification is becoming essential for network management, high quality of service control and early detection of network traffic abnormalities. Techniques based on statistical features of packet flows have recently become popular for network classification due to the limitations of traditional port and payload based methods. In this paper, we propose a metho...
متن کاملReal Time Identification of SSH Encrypted Application Flows by Using Cluster Analysis Techniques
The identification of application flows is a critical task in order to manage bandwidth requirements of different kind of services (i.e. VOIP, Video, ERP). As network security functions spread, an increasing amount of traffic is natively encrypted due to privacy issues (e.g. VPN). This makes ineffective current traffic classification systems based on ports and payload inspection, e.g. even powe...
متن کاملFeature Extraction to Identify Network Traffic with Considering Packet Loss Effects
There are huge petitions of network traffic coming from various applications on Internet. In dealing with this volume of network traffic, network management plays a crucial rule. Traffic classification is a basic technique which is used by Internet service providers (ISP) to manage network resources and to guarantee Internet security. In addition, growing bandwidth usage, at one hand, and limit...
متن کاملOn the fly Application Flows Identification by exploiting K-Means based classifiers
The identification of application flows is a critical task in order to manage bandwidth requirements of different kind of services (i.e. VOIP, Video, ERP). Moreover encryption of traffic (e.g. VPN) makes ineffective current traffic classification systems based on ports and payload inspection, i.e. Deep Packet Inspection. We have developed a real time traffic classification method based on clust...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008