I2NSFInternet Engineering Task Force (IETF) S. HaresInternet-DraftRequest for Comments: 8192 HuaweiIntended status:Category: Informational D. LopezExpires: November 11, 2017ISSN: 2070-1721 Telefonica I+D M. Zarny vArmour C. Jacquenet France Telecom R. Kumar Juniper Networks J. Jeong Sungkyunkwan UniversityMay 10,June 2017I2NSFInterface to Network Security Functions (I2NSF): Problem Statement and Usecases draft-ietf-i2nsf-problem-and-use-cases-16Cases Abstract This documentissets out the problem statement for Interface to Network Security Functions (I2NSF)as well asand outlines some companion use cases. Status of This Memo ThisInternet-Draftdocument issubmitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documentsnot an Internet Standards Track specification; it is published for informational purposes. This document is a product of the Internet Engineering Task Force (IETF).Note that other groups may also distribute working documents as Internet-Drafts. The listIt represents the consensus ofcurrent Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents validthe IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Not all documents approved by the IESG are amaximumcandidate for any level of Internet Standard; see Section 2 of RFC 7841. Information about the current status ofsix monthsthis document, any errata, and how to provide feedback on it may beupdated, replaced, or obsoleted by other documentsobtained atany time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on November 11, 2017.http://www.rfc-editor.org/info/rfc8192. Copyright Notice Copyright (c) 2017 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4 3. Problem Space . . . . . . . . . . . . . . . . . . . . . . . . 5 3.1. Challenges Facing Security Service Providers . . . . . . 5 3.1.1. Diverse Types of Security Functions . . . . . . . . . 5 3.1.2. Diverse Interfaces to Control and Monitor NSFs . . .67 3.1.3. More Distributed NSFs and vNSFs . . . . . . . . . . . 7 3.1.4. More Demand to Control NSFs Dynamically . . . . . . . 7 3.1.5. Demand forMulti-TenancyMulti-tenancy to Control and Monitor NSFs 8 3.1.6. Lack of Characterization of NSFs and Capability Exchange . . . . . . . . . . . . . . . . . . . . . . 8 3.1.7. Lack of Mechanism for NSFs to Utilize External Profiles . . . . . . . . . . . . . . . . . . . . . . 8 3.1.8. Lack of Mechanisms to Accept External Alerts to Trigger Automatic Rule and Configuration Changes . . 9 3.1.9. Lack of Mechanism for Dynamic Key Distribution to NSFs . . . . . . . . . . . . . . . . . . . . . . . . 9 3.2. Challenges Facing Customers . . . . . . . . . . . . . . . 10 3.2.1. NSFs from Heterogeneous Administrative Domains . . . 11 3.2.2. Today's Vendor-Specific Control Requestsare Vendor Specific. . . . . . 11 3.2.3.DifficultDifficulty forCustomerCustomers to Monitor the Execution of Desired Policies . . . . . . . . . . . . . . . . . . 13 3.3. Lack of Standard Interface to Inject Feedback to NSF . . 13 3.4. Lack of Standard Interface for Capability Negotiation . . 14 3.5.Difficult to ValidateDifficulty in Validating Policies across Multiple Domains.14 3.6. Software-Defined Networks . . . . . . . . . . . . . . . . 15 4. Use Cases . . . . . . . . . . . . . . . . . . . . . . . . . . 15 4.1. Basic Framework . . . . . . . . . . . . . . . . . . . . . 15 4.2. Access Networks . . . . . . . . . . . . . . . . . . . . . 17 4.3. Cloud Data Center Scenario . . . . . . . . . . . . . . . 20 4.3.1. On-Demand Virtual Firewall Deployment . . . . . . . . 20 4.3.2. Firewall Policy Deployment Automation . . . . . . . . 21 4.3.3. Client-Specific Security Policy in Cloud VPNs . . . . 21 4.3.4. Internal Network Monitoring . . . . . . . . . . . . . 22 4.4. PreventingDistributed DoS, MalwareDDoS, Malware, and BotnetattacksAttacks . . . . . . 22 4.5. Regulatory and Compliance Security Policies . . . . . . . 23 5. Management Considerations . . . . . . . . . . . . . . . . . . 23 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 23 7. Security Considerations . . . . . . . . . . . . . . . . . . . 23 8.Contributors . . . . .Informative References . . . . . . . . . . . . . . . . . . . 249. Contributing Authors . . . . . . . . . . .Acknowledgments . . . . . . . . .24 10. Acknowledgments. . . . . . . . . . . . . . . . 26 Contributors . . . . . . .25 11. Informative References. . . . . . . . . . . . . . . . . . .2526 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 27 1. Introduction This documentissets out the problem statement for Interface to Network Security Functions (I2NSF)as well asand outlines someI2NSFuse cases. A summary of the state of the art in the industry and IETFwhichthat is relevant to I2NSF work is documented in[I-D.ietf-i2nsf-gap-analysis].[I2NSF-ANALYSIS]. The growing challenges and complexity in maintaining a secure infrastructure, complying with regulatory requirements, and controlling costs are enticing enterprises into consuming network security functions hosted by service providers. The hosted security service is especially attractive tosmallsmall- andmedium sizemedium-size enterpriseswhowhich suffer from a lack of security experts to continuously monitor networks, acquire newskillsskills, and propose immediate mitigations to ever increasing sets of security attacks. According to[Gartner-2013],[Gartner], the demand for hosted (or cloud-based) security services is growing.SmallSmall- andmedium-sizedmedium-size businesses (SMBs) are increasingly adopting cloud-based security services to replace on-premises security tools, while larger enterprises are deploying a mix of traditional and cloud-based security services. To meet the demand, more and more service providers are providing hosted security solutions to deliver cost-effective managed security services to enterprise customers. The hosted security services are primarily targeted at enterprises (especiallysmall/medium ones),small and medium ones) but could also be provided to any kind of mass-market customer. As a result, the Network Security Functions (NSFs) are provided and consumed in a large variety of environments. Users of NSFs may consume network security services hosted by one or more providers, which may be their own enterprise, service providers, or a combination of both. This document also briefly describes the following use cases summarized by[I-D.pastor-i2nsf-merged-use-cases]:[I2NSF-USECASES]: o[I-D.pastor-i2nsf-access-usecases] (I2NSF-Access),I2NSF Access Use Cases [OAM-USECASE], o[I-D.zarny-i2nsf-data-center-use-cases](I2NSF-DC),I2NSF Data Center Use Cases [DC-USECASE], and o[I-D.qi-i2nsf-access-network-usecase] (I2NSF-Mobile).Integrated Security with Access Network Use Case [ACCESS-USECASE]. 2. Terminology AAA: Authentication, Authorization, andAccount [RFC2904].Accounting [RFC2904] ACL: Access Control List Bespoke security management: Security managementwhichthat is made to fit a particular customer. DC: Data CentervEPC virtual 3GPP Evolved Packet Core [EPC-3GPP]FW: Firewall IDS: Intrusion Detection System IPS: Intrusion Protection System I2NSF: Interface to Network Security Functions NSF: Network Security Function. An NSF is a function that is used to ensure integrity, confidentiality, or availability of networkcommunication,communication; to detect unwanted networkactivity,activity; or toblockblock, or at leastmitigatemitigate, the effects of unwanted activity. Flow-based NSF: An NSFwhichthat inspects network flows according to a security policy. Flow-based security also means that packets are inspected in the order they arereceived,received and without altering packets due to the inspection process (e.g.,MACMedium Access Control (MAC) rewrites, TTL decrement action, or NAT inspection or changes). (Note: Some existing firewalls store packets and look at the packets in logicalorderorder, which is not the order these are received in time. This document restricts flow-based NSF to this definition.) Security service provider: A provider of security services to the customers(end-users(end users or enterprises) using NSF equipment purchased from vendors or created by the service provider. SDN:Software DefinedSoftware-Defined Networking. (See[RFC7426])[RFC7426] forarchitecturalarchitecture and terminology or [RFC7149] for a service providerview).view.) vCPE: virtual Customer Premises Equipment vEPC: virtual Evolved Packet Core [EPC-3GPP] vNSF: VirtualNSF:NSF. An NSFwhichthat is deployed as a distributed virtual resource. vPE: virtual Provider Edge VPN: Virtual PrivateNetworksNetwork 3. Problem Space The following sub-sections describe the problems and challenges facing customers and security service providers when some or all of the security functions are no longer physically hosted by the customer's administrative domain. Security service providers can be internal or external to the company. For example, an internal ITSecuritysecurity group within a large enterprise could act as a security service provider for the enterprise. In contrast, an enterprise could outsource all security services to an external security service provider. In this document, the security service provider function, whether it is internal or external, will be denoted as "service provider". The "Customer-Provider" relationship may be between any two parties. The parties can be in differentorganizationorganizations or different domains of the same organization. Contractual agreements may be required in such contexts to formally document the customer's security requirements and the provider's guarantees to fulfill those requirements. Such agreements may detail protection levels, escalation procedures, alarms reporting, etc. There is currently no standard mechanism to capture those requirements. A service provider may be a customer of another service provider. It is the objective of the I2NSF work to address these problems and challenges. 3.1. Challenges Facing Security Service Providers 3.1.1. Diverse Types of Security Functions There are many types of NSFs. NSFs by different vendors can have different features andhave differentinterfaces. NSFs can be deployed in multiple locations in a givennetwork,network and perhaps have different roles. Below are a few examples of security functions and locations or contexts in which they are often deployed: External Intrusion and Attack Protection: Examples of this function are firewall/ACL authentication, IPS, IDS, and endpoint protection. Security Functions in a Demilitarized Zone (DMZ): Examples of this function are firewall/ACLs, IDS/IPS, one or all of AAA services, NAT, forwarding proxies, and application filtering. These functions may be physically on-premise in a server provider's network at the DMZ spots or located in a "virtual" DMZ. Centralized or Distributedsecurity functions:Security Functions: The security functions could be deployed in a centralized fashion for ease of management and network design or in a distributed fashion for scaled requirement. No matter how a security function is deployed and provisioned, it is desirable to have the same interface to provision security policies;otherwise it makesotherwise, the job of security administration is more complex, requiring knowledge of firewall and network design. Internal Security Analysis and Reporting: Examples of this function are security logs, event correlation, and forensic analysis. Internal Data and Content Protection: Examples of this function are encryption, authorization, and public/private key management for internaldatabase.databases. SecuritygatewaysGateways and VPNconcentrators:Concentrators: Examples of these functionsare;are IPsec gateways, secure VPN concentrators that handle bridging secure VPNs, and secure VPN controllers for data flows. Given the diversity of security functions, the contexts in which these functions can be deployed, and the constant evolution of these functions, standardizing all aspects of security functions ischallenging,challenging andmostprobably not feasible. Fortunately, it is not necessary to standardize all aspects. For example, from an I2NSF perspective, there is no need to standardize how every firewall's filtering is created or applied. Some features in a specific vendor's filtering may be unique to the vendor'sproductproduct, so it is not necessary to standardize these features. What is needed is a standardized interface to control and monitor the rule sets that NSFs use to treat packets traversing through these NSFs.ThusThus, standardizing interfaces will provide an impetus for standardizing established security functions. I2NSF may specify some filters, but these filters will be linked to specific common functionality developed by I2NSF in information models or data models. 3.1.2. Diverse Interfaces to Control and Monitor NSFs To provide effective and competitive solutions and services, security service providers may need to utilize multiple security functions from various vendors to enforce the security policies desired by their customers. Since no widely accepted industry standardsecurityinterface tosecurityNSFs exists today, management of NSFs (device and policy provisioning, monitoring, etc.) tends to be custom-made security management offered by product vendors. As a result, automation of such services, if it exists at all, is alsocustom-made.custom made. Thus, even in the traditional way of deploying security features, there is a gap that needs tocoordinatebe filled; this would require coordination among implementations from distinct vendors.This is the main reason why mono-vendor security functions are often deployed and enabled in a particular network segment.A challenge for monitoring prior to mitigation of a security intrusion is that an NSF cannot monitor what it cannot view. For example, enabling a security function to mitigate an intrusion (e.g., firewall[I-D.ietf-opsawg-firewalls])[FIREWALLS]) must include a mechanism to provide monitoring feedback in order to determine the intrusion has been stopped. Therefore, it is necessary to have a mechanism to monitor and provide execution status of NSFs to security and compliance management tools.There exist suchSuch mechanisms exist invendor- specificvendor-specific network security interfaces for forensics and troubleshooting, but an industry standard interface could provide monitoring across a variety of NSFs. 3.1.3. More Distributed NSFs and vNSFs The security functionswhichthat are invoked to enforce a security policy can be located in different equipment and network locations. The European Telecommunications Standards Institute (ETSI) Network Functions Virtualization (NFV) initiative [ETSI-NFV] creates new management challenges for security policies to be enforced by distributedvirtual network security functions (vNSF).vNSFs. A vNSF has higher risk of changes to the state of network connection, interfaces, ortraffictraffic, as their hosting Virtual Machines (VMs) are being created, moved, or decommissioned. 3.1.4. More Demand to Control NSFs Dynamically In the advent of Software-Defined Networking(SDN)(see [I-D.jeong-i2nsf-sdn-security-services]),(SDN) (see [SDN-SECURITY]), more clients,applicationsapplications, or application controllers need to dynamically update their security policies that are enforced by NSFs. The security service providers have to dynamically update their decision-making process (e.g., in terms of NSF resource allocation and invocation) upon receivingsecurity-relatedsecurity- related requests from their clients. 3.1.5. Demand forMulti-TenancyMulti-tenancy to Control and Monitor NSFs Service providers may need to deploy several NSF controllers to control and monitor the NSFs, especially when NSFs become distributed and virtualized. 3.1.6. Lack of Characterization of NSFs and Capability Exchange To offer effective security services, service providers need to activate various security functions in NSFs or vNSFs manufactured by multiple vendors. Even within one product category (e.g., firewall), security functions provided by different vendors can have different features and capabilities. For example, filters that can be designed and activated by a firewall may or may not support IPv6 depending on the firewall technology. The service provider's management system (or controller) needs a way to retrieve the capabilities of service functions by different vendors so that itcouldcan build an effective security solution. These service function capabilities can be documented in a static manner (e.g., a file) or via an interfacewhichthat accesses a repository of security function capabilitieswhichthat the NSF vendors dynamically update. A dynamic capability registration is useful for automation because security functions may be subject to software and hardware updates. These updates may have implications on the policies enforced by the NSFs. Today, there is no standard method for vendors to describe the capabilities of their security functions. Without a common technical framework to describe the capabilities of security functions, service providers cannot automate the process of selecting NSFs by different vendors to accommodatecustomer'scustomers' security requirements. The I2NSF work will focus on developing a standard method to describe capabilities of security functions. 3.1.7. Lack of Mechanism for NSFs to Utilize External Profiles Many security functions depend on signature files or profiles (e.g., IPS/IDSsignatures, DDossignatures and DDoS Open Threat Signaling (DOTS) filters). Different policies might need different signatures or profiles. Today,black listblacklist databases can be a beneficial strategy for all parties involved (except the attackers), but in thefuturefuture, there might beopen Source-provided signature/profilesopen-source signatures and profiles distributed as part of IDS systems (e.g., by Snort, Suricata,BroBro, and Kismet). There is a need to have a standard envelope (i.e., a message format) to allow NSFs to use external profiles. 3.1.8. Lack of Mechanisms to Accept External Alerts to Trigger Automatic Rule and Configuration ChangesNSFNSFs can ask the I2NSF security controller to alter specific rules and/or configurations. For example, a Distributed Denial of Service (DDoS) alert could trigger a change to the routing system to send traffic to a traffic scrubbing service to mitigate the DDoS. The DDoS protection hasthe followingtwo parts: a) the configuration of signaling of open threats and b) DDoS mitigation. The DOTS controller manages the signaling part of DDoS. I2NSF controller(s) would control any changes to affected policies (e.g., forwarding and routing, filtering, etc.). By monitoring the network alerts regarding DDoS attacks(e.g.(e.g., from DOTS servers or clients), the I2NSF controller(s) can feed an alerts analytics engine that could recognize attacks so the I2NSF can enforce the appropriate policies. DDoS mitigation is enhanced if the provider's network security controller can monitor, analyze, and investigate the abnormal events and provide information to the customer or change the network configuration automatically.[I-D.zhou-i2nsf-capability-interface-monitoring][CAP-INTERFACE] provides details on how monitoring aspects of the flow-based Network Security Functions (NSFs) can use the I2NSF interfaces to receive traffic reports and enforce appropriate policies. 3.1.9. Lack of Mechanism for Dynamic Key Distribution to NSFs There is a need for a controller to create, manage, and distribute various keys to distributed NSFs. While there are many key management methods and cryptographic suites (e.g., encryption algorithms, key derivation functions, etc.) and other functions, there is a lack of a standard interface to provision and manage security associations. The keys may be used for message authentication and integrity in order to protect data flows. In addition, keys may be used to secure the protocols and messages in the core routing infrastructure (see[RFC4948])[RFC4948]). As ofnownow, there is not much focus on an abstraction for keying information that describes the interface between protocols, operators, and automated key management. An example of a solution may provide some insight into why the lack of a mechanism is a problem. If a device had an abstract key table maintained by security services, it could use these keys for routing and security devices. What does this take? Conceptually, there must be an interface defined for routing/ signaling protocols thatcan:can a) make requests for automated key management when it is beingused.used and b) notify the protocols when keys become available in the key table. One potential use of such an interface is to manage IPsec security associations onSDN networks.Software- Defined Networks. An abstract key service will work under the following conditions: 1. I2NSF needs to design the key table abstraction, the interface between key management protocols and routing/other protocols, and possibly security protocols at other layers. 2. For each routing/other protocol, I2NSF needs to define the mapping between how the protocol represents key material and the protocol-independent key table abstraction. If several protocols share common mechanisms for authentication (e.g., TCP Authentication Option [RFC5925]), then the same mapping may be used for all usages of that mechanism. 3. Automated key management needs to support bothpair-wisepairwise keys and group keys via the abstract key service provided by items 1 and 2. I2NSF controllers within the NSF that are required to exchange data with NSFs may exchange data with individual NSFs using individualpair-wisepairwise keys or with a group of NSFs simultaneously using an IP group address secured by a group security key(s). 3.2. Challenges Facing Customers When customers invoke hosted security services, their security policies may be enforced by a collection of security functions hosted in different domains. Customers may not have the security skills to express sufficiently precise requirements or security policies. Usually, these customers express the expectations of their security requirements or the intent of their security policies. These expectations can be considered customer-level security expectations. Customers may also desire to express guidelines for security management. Examples of such guidelines include: oWhichwhich critical communications are to be preserved during critical events and which hosts will continue services over the network, oWhatwhat signaling information is passed to a controller during aDistributed Denial of ServiceDDoS in order to ask for mitigation services (within the scope of the DOTSworking group),Working Group), oReportingreporting of attacks to CERT (within the scope of the MILEworking group),Working Group), and oManagingmanaging network connectivity of systems out of compliance (within the scope of the SACMworking group).Working Group). 3.2.1. NSFs from Heterogeneous Administrative Domains Many medium and large enterprises have deployed various on-premises security functionswhichthat they want to continue to use. These enterprises want to combine local security functions with remote hosted security functions to achieve more efficient and immediatecounter-measurescountermeasures toboth Internet-originatedattacks originating on both the Internet and enterprisenetwork-originated attacks.networks. Some enterprises may only need the hosted security services for their remote branch offices where minimal security infrastructures/ capabilities exist. The security solution will consist of deploying NSFs on customer networks and on service provider networks. 3.2.2. Today's Vendor-Specific Control Requestsare Vendor SpecificCustomers may utilize NSFs provided by multiple service providers. Customers need to express their security requirements, guidelines, and expectations to the service providers. In turn, the service providers must translate this customer information into customer security policies and associated configuration tasks for the set of security functions in their network. Without a standardized interface that provides a clear technical characterization, the service provider faces many challenges: No standard technical characterization, APIs, orInterface:interface(s): Even for the most common securityservicesservices, there is no standard technical characterization, APIs, or interface(s). Most security services are accessible only through disparate, proprietary interfaces (e.g., portals or APIs) in whatever format vendors choose to offer. The service provider must process the customer's input with these widely varying interfaces and differing configuration models for security devices and security policy. Without a standard interface, new innovative security products find a large barrier to entry into the market. Lack of immediate feedback: Customers may also require a mechanism to easily update/modify their security requirements with immediate effect in the underlying involved NSFs. Lack of explicit invocation request: While security agreements are in place, security functions may be solicited without requiring an explicit invocation means. Nevertheless, some explicit invocation means may be required to interact with a service function. Managing by scriptsde-jour:du jour: The current practices rely upon the use of scripts that generate otherscriptsscripts, which automatically run to upload or download configuration changes, loginformationinformation, and other things. These scripts have to be adjusted each time an implementation from a different vendor technology is enabled by a provider. To see how standard interfaces could help achieve faster implementation time cycles, let us consider a customer who would like to dynamically allow an encrypted flow with a specific port, src/dstaddressesaddresses, or protocol type through the firewall/IPS to enable an encrypted video conferencing call only during the time of the call. With no commonly accepted interface in place, as shown infigureFigure 1, the customer would have to learn about the particular provider's firewall/IPS interface and send the request in the provider's required format. +------------+ |securitySecurity | |managementManagement | |systemSystem | +----||------+ ||proprietaryProprietary || or I2NSFstandardStandard Video: || Port 10 +--------+ --------| FW/IPS |------------- Encrypted +--------+ Video Flow Figure 1: Example ofnon-standardNon-standard vs.standard interfaceStandard Interface In contrast, asfigureFigure 1 shows, if a firewall/IPS interface standardexistsexists, the customer would be able to send the request to a security managementsystemsystem, and the security management would send it via a I2NSF standard interface. Service providers could now utilize the same standard interfaceinterfaceto represent firewall/IPS services implemented using products from many vendors. 3.2.3.DifficultDifficulty forCustomerCustomers to Monitor the Execution of Desired Policies How a policy is translated into technology-specific actions is hidden from the customers. However, customers still need ways to monitor the delivered security service that results from the execution of their desired security requirements,guidelinesguidelines, and expectations. Customers want to monitor existing policies to determine such thingsas:as which policies are in effect, how many security attacks are being prevented, and how much bandwidth efficiency does security enforcement cost. Today, there is no standard way for customers to get these details from the securityservice whichservice. As a consequence, there is no way to assurethe customercustomers that their specified security policies are properly enforced by the security functions located in the provider domain. Customers also want this monitoring information from the security system in order to plan for the future using "what-if" scenarios with real data. A tight loop between the data gathered from security systems and the "what-if" scenario planning can reduce the time to design and deploy workable security policies that deal with new threats. It is the objective of the I2NSF work to provide a standard way to get the information that security service assurance systems need to provide customers an evaluation about the current securitysystems,systems and to quickly plan for future security policies using "what-if" scenarios based on today'sinformationinformation. 3.3. Lack of Standard Interface to Inject Feedback to NSF Today, many security functions in the NSF, such as IPS, IDS, DDoSmitigationmitigation, and antivirus, depend heavily on the associated profiles. NSF devices can perform more effective protection if these NSF devices have the up-to-date profiles for these functions.TodayToday, there is no standard interface to provide these security profiles for the NSF. As more sophisticated threats arise, protection will depend on enterprises, vendors, and service providers being able to cooperate to develop optimalprofiles such asprofiles; one example of this cooperation is the Cyber Threat Alliance [CTA]. The standard interface to provide security profiles to the NSF should interwork with the formatswhichthat exchange security profiles between organizations. One objective of the I2NSF work is to provide this type of standard interface to security profiles. 3.4. Lack of Standard Interface for Capability Negotiation There could be situations when the selected NSFs cannot perform the policies requested by theSecurity Controller,security controller due to resource constraints. The customer and security service provider should negotiate the appropriate resource constraints before the security service begins. However, unexpected events may happencausingthat cause the NSF to exhaust those negotiated resources. At this point, the NSF should inform the security controller that theallotedallotted resources have been exhausted. To support the automatic control in theSDN-era,SDN era, it is necessary to have a set of messages for proper notification (and a response to that notification) between theSecurity Controllersecurity controller and the NSFs. 3.5.Difficult to ValidateDifficulty in Validating Policies across Multiple Domains As discussed in the previous foursections,sub-sections, both service providers and customers have need to express policies and profiles, monitor systems, verify security policy has been installed in NSFs within a security domain, and establish limits for services NSFs can safely perform. This sub-section and the next sub-section(section(Section 3.6) examine what happens in two specific network scenarios: a)multi- domainmulti-domain control of security devices hosted on virtual and non-virtualNSFs,NSFs and b)software defined networking.Software-Defined Networking. Hosted security service may instantiate NSFs in virtual machineswhichthat are sometimes widely distributed in the network and sometimes are combined together in one device to perform a set of tasks for delivering a service. Hosted security services may be connected within a single service provider or via multipleservices provider.service providers. Ensuring that the security service purchased by the customer adheres to customer policy requires that the central controller(s) for this service monitor and validate this service across multiple networks on NSFs (some of which may be virtual networks on virtual machines). To set up this cross-domain service, the security controller must be able to communicate with NSFs and/or controllers within its domain and across domains to negotiate for the services needed. Without standard interfaces and security policy data models, the enforcement of a customer-driven security policy remains challenging because of the inherent complexity created by combining the invocation of several vendor-specific security functions into a multi-vendor, heterogeneous environment across multiple domains. Each vendor-specific function may require specific configuration procedures and operational tasks. Ensuring the consistent enforcement of the policies at various domains is also challenging. Standard data models are likely to contribute to solving that issue. 3.6. Software-Defined Networks Software-Defined Networks have changed the landscape ofdata centerdata-center designs by introducing overlay networks deployed overTop of RackTop-of-Rack (ToR) switches that connect to a hypervisor. SDN techniques are meant to improve the flexibility of workload management without affecting applications and how they work. Workload can thus be easily and seamlessly managed across private and public clouds. SDN techniques optimize resource usage and are now being deployed in various networkingenvironments,environments besides cloud infrastructures. Yet, suchSDN conferredSDN-conferred agility may raise specific security issues. Forexampleexample, a security administrator must make sure that a security policy can be enforced regardless of the location of the workload, thereby raising concerns about the ability of SDN computation logic to send security policy-provisioning information to the participating NSFs. A second example is workload migration to a public cloudinfrastructureinfrastructure, which may raise additional security requirements during the migration. 4. Use Cases Standard interfaces for monitoring and controlling the behavior of NSFs are essential building blocks for security service providers and enterprises to automate the use of different NSFs from multiple vendors by their security management entities. I2NSF may be invoked by any (authorized) client. Examples of authorized clients are upstream applications (controllers), orchestration systems, and security portals. 4.1. Basic Framework Users request security services through specific clients (e.g., a customer application, theNetwork Service Providers (NSP)Business SupportSystems/OperationsSystems / Operations Support Systems(BSS/OSS)(BSSs/OSSs) of Network Service Providers (NSPs), or a managementplatform)platform), and the appropriate NSP network entity will invoke the (v)NSFs according to the user service request. This network entity is denoted as the security controller in this document. The interaction between the entities discussed above (client, security controller, and NSF) is shown in Figure 2: +----------+ +-------+ | | +-------+ | | Interface 1 |Security | Interface 2 | NSF(s)| |Client <--------------> <------------------> | | | |Controller| | | +-------+ | | +-------+ +----------+ Figure 2: Interaction between Entities Interface 1 is used for receiving security requirements from a client and translating them into commands that NSFs can understand and execute. The security controller also passes back NSF security reports (e.g., statistics) to the clientwhichthat the security controller has gathered from NSFs. Interface 2 is used for interacting with NSFs according to commands (e.g., enact/revoke a securitypolicy,policy or distribute apolicy),policy) and collecting status information about NSFs. Client devices or applications can require the security controller to add,deletedelete, or update rules in the security service function for their specific traffic. When users want to get the executing status of a security service, they can request NSF status from the client. The security controller will collect NSF information through Interface 2, consolidate it, and give feedback to the client through Interface 1. This interface can be used to collect not only individual service information, but also aggregated data suitable for tasks like infrastructure security assessment. Customers may require validating NSF availability, provenance, and execution. This validation process, especially relevant to vNSFs, includes at least: Integrity of the NSF: Ensuring that the NSF is not compromised; Isolation: Ensuring the execution of the NSF is self-contained for privacy requirements in multi-tenancy scenarios; and Provenance of the NSF: Customers may need to be provided with strict guarantees about the origin of the NSF, its status (e.g., available, idle, down, and others), and feedback mechanisms so that a customer may be able to check that a given NSF or set of NSFs properly conform to thethecustomer's requirements and subsequent configuration tasks. In order to achieve this, the security controller may collect security measurements and share them with an independent and trusted third party (via Interface 1) in order to allow for attestation of NSF functions using thethird partythird-party added information. This implies that there may be the following two types of clients usinginterfaceInterface 1: theend-user andend user and thetrustedtrusted, independent third party. The I2NSF work may determine thatinterfaceInterface 1 creates two sub-interfaces to support these two types of clients. 4.2. Access Networks This scenario describes use cases for users (e.g., residential user, enterprise user, mobile user, and management system) that request and manage security services hosted in the NSP infrastructure. Given that NSP customers are essentially users of their access networks, the scenario is essentially associated with their characteristics as well as with the use of vNSFs. Figure 3 shows how different types ofcustomercustomers connect through virtual access nodes (vCPE, vPE, and vEPC) to an NSF. Thevirtual customer premise equipment (vCPE)vCPE described in use case #7 in [NFVUC] requires a model of access virtualization that includes mobile and residential access networks where the operator may offload security services from thecustomercustomer's local environment (e.g., device or terminal) to its own infrastructure. These use cases define the interaction between the operator and the vNSFs through automated interfaceswhichthat support the business communications between customer and provider or between two business entities. Customer + Access +PoP/DatacenterPoP / Data Center | | +--------+ | ,-----+--. |Network | | ,' | `-|Operator| +-------------+ | /+----+ | |Mgmt Sys| | Residential |-+------/-+vCPE+----+ +--------+ +-------------+ | / +----+ | \ | : | / | \ | | +----------+ | ; +----+ | +----+ | |Enterprise|---+---+----+ vPE+--+----+ NSF| | +----------+ | : +----+ | +----+ | | : | / | +--------+ | : +----+ | / ; | Mobile |-+-----\--+vEPC+----+ / +--------+ | \ +----+ | Service / | `--. | Provider / | `----+---------.. + + ^^ || Service Provider encompasses everything in circle vCPE - virtual customerpremisepremises equipment vPE - virtual providerequipmentedge vEPC - virtual evolved packet core(mobile-core network)PoP - point of presence Figure 3: NSF andactorsActors Different access clients may have different service requests: Residential: service requests for parental control, content management, and threat management. Threat content management may include identifying and blocking malicious activities from web contents, mail, or files downloaded. Threat management may include identifying and blocking botnets or malware. Enterprise: service requests for enterprise flow security policies and managed securityservicesservices. Flow security policies identify and block malicious activities during access to (or isolation from) web sites or social media applications. Managed security services for an enterprise may include detection and mitigation of external and internal threats. External threats can include application or phishing attacks, malware, botnet, DDoS, and others. Service Provider:Serviceservice requests for policies that protect service provider networks against various threats (including DDoS,botnetsbotnets, and malware). Such policies are meant to securely and reliably deliver contents (e.g., data, voice, and video) to various customers, including residential,mobilemobile, and corporate customers. These security policies are also enforced to guarantee isolation between multiple tenants, regardless of the nature of the corresponding connectivity services. Mobile: service requests from interfaceswhichthat monitor and ensure user quality of experience, content management, parental controls, and external threat management. Content management for the mobile device includes identifying and blocking malicious activities from web contents, mail, and files uploaded/downloaded. Threat management for infrastructure includes detecting and removing malicious programs such as botnet, malware, and other programs that createdistributed DoSDDoS attacks). Some access customers may not care about which NSFs are utilized to achieve the services they requested. In this case, provider network orchestration systems can internally select the NSFs (or vNSFs) to enforce the security policies requested by the clients. Other access customers, especially some enterprise customers, may want to contract separately for dedicated NSFs (most likely vNSFs) for direct control purposes. In this case, here are the steps to associate vNSFs to specific customers: vNSF Deployment: The deployment process consistsinof instantiating an NSF ona Virtualization Infrastructurean NFV Infrastructure (NFVI), within the NSP administrative domain(s) or with other external domain(s). This is a required step before a customer can subscribe to a security service supported in the vNSF. vNSF Customer Provisioning: Once a vNSF is deployed, any customer can subscribe to it. The provisioning life cycle includes the following: * Customer enrollment and cancellation of the subscription to avNSF;vNSF. * Configuration of the vNSF, based on specificconfigurations,configurations or derived from common security policies defined by the NSP. * Retrieval of the vNSF functionalities, extracted from a manifest or a descriptor. The NSP management systems can demand this information to offer detailed information through the commercial channels to the customer. 4.3. Cloud Data Center Scenario In a data center, network security mechanisms such as firewalls may need to be dynamically added or removed for a number of reasons. These changes may be explicitly requested by theuser,user or triggered by apre-agreed uponpre-agreed-upon demand level in the Service Level Agreement (SLA) between the user and the provider of the service. For example, the service provider may be required to add more firewall capacity within a set of time frames whenever the bandwidth utilization hits a certain threshold for a specified period. This capacity expansion could result in adding new instances of firewalls on existing machines or provisioning a completely new firewall instance in a different machine. The on-demand, dynamic nature of security service delivery essentially encourages that the network security "devices" be in software or virtualforms,forms rather than in a physical appliance form. This requirement is a provider-side concern. Users of the firewall service are agnostic (as theyshould)should be) as to whether or not the firewall service is run on a VM or any other form factor. Indeed, they may not even be aware that their traffic traverses firewalls. Furthermore, new firewall instances need to be placed in the "right zone" (domain). The issue applies not only to multi-tenant environments where getting the tenant in the right domain is of paramount importance, but also in environments owned and operated by a single organization with its own service segregation policies. For example, an enterprise may mandate that firewalls serving Internettraffic, within organization, and inter-organizationtraffic within the organization beseparated.separated from inter-organization traffic. Another example isthatIPS/IDS serviceswhich splits traffic intothat split investment banking trafficandfrom other data traffic to comply with regulatory restrictions for transfer of investment banking information. 4.3.1. On-Demand Virtual Firewall Deployment Aservice provider-operatedcloud data center operated by a service provider could serve tens of thousands of clients. Clients' compute servers are typically hosted on VMs, which could be deployed across different server racks located in different parts of the data center. It is often not technically and/or financially feasible to deploy dedicated physical firewalls to suit each client's security policy requirements, which can be numerous. What is needed is the ability to dynamically deploy virtual firewalls for each client's set of servers based on established security policies and underlying network topologies. Figure 4 shows an example topology of virtual firewalls within a data center. ---+-----------------------------+----- | | +---+ +-+-+ |vFW| |vFW| +---+ +-+-+ | Client #1 | Client #2 ---+-------+--- ---+-------+--- +-+-+ +-+-+ +-+-+ +-+-+|vM|VM ||vM|VM ||vM|VM ||vM|VM | +---+ +---+ +---+ +---+ Figure 4: NSF in Data Centers 4.3.2. Firewall Policy Deployment Automation Firewallrule setting is often a time consuming, complexrules apply to traffic usually identified with addresses anderror- prone process even within a single organization/enterprise framework.ports. It becomes far more complex in provider-owned cloud networks that serve myriads of customers. Firewall rules today are highly tied with ports and addresses that identify traffic. This makes it very difficult for clients of cloud data centers to construct rules for their owntraffictraffic, as the clients only see the virtual networks and the virtual addresses. The customer-visible virtual networks and addresses may be different from the actual packets traversing thefirewalls (FWs).firewalls. Even though most vendors support similar firewall features, the specific rule configuration keywords are different fromvendorsvendor tovendors,vendor, making it difficult for automation. Automation works best when it can leverage a common set of standards that will work across NSFs by multiple vendors and utilize dynamic key management. 4.3.3. Client-Specific Security Policy in Cloud VPNs Clients ofservice provider-operatedcloud data centers operated by a service provider need to secure Virtual Private Networks (VPNs) and virtual security functions that apply the clients' security policies. The security policies may govern communication within the clients' own virtual networks as well as communication with external networks. For example, VPN service providers may need to provide firewall and other security services to their VPN clients. Today, it is generally not possible for clients to dynamically view (let alone change) what,wherewhere, and how security policies are implemented on their provider-operated clouds. Indeed, no standards-based framework exists to allow clients to retrieve/ manage security policies in a consistent manner across different providers. As described above, the dynamic key management is critical forthesecuring the VPN and the distribution of policies. 4.3.4. Internal Network Monitoring There are many types of internal traffic monitors that may be managed by a security controller. This includes the class of services referred to as Data Loss Prevention(DLP),(DLP) or Reputation Protection Services (RPS). Depending on the class of event, alerts may go to internaladministrators,administrators or external services. 4.4. PreventingDistributed DoS, MalwareDDoS, Malware, and Botnetattacks InAttacks On theInternetInternet, where everything is connected, preventing unwanted traffic that may cause aDenial of Service (DoS)DoS attack or adistributed DoS (DDoS)DDoS attack has become a challenge. Similarly, a network could be exposed to malware attacks and become an attack vectortothat may jeopardize the operation of other networks, by means of remote commands for example. Many networkswhichthat carry groups of information (such as Internet of Things (IoT) networks,Information- CentricInformation-Centric Networks(ICN),(ICNs), Content Delivery Networks(CDN),(CDNs), Voice over IP (VoIP) packetnetworks (VoIP),networks, and Voice over LTE (VoLTE)) are also exposed to such remote attacks. There are many examples of remote attacks on these networks, but the following examples will illustrate the issues. A malware attack on an IoT networkwhichthat carries sensor readings and instructions may attempt to alter the sensor instructions in order to disable a key sensor. A malware attack on VoIP or VoLTE networksisinvolves software that attempts to place unauthorized long-distance calls. Botnets may overwhelm nodes inICNICNs andCDN networksCDNs so that the networks cannot pass critical data. In order for organizations to better secure their networks against these kind of attacks, the I2NSF framework should provide a client- side interface that is usecase-independentcase independent andtechnology-agnostic. Technology-agnostic is totechnology agnostic. Technology agnostic is defined to be generic, technology independent, and able to support multiple protocols and data models. For example, such an I2NSF interface could be used to provision security policy configuration information that looks for specific malware signatures. Similarly, botnet attacks could be easily prevented by provisioning security policies using the I2NSFclient- sideclient-side interface thatpreventprevents access to botnet command and control servers. 4.5. Regulatory and Compliance Security Policies Organizations must protect their networks against attacks and must also adhere to various industry regulations: any organization that falls under a specificregulationregulation, like the Payment Card Industry(PCI)-- Data Security Standard(DSS)(PCI-DSS) [PCI-DSS] for the payment industry or the Health Insurance Portability and Accountability Act [HIPAA] for the healthcareindustryindustry, must be able to isolate various kinds of traffic. They must also show records of their security policies whenever audited. The I2NSF client-side interface could be used to provision regulatory and compliance-related security policies. The security controller would keep track of when and where a specific policy is applied and if there is any policy violation; this information can be provided in the event of an audit asaproof that traffic is isolated between specific endpoints, in full compliance with the required regulations. 5. Management Considerations Management of NSFs usually include the following: oLife cycleLife-cycle management and resource management of NSFs, o Device configuration, such as address configuration, device internal attributes configuration, etc., o Signaling of events,notificationsnotifications, and changes, and o Policy rule provisioning. I2NSF will only focus on the policy provisioning part of NSF management. 6. IANA ConsiderationsNoThis document does not require any IANAconsiderations exist for this document.actions. 7. Security Considerations Having secure access to control and monitor NSFs is crucial for hosted security services. An I2NSF security controller raises new security threats. It needs to be resilient to attacks and quickly recover fromattacks.them. Therefore, proper secure communication channels have to be carefully specified forcarrying controllingcarrying, controlling, and monitoring traffic between the NSFs and their management entity (or entities). The traffic flow security policies specified by customers can conflict with providers' internal traffic flow security policies. This conflict can be resolved in one of two ways: a) installed policies can restrict traffic if either the customer traffic flow security policies or the provider's internal security policies restrict traffic, or b) installed policies can only restrict traffic if both the customer traffic flow security policies and the provider's internal traffic flow security policies restrict data. Either choice could cause potential problems. It is crucial for the management system to flag these conflicts to the customers and to the service provider. It is important to proper AAA [RFC2904] to authorize access to the network and access to the I2NSF management stream. Enforcing the appropriate privacy is key to all IETF protocols (see[RFC6973]),[RFC6973]) and is especially important for IETFSecuritysecurity management protocols since they are deployed to protect the network. In some circumstances, security management protocols may be utilized to protect an individual's home, phone, or other personal data. In this case, any solution should carefully consider whether combining management streams abides by the recommendations of [RFC6973] for data minimization, user participation, and security. 8.Contributors I2NSF is a group effort. The following people actively contributed to the initial use case text: Xiaojun Zhuang (China Mobile), Sumandra Majee (F5), Ed Lopez (Curveball Networks),Informative References [ACCESS-USECASE] Wang, K. andRobert Moskowitz (Huawei). 9. Contributing Authors I2NSF has had a number of contributing authors. The following are contributing authors: o Linda Dunbar (Huawei), o Antonio Pastur (Telefonica I+D), o Mohamed Boucadair (France Telecom), o Michael Georgiades (Prime Tel), o Minpeng Qi (China Mobile), o Shaibal Chakrabarty (US Ignite), o Nic Leymann (Deutsche Telekom), o Anil Lohiya (Juniper), o David Qi (Bloomberg), o Hyoungshick Kim (Sungkyunkwan University), o Jung-Soo Park (ETRI), o Tae-Jin Ahn (Korea Telecom),X. Zhuang, "Integrated Security with Access Network Use Case", Work in Progress, draft-qi-i2nsf- access-network-usecase-02, March 2015. [CAP-INTERFACE] Zhou, C., Xia, L., Boucadair, M., ando Se-Hui Lee (Korea Telecom). 10. Acknowledgments This document was supported by InstituteJ. Xiong, "The Capability Interface forInformation and communications Technology Promotion (IITP) funded by the Korea government (MSIP) [R0166-15-1041, Standard Development ofMonitoring Network Securitybased SDN]. 11. Informative ReferencesFunctions (NSF) in I2NSF", Work in Progress, draft-zhou- i2nsf-capability-interface-monitoring-00, October 2015. [CTA]Cyber Threat Alliance, ,"Cyber Threat Alliance",October 2016,<http://cyberthreatalliance.org>. [DC-USECASE] Zarny, M., Majee, S., Leymann, N., and L. Dunbar, "I2NSF Data Center Use Cases", Work in Progress, draft-zarny- i2nsf-data-center-use-cases-00, October 2014. [EPC-3GPP] Firmin, F., "The Evolved Packet Core", January 2017. [ETSI-NFV]ETSI GS NFV 002 V1.1.1, ,ETSI, "Network Functions Virtualisation (NFV); Architectural Framework", ETSI GS NFV 002 V1.2.1, December 2014. [FIREWALLS] Baker, F. and P. Hoffman, "On Firewalls in Internet Security", Work in Progress, draft-ietf-opsawg-firewalls- 01, October2013. [Gartner-2013]2012. [Gartner] Messmer, E., "Gartner: Cloud-based security as a service set to take off", October 2013. [HIPAA] US Congress,, "HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF"Health Insurance Portability and Accountability Act of 1996 (Public Law 104-191)", August 1996, <https://www.hhs.gov/hipaa/>.[I-D.ietf-i2nsf-gap-analysis][I2NSF-ANALYSIS] Hares, S., Moskowitz, R., and D. Zhang, "Analysis of Existing work for I2NSF",draft-ietf-i2nsf-gap-analysis-03 (workWork inprogress),Progress, draft-ietf- i2nsf-gap-analysis-03, March 2017.[I-D.ietf-opsawg-firewalls] Baker, F. and P. Hoffman, "On Firewalls in Internet Security", draft-ietf-opsawg-firewalls-01 (work in progress), October 2012. [I-D.jeong-i2nsf-sdn-security-services] Jeong, J., Kim, H., Jung-Soo, P., Ahn, T., and s. sehuilee@kt.com, "Software-Defined Networking Based Security Services using Interface to Network Security Functions", draft-jeong-i2nsf-sdn-security-services-05 (work in progress), July 2016. [I-D.pastor-i2nsf-access-usecases] Pastor, A. and D. Lopez, "Access Use Cases for an Open OAM Interface to Virtualized Security Services", draft-pastor- i2nsf-access-usecases-00 (work in progress), October 2014. [I-D.pastor-i2nsf-merged-use-cases][I2NSF-USECASES] Pastor, A., Lopez, D., Wang, K., Zhuang, X., Qi, M., Zarny, M., Majee, S., Leymann, N., Dunbar, L., and M. Georgiades, "Use Cases and Requirements for an Interface to Network Security Functions",draft-pastor-i2nsf-merged- use-cases-00 (workWork inprogress),Progress, draft- pastor-i2nsf-merged-use-cases-00, June 2015.[I-D.qi-i2nsf-access-network-usecase] Wang, K. and X. Zhuang, "Integrated Security with Access Network Use Case", draft-qi-i2nsf-access-network- usecase-02 (work in progress), March 2015. [I-D.zarny-i2nsf-data-center-use-cases] Zarny, M., Leymann, N., and L. Dunbar, "I2NSF Data Center[NFVUC] ETSI, "Network Functions Virtualization (NFV); Use Cases",draft-zarny-i2nsf-data-center-use-cases-00 (work in progress), October 2014. [I-D.zhou-i2nsf-capability-interface-monitoring] Zhou, C., Xia, L., Boucadair, M., and J. Xiong, "The Capability Interface for Monitoring Network Security Functions (NSF) in I2NSF", draft-zhou-i2nsf-capability- interface-monitoring-00 (work in progress), October 2015. [NFVUC]ETSIGSGR NFV 001V1.1.1, , "ETSI NFV Group Specification, Network Functions Virtualization (NFV)V1.2.1, May 2017. [OAM-USECASE] Pastor, A. and D. Lopez, "Access UseCases",Cases for an Open OAM Interface to Virtualized Security Services", Work in Progress, draft-pastor-i2nsf-access-usecases-00, October2013.2014. [PCI-DSS] PCI Security Standards Council,,"Payment Card Industry (PCI) Data Security Standard -- Requirements and Security AssessmentProcedures (version 3.2)",Procedures", PCS DSS v3.2, April 2016, <https://www.pcisecuritystandards.org/pci_security/>. [RFC2904] Vollbrecht, J., Calhoun, P., Farrell, S., Gommans, L., Gross, G., de Bruijn, B., de Laat, C., Holdrege, M., and D. Spence, "AAA Authorization Framework", RFC 2904, DOI 10.17487/RFC2904, August 2000, <http://www.rfc-editor.org/info/rfc2904>. [RFC4948] Andersson, L., Davies, E., and L. Zhang, "Report from the IAB workshop on Unwanted Traffic March 9-10, 2006", RFC 4948, DOI 10.17487/RFC4948, August 2007, <http://www.rfc-editor.org/info/rfc4948>. [RFC5925] Touch, J., Mankin, A., and R. Bonica, "The TCP Authentication Option", RFC 5925, DOI 10.17487/RFC5925, June 2010, <http://www.rfc-editor.org/info/rfc5925>. [RFC6973] Cooper, A., Tschofenig, H., Aboba, B., Peterson, J., Morris, J., Hansen, M., and R. Smith, "Privacy Considerations for Internet Protocols", RFC 6973, DOI 10.17487/RFC6973, July 2013, <http://www.rfc-editor.org/info/rfc6973>. [RFC7149] Boucadair, M. and C. Jacquenet, "Software-Defined Networking: A Perspective from within a Service Provider Environment", RFC 7149, DOI 10.17487/RFC7149, March 2014, <http://www.rfc-editor.org/info/rfc7149>. [RFC7426] Haleplidis, E., Ed., Pentikousis, K., Ed., Denazis, S., Hadi Salim, J., Meyer, D., and O. Koufopavlou, "Software- Defined Networking (SDN): Layers and Architecture Terminology", RFC 7426, DOI 10.17487/RFC7426, January 2015, <http://www.rfc-editor.org/info/rfc7426>. [SDN-SECURITY] Jeong, J., Kim, H., Park, J., Ahn, T., and S. Lee, "Software-Defined Networking Based Security Services using Interface to Network Security Functions", Work in Progress, draft-jeong-i2nsf-sdn-security-services-05, July 2016. Acknowledgments This document was supported by the Institute for Information & Communications Technology Promotion (IITP), which is funded by the Ministry of Science, ICT & Future Planning (MSIP) (R0166-15-1041, Standard Development of Network Security based SDN). Contributors I2NSF is a group effort. The following people actively contributed to the initial use case text: Xiaojun Zhuang (China Mobile), Sumandra Majee (F5), Ed Lopez (Curveball Networks), and Robert Moskowitz (Huawei). I2NSF has had a number of contributing authors. The following are considered co-authors: o Linda Dunbar (Huawei) o Antonio Pastur (Telefonica I+D) o Mohamed Boucadair (France Telecom) o Michael Georgiades (Prime Tel) o Minpeng Qi (China Mobile) o Shaibal Chakrabarty (US Ignite) o Nic Leymann (Deutsche Telekom) o Anil Lohiya (Juniper) o David Qi (Bloomberg) o Hyoungshick Kim (Sungkyunkwan University) o Jung-Soo Park (ETRI) o Tae-Jin Ahn (Korea Telecom) o Se-Hui Lee (Korea Telecom) Authors' Addresses Susan Hares Huawei 7453 Hickory Hill Saline, MI 48176USAUnited States of America Phone: +1-734-604-0332 Email: shares@ndzh.com Diego R. Lopez Telefonica I+D Don Ramon de la Cruz, 82 Madrid 28006 Spain Email: diego.r.lopez@telefonica.com Myo Zarny vArmour 800 El Camino Real, Suite 3000 Mountain View, CA 94040USAUnited States of America Email: myo@varmour.com Christian Jacquenet France Telecom Rennes, 35000 France Email: Christian.jacquenet@orange.com Rakesh Kumar Juniper Networks 1133 Innovation Way Sunnyvale, CA 94089USAUnited States of America Email:rkkumar@juniper.netrakeshkumarcloud@gmail.com Jaehoon Paul Jeong Department of Software Sungkyunkwan University 2066 Seobu-Ro, Jangan-Gu Suwon, Gyeonggi-Do 16419 Republic of Korea Phone: +82 31 299 4957 Fax: +82 31 290 7996 Email: pauljeong@skku.edu URI: http://iotlab.skku.edu/people-jaehoon-jeong.php