Chapter 7 - 09 - Discuss Importance of Load Balancing in Network Security - 01_ocred_fax_ocred.pdf
Document Details
Uploaded by barrejamesteacher
null
EC-Council
Tags
Related
- Cybersecurity Technician Network Security Controls PDF
- Chapter 7 - 09 - Discuss Importance of Load Balancing in Network Security - 01_ocred.pdf
- Chapter 7 - 09 - Discuss Importance of Load Balancing in Network Security - 02_ocred.pdf
- Chapter 7 - 09 - Discuss Importance of Load Balancing in Network Security - 02_ocred_fax_ocred.pdf
- Introductory Overview-Module 2 & 3- Cybersecurity Domains & Network Security PDF
- Apply Security Principles to Secure Enterprise Infrastructure PDF
Full Transcript
Certified Cybersecurity Technician Exam 212-82 Network Security Controls — Technical Controls Module Flow Discuss Essential Network...
Certified Cybersecurity Technician Exam 212-82 Network Security Controls — Technical Controls Module Flow Discuss Essential Network Understand Different Types of Security Protocols Proxy Servers and their Benefits Discuss Security Benefits Discuss Security Benefits L7 an- Discuss Fundamentals of VPN and its importance in Network of Network Segmentation - T s i ~ 4 Security ecurity e Understand Different Types Discuss Other Network Security of Firewalls and their Role Controls Understand Different Types Discuss Importance of Load of IDS/IPS and their Role Balancing in Network Security Understand Different Types Understand Various of Honeypots Antivirus/Anti-malware Software Discuss Importance of Load Balancing in Network Security Load balancers play a major role in an organization’s IT infrastructure. They ensure the availability of applications, servers, and other IT resources to the end users and customers. It improves the efficiency and robustness of the network environment. This section discusses load balancers, along with algorithms and tools used for load balancing. Module 07 Page 994 Certified Cybersecurity Technician Copyright © by EC-Council EG-Council Certified Cybersecurity Technician Exam 212-82 Network Security Controls — Technical Controls Load Balancer O Aload balancer is a device responsible for distributing network traffic across multiple servers in a distributed system O It has the capability of controlling the number of requests to protect against rate-based attacks such as denial of service (DoS) or distributed denial of service (DDoS) EEE. Load Balancer A load balancer/server farm/server pool is a device responsible for distributing network traffic across multiple servers in a distributed system. It can be a physical device or a virtual device running on hardware or a process. It is implemented between client devices and back-end servers. A load balancer acts as a reverse proxy, and its main purpose is to disseminate all the incoming or external network and application traffic very effectively throughout several back- end servers. By distributing client requests across all servers, it ensures maximum speed capacity utilization, prevents server overloads, and provides protection from rate-based attacks such as DoS or distributed denial of service (DDoS). For example, if a server goes down, the load balancer starts distributing the traffic among other online servers. Based on the demand, if a server is newly added, the load balancer starts distributing traffic to the new server as well. If a server is removed, the load balancer starts distributing the traffic among the remaining servers. Furthermore, load balancers can also increase the maximum number of concurrent users and can increase the consistency of the applications used by the clients. Using load-balancing techniques, the response time can be decreased, throughput can be improved for each task, and the burden on the servers can be decreased, resulting in enhanced overall performance. Load balancers are categorized into layer-4 and layer-7 load balancers. Layer-4 load balancers distribute requests based on the data present in the network and transport layer protocols such as IP, TCP, FTP, and UDP. Layer-7 load balancers are found in application-layer protocols such as HTTP. These two types of load balancers receive all the requests and distribute them to a specific server according to the configured algorithm. Module 07 Page 995 Certified Cybersecurity Technician Copyright © by EC-Council Certified Cybersecurity Technician Exam 212-82 Network Security Controls — Technical Controls :cunnu:-unns ',n---":u-nua EERE ssssssssansd sessssnned geveressressressssssrsnsrssnnrenn Gecsscsssssnas : : : \\l :........... -......... :: m! - - - External Firewall Load Internal Firewall :: Balancer :H. :.. sesesresnnssnsrssnssnsnsinnrennnd: Figure 7.134: Working of a load balancer Module 07 Page 996 Certified Cybersecurity Technician Copyright © by EC-Council Certified Cybersecurity Technician Exam 212-82 Network Security Controls — Technical Controls Types of Load Balancing Algorithms Cl £l °o Session Least Affinity Connections Random Round-robin The load e ey (rer The algorithm balancer chooses the The round- server with the The load to forward all robin algorithm balancer selects the client’s distributes two servers requests in that incoming incoming WA by randomly and session to the requests sending a sends requests same sequentially request to the to the one application according to server chosen by server the weights applying the assigned to the least- servers connections algorithm Copyright ©© by AAll l Rights Rights Reserved. Reproduction production isis Strictly Prohibited. Types of Load Balancing Algorithms The choice of the load balancing algorithm depends on the requirements of the organization. Session Affinity Session affinity ensures that all user requests in a session are forwarded to the same application server. Some applications require session affinity between the client and server to provide services correctly. Session affinity uses in-memory caching to track session cookies in the request and response headers. The algorithm tracks this session cookie to forward all the client’s requests in that session to the same application server. Round-robin The round-robin algorithm is a simple load balancing algorithm that distributes incoming requests to a group of servers sequentially. In this algorithm, the initial request is sent to the first server, the next request to the second server, and so on until the final request. The same steps are repeated for the next process. This algorithm can also be weighted in such a manner that the most powerful units receive requests first and handle more requests than other units. In most cases, round-robin load balancers presume that all servers are the same, are currently online, and hold the same load with the same storage and capacity. Therefore, round-robin load balancers do not distribute the traffic effectively or accurately. Module 07 Page 997 EG-Council Certified Cybersecurity Technician Copyright © by EC-Council Certified Cybersecurity Technician Exam 212-82 Network Security Controls — Technical Controls User1 !-! v't. User 2 ! Server1 THIEA S e, 5 1 N m : | User 3 E.. O "o, A \ I od = T.... :\ 7”7 B=H verened> g " — Greoronranansnnaannaneens sesses = User 4 @E -..-""“ sl ,o.-"v gc 6 ""‘n-...-u.n---) 80."‘..'0" Load Balancer --------..--'"' User 5 :. e ooogj & ----- Server 2 User 6 Figure 7.136: Weighted round-robin algorithm Module 07 Page 998 Certified Cybersecurity Technician Copyright © by EC-Council Certified Cybersecurity Technician Exam 212-82 Network Security Controls — Technical Controls = Least Connections The least connections algorithm is a load balancing algorithm that chooses the server with the least number of active connections by sending a request to the server. The computing capacity of the servers is decided based on the number of current active connections. User 2 ! - Server1.....