Security of Topology Discovery Service in SDN: Vulnerabilities and Countermeasures

被引:3
作者
Soltani, Sanaz [1 ]
Amanlou, Ali [1 ]
Shojafar, Mohammad [1 ]
Tafazolli, Rahim [1 ]
机构
[1] Univ Surrey, Inst Commun Syst, 5G 6GIC, Guildford GU2 7XH, Surrey, England
来源
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY | 2024年 / 5卷
关键词
Software-defined network; SDN security; topology discovery service; topology poisoning attack; SOFTWARE-DEFINED NETWORKING; LINK DISCOVERY; PROTOCOL; ISSUES; ATTACK; 5G;
D O I
10.1109/OJCOMS.2024.3406489
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Software-Defined Network (SDN) controller needs comprehensive visibility of the whole network to provide effective routing and forwarding decisions in the data layer. However, the topology discovery service in the SDN controller is vulnerable to the Topology Poisoning Attack (TPA), which targets corrupting the controller's view on the connected devices (e.g., switches or hosts) to the network and inter-switch link connections. The attack could cause dramatic impacts on the network's forwarding policy by changing the traffic path and even opening doors for Man-in-the-Middle (MitM) and Denial of Service (DoS) attacks. Recent studies presented sophisticated types of TPA, which could successfully bypass several well-known defence mechanisms for SDN. However, the scientific literature lacks a comprehensive review and survey of existing TPAs against topology discovery services and corresponding defence mechanisms. This paper provides a thorough survey to review and analyse existing threats against topology discovery services and a security assessment of the current countermeasures. For this aim, first, we propose a taxonomy for TPAs and categorise the attacks based on different parameters, including the attack aim, exploited vulnerability, location of the adversary, and communication channel. In addition, we provide a detailed root cause analysis per attack. Second, we perform a security assessment on the state-of-the-art security measurements that mitigate the risk of TPAs in SDN and discuss the advantages and disadvantages of each defence concerning the detection capability. Finally, we figure out several open security issues and outline possible future research directions to motivate security research on SDN. The rapid growth of the SDN market and the evolution of mobile networks, including components like the RAN Intelligent Controller (RIC) acting like SDN controller, highlight the critical need for SDN security in the future.
引用
收藏
页码:3410 / 3450
页数:41
相关论文
共 95 条
[1]   Toward Next Generation Open Radio Access Networks: What O-RAN Can and Cannot Do! [J].
Abdalla, Aly S. S. ;
Upadhyaya, Pratheek S. S. ;
Shah, Vijay K. K. ;
Marojevic, Vuk .
IEEE NETWORK, 2022, 36 (06) :206-213
[2]   Comparative Analysis of Control Plane Security of SDN and Conventional Networks [J].
Abdou, AbdelRahman ;
van Oorschot, Paul C. ;
Wan, Tao .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04) :3542-3559
[3]  
Abdulkarem HS, 2020, 2020 IEEE 2ND GLOBAL POWER, ENERGY AND COMMUNICATION CONFERENCE (IEEE GPECOM2020), P322, DOI [10.1109/gpecom49333.2020.9247850, 10.1109/GPECOM49333.2020.9247850]
[4]  
Abley J., 2005, IPv4 Multihoming practices and limitations
[5]  
Aday L.Ochoa., 2015, Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks"
[6]   Security in Software Defined Networks: A Survey [J].
Ahmad, Ijaz ;
Namal, Suneth ;
Ylianttila, Mika ;
Gurtov, Andrei .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2317-2346
[7]   Scalability, Consistency, Reliability and Security in SDN Controllers: A Survey of Diverse SDN Controllers [J].
Ahmad, Suhail ;
Mir, Ajaz Hussain .
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2021, 29 (01)
[8]   A Comprehensive Survey: Benefits, Services, Recent Works, Challenges, Security, and Use Cases for SDN-VANET [J].
Al-Heety, Othman S. ;
Zakaria, Zahriladha ;
Ismail, Mahamod ;
Shakir, Mohammed Mudhafar ;
Alani, Sameer ;
Alsariera, Hussein .
IEEE ACCESS, 2020, 8 :91028-91047
[9]  
Al-Shabibi A., 2014, OPEN NETW SUMMIT
[10]  
Alharbi T, 2015, C LOCAL COMPUT NETW, P502, DOI 10.1109/LCN.2015.7366363