SECAP Switch-Defeating Topology Poisoning Attacks Using P4 Data Planes

被引:6
|
作者
Smyth, Dylan [1 ]
Scott-Hayward, Sandra [2 ]
Cionca, Victor [1 ]
McSweeney, Sean [1 ]
O'Shea, Donna [1 ]
机构
[1] Munster Technol Univ, Dept Comp Sci, Cork, Ireland
[2] Queens Univ Belfast, Ctr Secure Informat Technol, Belfast, North Ireland
关键词
Software-defined networking; Programmable data planes; p4; Security; Topology poisoning;
D O I
10.1007/s10922-022-09714-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Programmable networking is evolving from programmable control plane solutions such as OpenFlow-based software-defined networking (SDN) to programmable data planes such as P4-based SDN. To support the functionality of the SDN, the correct view of the network topology is required. However, multiple attacks aimed at topology poisoning have been demonstrated in SDNs. While several controller-centralised security solutions have been proposed to defeat topology poisoning attacks, some attacks e.g., the Data Plane ARP Cache Poisoning Attack and the relay-type Link Fabrication Attack are difficult to detect using a fully centralised security solution. In this paper, we present the Security-Aware Programmable (SECAP) Switch-a lightweight, in-network, P4-based security solution that is designed to prevent attacks that might otherwise evade control plane solutions. The SECAP switch verifies source address details contained within the headers of protocols commonly used to perform topology poisoning attacks. This function is supported by a novel variance-based anomaly detection solution to provide a layered defence. We demonstrate the ability of the SECAP switch to defeat topology poisoning attacks with minimal memory and processing overhead.
引用
收藏
页数:32
相关论文
共 31 条
  • [31] INT-SDN: Evaluation of various P4 parameters using optical telemetry having reconfigurable data plane on 40 Gbps line rate
    Singh, Harminder
    Huang, Changcheng
    Sicard-Gagne, Mathieu
    Shami, Gauravdeep
    Lyonnais, Marc
    Fedorov, Dmitri
    Wilson, Rodney
    2019 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING (PACRIM), 2019,