A Novel TCP/IP Header Hijacking Attack on SDN

被引:3
作者
Mohammadi, Ali Akbar [1 ]
Hussain, Rasheed [2 ]
Oracevic, Alma [2 ]
Kazmi, Syed Muhammad Ahsan Raza [3 ]
Hussain, Fatima
Aloqaily, Moayad [4 ]
Son, Junggab [5 ]
机构
[1] Innopolis Univ, Innopolis, Russia
[2] Univ Bristol, Bristol, Avon, England
[3] Univ West England, Bristol, Avon, England
[4] Royal Bank Canada, Toronto, ON, Canada
[5] Mohamed Bin Zayed Univ Artificial Intelligence MB, Abu Dhabi, U Arab Emirates
来源
IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS) | 2022年
关键词
SDN; Middlebox security; TCP/IP hijacking;
D O I
10.1109/INFOCOMWKSHPS54753.2022.9798234
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Middlebox is primarily used in Software-Defined Network (SDN) to enhance operational performance, policy compliance, and security operations. Therefore, security of the middlebox itself is essential because incorrect use of the middlebox can cause severe cybersecurity problems for SDN. Existing attacks against middleboxes in SDN (for instance, middlebox-bypass attack) use methods such as cloned tags from the previous packets to justify that the middlebox has processed the injected packet. Flowcloak as the latest solution to defeat such an attack creates a defence using a tag by computing the hash of certain parts of the packet header. However, the security mechanisms proposed to mitigate these attacks are compromise-able since all parts of the packet header can be imitated, leaving the middleboxes insecure. To demonstrate our claim, we introduce a novel attack against SDN middleboxes by hijacking TCP/IP headers. The attack uses crafted TCP/IP headers to receive the tags and signatures and successfully bypasses the middleboxes.
引用
收藏
页数:2
相关论文
共 5 条
[1]  
Bu K, 2018, IEEE INFOCOM SER, P396, DOI 10.1109/INFOCOM.2018.8486230
[2]   Security in SDN: A comprehensive survey [J].
Correa Chica, Juan Camilo ;
Cuatindioy Imbachi, Jenny ;
Botero Vega, Juan Felipe .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 159
[3]  
Fayazbakhsh Seyed Kaveh, 2014, Proceedings of NSDI '14: 11th USENIX Symposium on Networked Systems Design and Implementation. NSDI '14, P533
[4]   Effective Topology Tampering Attacks and Defenses in Software-Defined Networks [J].
Skowyra, Richard ;
Xu, Lei ;
Gu, Guofei ;
Dedhia, Veer ;
Hobson, Thomas ;
Okhravi, Hamed ;
Landry, James .
2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2018, :374-385
[5]  
Thang N. C., 2019, 29 ITNAC C, P1