Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures

被引:163
作者
Hong, Sungmin [1 ]
Xu, Lei [1 ]
Wang, Haopei [1 ]
Gu, Guofei [1 ]
机构
[1] Texas A&M Univ, SUCCESS Lab, College Stn, TX 77843 USA
来源
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015) | 2015年
关键词
D O I
10.14722/ndss.2015.23283
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software-Defined Networking (SDN) is a new networking paradigm that grants a controller and its applications an omnipotent power to have holistic network visibility and flexible network programmability, thus enabling new innovations in network protocols and applications. One of the core advantages of SDN is its logically centralized control plane to provide the entire network visibility, on which many SDN applications rely. For the first time in the literature, we propose new attack vectors unique to SDN that seriously challenge this foundation. Our new attacks are somewhat similar in spirit to spoofing attacks in legacy networks (e.g., ARP poisoning attack), however with significant differences in exploiting unique vulnerabilities how current SDN operates differently from legacy networks. The successful attacks can effectively poison the network topology information, a fundamental building block for core SDN components and topology-aware SDN applications. With the poisoned network visibility, the upper-layer OpenFlow controller services/apps may be totally misled, leading to serious hijacking, denial of service or man-in-the-middle attacks. According to our study, all current major SDN controllers we find in the market (e.g., Floodlight, OpenDaylight, Beacon, and POX) are affected, i.e., they are subject to the Network Topology Poisoning Attacks. We then investigate the mitigation methods against the Network Topology Poisoning Attacks and present TopoGuard, a new security extension to SDN controllers, which provides automatic and real-time detection of Network Topology Poisoning Attacks. Our evaluation on a prototype implementation of TopoGuard in the Floodlight controller shows that the defense solution can effectively secure network topology while introducing only a minor impact on normal operations of OpenFlow controllers.
引用
收藏
页数:15
相关论文
共 24 条
[1]  
[Anonymous], 2013, P 10 USENIX S NETW S
[2]  
[Anonymous], 2010, P USENIX S OP SYST D
[3]  
[Anonymous], 2013, NDSS
[4]  
Benton K., 2013, P ACM SIGCOMM WORKSH
[5]  
Dobrescu M., 2014, P 11 USENIX S NETW S P 11 USENIX S NETW S
[6]  
Gonikman D., 2012, P 19 ANN NETW DISTR P 19 ANN NETW DISTR
[7]   NOX: Towards an operating system for networks [J].
Gude, Natasha ;
Koponen, Teemu ;
Pettit, Justin ;
Pfaff, Ben ;
Casado, Martin ;
McKeown, Nick ;
Shenker, Scott .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2008, 38 (03) :105-110
[8]  
Guha A., 2013, P ACM C PROGR LANG D
[9]  
Heller B., 2010, P 7 USENIX S NETW SY P 7 USENIX S NETW SY
[10]  
Jafarian J. H., P ACM SIGCOMM WORKSH