Securing the Software-Defined Network Control Layer

被引:59
作者
Porras, Phillip [1 ]
Cheung, Steven [1 ]
Fong, Martin [1 ]
Skinner, Keith [1 ]
Yegneswaran, Vinod [1 ]
机构
[1] SRI Int, Comp Sci Lab, Menlo Pk, CA 94025 USA
来源
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015) | 2015年
关键词
VERIFICATION;
D O I
10.14722/ndss.2015.23222
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software-defined networks (SDNs) pose both an opportunity and challenge to the network security community. The opportunity lies in the ability of SDN applications to express intelligent and agile threat mitigation logic against hostile flows, without the need for specialized inline hardware. However, the SDN community lacks a secure control-layer to manage the interactions between the application layer and the switch infrastructure (the data plane). There are no available SDN controllers that provide the key security features, trust models, and policy mediation logic, necessary to deploy multiple SDN applications into a highly sensitive computing environment. We propose the design of security extensions at the control layer to provide the security management and arbitration of conflicting flow rules that arise when multiple applications are deployed within the same network. We present a prototype of our design as a Security Enhanced version of the widely used OpenFlow Floodlight Controller, which we call SE-Floodlight. SE-Floodlight extends Floodlight with a security-enforcement kernel (SEK) layer, whose functions are also directly applicable to other OpenFlow controllers. The SEK adds a unique set of secure application management features, including an authentication service, role-based authorization, a permission model for mediating all configuration change requests to the data-plane, inline flow-rule conflict resolution, and a security audit service. We demonstrate the robustness and scalability of our system implementation through both a comprehensive functionality assessment and a performance evaluation that illustrates its sub-linear scaling properties.
引用
收藏
页数:15
相关论文
共 41 条
[1]  
Al-Shaer E., 2010, P 3 ACM SAFECONFIG W
[2]   Network Configuration in A Box: Towards End-to-End Verification of Network Reachability and Security [J].
Al-Shaer, Ehab ;
Marrero, Will ;
El-Atawy, Adel ;
ElBadawi, Khalid .
2009 17TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP 2009), 2009, :123-+
[3]  
[Anonymous], 2013, PROC ACM SIGCOMM WOR
[4]  
[Anonymous], 2007, P 16 USENIX SEC S US
[5]  
[Anonymous], BEACON
[6]  
[Anonymous], 2013, NDSS
[7]  
Anwer B, 2013, P 2 ACM SIGCOMM WORK
[8]  
Cai Z., 2010, Tech. Rep.
[9]  
Canini M., 2012, P S NETW SYST DES IM P S NETW SYST DES IM
[10]  
Casado M, 2006, USENIX ASSOCIATION PROCEEDINGS OF THE 15TH USENIX SECURITY SYMPOSIUM, P137