Misreporting Attacks in Software-Defined Networking

被引:2
|
作者
Burke, Quinn [1 ]
McDaniel, Patrick [1 ]
La Porta, Thomas [1 ]
Yu, Mingli [1 ]
He, Ting [1 ]
机构
[1] Penn State Univ, State Coll, PA 16801 USA
来源
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (SECURECOMM 2020), PT I | 2020年 / 335卷
基金
美国国家科学基金会;
关键词
Network security; SDN; Load balancing;
D O I
10.1007/978-3-030-63086-7_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Load balancers enable efficient use of network resources by distributing traffic fairly across them. In software-defined networking (SDN), load balancing is most often realized by a controller application that solicits traffic load reports from network switches and enforces load balancing decisions through flow rules. This separation between the control and data planes in SDNs creates an opportunity for an adversary at a compromised switch to misreport traffic loads to influence load balancing. In this paper, we evaluate the ability of such an adversary to control the volume of traffic flowing through a compromised switch by misreporting traffic loads. We use a queuing theoretic approach to model the attack and develop algorithms for misreporting that allow an adversary to tune attack parameters toward specific adversarial goals. We validate the algorithms with a virtual network testbed, finding that through misreporting the adversary can draw nearly all of the load in the subnetwork (+750%, or 85% of the load in the system), or an adversary-desired amount of load (a target load, e.g., +200%) to within 12% error of that target. This is yet another example of how depending on untrustworthy reporting in making control decisions can lead to fundamental security failures.
引用
收藏
页码:276 / 296
页数:21
相关论文
共 50 条
  • [1] Misreporting Attacks Against Load Balancers in Software-Defined Networking
    Burke, Quinn
    McDaniel, Patrick
    La Porta, Thomas
    Yu, Mingli
    He, Ting
    MOBILE NETWORKS & APPLICATIONS, 2023, 28 (04) : 1482 - 1497
  • [2] Addressing Spoofed DDoS Attacks in Software-defined Networking
    Swami, Rochak
    Dave, Mayank
    Ranga, Virender
    2021 6TH INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2021,
  • [3] Layer-Based Attacks in the Ternary Planes of Software-Defined Networking
    Bhardwaj, Shanu
    Panda, S. N.
    Datta, Priyanka
    PROCEEDINGS OF 2020 6TH IEEE INTERNATIONAL WOMEN IN ENGINEERING (WIE) CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (WIECON-ECE 2020), 2020, : 300 - 303
  • [4] A Survey on Software-Defined Networking
    Xia, Wenfeng
    Wen, Yonggang
    Foh, Chuan Heng
    Niyato, Dusit
    Xie, Haiyong
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (01): : 27 - 51
  • [5] LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking
    Ambrosin, Moreno
    Conti, Mauro
    De Gaspari, Fabio
    Poovendran, Radha
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2017, 25 (02) : 1206 - 1219
  • [6] Detection and Mitigation of DDoS Attacks Using Conditional Entropy in Software-defined Networking
    Xuanyuan, Ming
    Ramsurrun, Visham
    Seeam, Amar
    2019 11TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC 2019), 2019, : 66 - 71
  • [7] SDSNM: A Software-Defined Security Networking Mechanism to Defend against DDoS Attacks
    Wang, Xiulei
    Chen, Ming
    Xing, Changyou
    2015 NINTH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY FCST 2015, 2015, : 115 - 121
  • [8] Verification Framework for Software-Defined Networking
    Kang, Miyoung
    Cho, Jong Jin
    2022 24TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ARITIFLCIAL INTELLIGENCE TECHNOLOGIES TOWARD CYBERSECURITY, 2022, : 518 - 523
  • [9] Software-Defined Networking: On the Verge of a Breakthrough?
    Ortiz, Sixto, Jr.
    COMPUTER, 2013, 46 (07) : 10 - 12
  • [10] Review on Detection Techniques against DDoS Attacks on a Software-Defined Networking Controller
    Zubaydi, Haider Dhia
    Anbar, Mohammed
    Wey, Chong Yung
    2017 PALESTINIAN INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (PICICT), 2017, : 10 - 16