Misreporting Attacks in Software-Defined Networking

被引:2
作者
Burke, Quinn [1 ]
McDaniel, Patrick [1 ]
La Porta, Thomas [1 ]
Yu, Mingli [1 ]
He, Ting [1 ]
机构
[1] Penn State Univ, State Coll, PA 16801 USA
来源
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (SECURECOMM 2020), PT I | 2020年 / 335卷
基金
美国国家科学基金会;
关键词
Network security; SDN; Load balancing;
D O I
10.1007/978-3-030-63086-7_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Load balancers enable efficient use of network resources by distributing traffic fairly across them. In software-defined networking (SDN), load balancing is most often realized by a controller application that solicits traffic load reports from network switches and enforces load balancing decisions through flow rules. This separation between the control and data planes in SDNs creates an opportunity for an adversary at a compromised switch to misreport traffic loads to influence load balancing. In this paper, we evaluate the ability of such an adversary to control the volume of traffic flowing through a compromised switch by misreporting traffic loads. We use a queuing theoretic approach to model the attack and develop algorithms for misreporting that allow an adversary to tune attack parameters toward specific adversarial goals. We validate the algorithms with a virtual network testbed, finding that through misreporting the adversary can draw nearly all of the load in the subnetwork (+750%, or 85% of the load in the system), or an adversary-desired amount of load (a target load, e.g., +200%) to within 12% error of that target. This is yet another example of how depending on untrustworthy reporting in making control decisions can lead to fundamental security failures.
引用
收藏
页码:276 / 296
页数:21
相关论文
共 27 条
[1]  
[Anonymous], 2015, OpenFlow Switch Specification
[2]  
Arbettu RK, 2016, 2016 17TH INTERNATIONAL TELECOMMUNICATIONS NETWORK STRATEGY AND PLANNING SYMPOSIUM (NETWORKS), P37, DOI 10.1109/NETWKS.2016.7751150
[3]  
Aslam S, 2015, 2015 NATIONAL SOFTWARE ENGINEERING CONFERENCE (NSEC), P30, DOI 10.1109/NSEC.2015.7396341
[4]   On the Impact of Network State Collection on the Performance of SDN Applications [J].
Aslan, Mohamed ;
Matrawy, Ashraf .
IEEE COMMUNICATIONS LETTERS, 2016, 20 (01) :5-8
[5]  
Aweya J., 2002, International Journal of Network Management, V12, P3, DOI 10.1002/nem.421
[6]  
Benson T., 2010, Proceedings of the 10th annual conference on Internet measurement - IMC '10, P267, DOI [DOI 10.1145/1879141.1879175, 10.1145/1879141.1879175]
[7]  
Benson T, 2009, WREN 2009, P65
[8]  
Dabbous W, 2011, Em: Proceedings of the Seventh COnference on emerging Networking EXperiments and Technologies, P25, DOI [10.1145/2079296.2079321, DOI 10.1145/2079296.2079321]
[9]   SPHINX: Detecting Security Attacks in Software-Defined Networks [J].
Dhawan, Mohan ;
Poddar, Rishabh ;
Mahajan, Kshiteej ;
Mann, Vijay .
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
[10]   SDN-Guard: DoS Attacks Mitigation in SDN Networks [J].
Dridi, Lobna ;
Zhani, Mohamed Faten .
2016 5TH IEEE INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (IEEE CLOUDNET), 2016, :212-217