(Self) Driving Under the Influence: Intoxicating Adversarial Network Inputs

被引:3
|
作者
Meier, Roland [1 ]
Holterbach, Thomas [1 ]
Keck, Stephan [1 ]
Stahli, Matthias [1 ]
Lenders, Vincent [2 ]
Singla, Ankit [1 ]
Vanbever, Laurent [1 ]
机构
[1] Swiss Fed Inst Technol, Zurich, Switzerland
[2] Armasuisse, Bern, Switzerland
关键词
D O I
10.1145/3365609.3365850
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional network control planes can be slow and require manual tinkering from operators to change their behavior. There is thus great interest in a faster, data-driven approach that uses signals from real-time traffic instead. However, the promise of fast and automatic reaction to data comes with new risks: malicious inputs designed towards negative outcomes for the network, service providers, users, and operators. Adversarial inputs are a well-recognized problem in other areas; we show that networking applications are susceptible to them too. We characterize the attack surface of datadriven networks and examine how attackers with different privileges-from infected hosts to operator-level access-may target network infrastructure, applications, and protocols. To illustrate the problem, we present case studies with concrete attacks on recently proposed data-driven systems. Our analysis urgently calls for a careful study of attacks and defenses in data-driven networking, with a view towards ensuring that their promise is not marred by oversights in robust design.
引用
收藏
页码:34 / 42
页数:9
相关论文
共 50 条