Misreporting Attacks in Software-Defined Networking

被引:2
|
作者
Burke, Quinn [1 ]
McDaniel, Patrick [1 ]
La Porta, Thomas [1 ]
Yu, Mingli [1 ]
He, Ting [1 ]
机构
[1] Penn State Univ, State Coll, PA 16801 USA
基金
美国国家科学基金会;
关键词
Network security; SDN; Load balancing;
D O I
10.1007/978-3-030-63086-7_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Load balancers enable efficient use of network resources by distributing traffic fairly across them. In software-defined networking (SDN), load balancing is most often realized by a controller application that solicits traffic load reports from network switches and enforces load balancing decisions through flow rules. This separation between the control and data planes in SDNs creates an opportunity for an adversary at a compromised switch to misreport traffic loads to influence load balancing. In this paper, we evaluate the ability of such an adversary to control the volume of traffic flowing through a compromised switch by misreporting traffic loads. We use a queuing theoretic approach to model the attack and develop algorithms for misreporting that allow an adversary to tune attack parameters toward specific adversarial goals. We validate the algorithms with a virtual network testbed, finding that through misreporting the adversary can draw nearly all of the load in the subnetwork (+750%, or 85% of the load in the system), or an adversary-desired amount of load (a target load, e.g., +200%) to within 12% error of that target. This is yet another example of how depending on untrustworthy reporting in making control decisions can lead to fundamental security failures.
引用
收藏
页码:276 / 296
页数:21
相关论文
共 50 条
  • [1] Misreporting Attacks Against Load Balancers in Software-Defined Networking
    Burke, Quinn
    McDaniel, Patrick
    La Porta, Thomas
    Yu, Mingli
    He, Ting
    MOBILE NETWORKS & APPLICATIONS, 2023, 28 (04): : 1482 - 1497
  • [2] Causal Analysis for Software-Defined Networking Attacks
    Ujcich, Benjamin E.
    Jero, Samuel
    Skowyra, Richard
    Bates, Adam
    Sanders, William H.
    Okhravi, Hamed
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 3183 - 3200
  • [3] Addressing Spoofed DDoS Attacks in Software-defined Networking
    Swami, Rochak
    Dave, Mayank
    Ranga, Virender
    2021 6TH INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2021,
  • [4] Analysis of Topology Poisoning Attacks in Software-Defined Networking
    Bui, Thanh
    Antikainen, Markku
    Aura, Tuomas
    SECURE IT SYSTEMS, NORDSEC 2019, 2019, 11875 : 87 - 102
  • [5] Software-Defined Networking
    Kirkpatrick, Keith
    COMMUNICATIONS OF THE ACM, 2013, 56 (09) : 16 - 19
  • [6] Software-defined networking
    Greene, Kate
    Technology Review, 2009, 112 (02)
  • [7] Software-Defined Networking
    Zhili Sun
    Jiandong Li
    Kun Yang
    ZTE Communications, 2014, 12 (02) : 1 - 2
  • [8] A Survey on Software-Defined Networking
    Xia, Wenfeng
    Wen, Yonggang
    Foh, Chuan Heng
    Niyato, Dusit
    Xie, Haiyong
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (01): : 27 - 51
  • [9] FlowCloak: Defeating Middlebox-Bypass Attacks in Software-Defined Networking
    Bu, Kai
    Yang, Yutian
    Guo, Zixuan
    Yang, Yuanyuan
    Li, Xing
    Zhang, Shigeng
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018), 2018, : 396 - 404
  • [10] Software-Defined Networking: A survey
    Farhady, Hamid
    Lee, HyunYong
    Nakao, Akihiro
    COMPUTER NETWORKS, 2015, 81 : 79 - 95