Preventing Timing Side-Channel Attacks in Software-Defined Networks

被引:4
|
作者
Shoaib, Faizan [1 ]
Chow, Yang-Wai [1 ]
Vlahu-Gjorgievska, Elena [1 ]
机构
[1] Univ Wollongong, Sch Comp & IT, Wollongong, NSW, Australia
关键词
Software-defined network; timing side-channel; information hiding; DEFENSES;
D O I
10.1109/CSDE53843.2021.9718377
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Software-defined networking (SDN) is a technology for programming and efficiently managing networks. SDNs are prone to numerous threats, such as Distributed Denial of Service (DDoS), Man-in-the-middle, ARP Spoofing, Side-channels, and several other attacks. Separation of the data plane from the control plane makes SDN vulnerable to timing side-channel attacks. By comparing the response time of probe queries, an adversary can infer a pattern of request, which can invoke the controller and eventually discover information about the network. An adversary can apply these attacks to extract flow tables, routes, controller type, ports, etc. In this paper, we propose a novel security solution 'Netkasi' (kasi means `hide' in Esperanto), to counter timing side-channel attacks in SDN. This solution hides the original response time information from the attacker and provides random response timing. As this security solution is designed to integrate with SDN, its architecture ensures minimal impact on the network traffic and consumption of network resources. The current solutions are a massive overhead on the network, whereas `Netkasi' is implemented as a peripheral solution having its resources without causing significant overhead on the traffic. Analysis of the overall design shows that our solution is effective for the prevention of timing side-channel attacks in SDN.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Mitigating Timing Side-Channel Attacks in Software-Defined Networks: Detection and Response
    Shoaib, Faizan
    Chow, Yang-Wai
    Vlahu-Gjorgievska, Elena
    Nguyen, Chau
    [J]. TELECOM, 2023, 4 (04): : 877 - 900
  • [2] Side-Channel Attacks on Cryptographic Software
    Lawson, Nate
    [J]. IEEE SECURITY & PRIVACY, 2009, 7 (06) : 65 - 68
  • [3] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    [J]. 39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
  • [4] KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks
    Schwarz, Michael
    Lipp, Moritz
    Gruss, Daniel
    Weiser, Samuel
    Maurice, Clementine
    Spreitzer, Raphael
    Mangard, Stefan
    [J]. 25TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2018), 2018,
  • [5] Detecting Saturation Attacks in Software-Defined Networks
    Li, Zhiyuan
    Xing, Weijia
    Xu, Dianxiang
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2018, : 163 - 168
  • [6] Practical Timing Side-Channel Attacks on Memory Compression
    Schwarzl, Martin
    Borrello, Pietro
    Saileshwar, Gururaj
    Mueller, Hanna
    Schwarz, Michael
    Gruss, Daniel
    [J]. 2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 1186 - 1203
  • [7] Timing Side-channel Attacks and Countermeasures in CPU Microarchitectures
    Zhang, Jiliang
    Chen, Congcong
    Cui, Jinhua
    Li, Keqin
    [J]. ACM COMPUTING SURVEYS, 2024, 56 (07)
  • [8] Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software
    Wichelmann, Jan
    Paetschke, Anna
    Wilke, Luca
    Eisenbarth, Thomas
    [J]. PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 6789 - 6806
  • [9] Design of a Set of Software Tools for Side-Channel Attacks
    Fuentes, A.
    Hernandez, L.
    Martin, A.
    Alarcos, B.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2015, 13 (06) : 1966 - 1978
  • [10] Shielding Software From Privileged Side-Channel Attacks
    Dong, Xiaowan
    Shen, Zhuojia
    Criswell, John
    Cox, Alan L.
    Dwarkadas, Sandhya
    [J]. PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 1441 - 1458