Preventing Timing Side-Channel Attacks in Software-Defined Networks

被引:4
|
作者
Shoaib, Faizan [1 ]
Chow, Yang-Wai [1 ]
Vlahu-Gjorgievska, Elena [1 ]
机构
[1] Univ Wollongong, Sch Comp & IT, Wollongong, NSW, Australia
关键词
Software-defined network; timing side-channel; information hiding; DEFENSES;
D O I
10.1109/CSDE53843.2021.9718377
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Software-defined networking (SDN) is a technology for programming and efficiently managing networks. SDNs are prone to numerous threats, such as Distributed Denial of Service (DDoS), Man-in-the-middle, ARP Spoofing, Side-channels, and several other attacks. Separation of the data plane from the control plane makes SDN vulnerable to timing side-channel attacks. By comparing the response time of probe queries, an adversary can infer a pattern of request, which can invoke the controller and eventually discover information about the network. An adversary can apply these attacks to extract flow tables, routes, controller type, ports, etc. In this paper, we propose a novel security solution 'Netkasi' (kasi means `hide' in Esperanto), to counter timing side-channel attacks in SDN. This solution hides the original response time information from the attacker and provides random response timing. As this security solution is designed to integrate with SDN, its architecture ensures minimal impact on the network traffic and consumption of network resources. The current solutions are a massive overhead on the network, whereas `Netkasi' is implemented as a peripheral solution having its resources without causing significant overhead on the traffic. Analysis of the overall design shows that our solution is effective for the prevention of timing side-channel attacks in SDN.
引用
收藏
页数:6
相关论文
共 50 条
  • [11] Entropy-Shield:Side-Channel Entropy Maximization for Timing-based Side-Channel Attacks
    Dhavlle, Abhijitt
    Mehta, Raj
    Rafatirad, Setareh
    Homayoun, Houman
    Dinakarrao, Sai Manoj Pudukotai
    [J]. PROCEEDINGS OF THE TWENTYFIRST INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2020), 2020, : 161 - 166
  • [12] I DPID It My Way! A Covert Timing Channel in Software-Defined Networks
    Kroesche, Robert
    Thimmaraju, Kashyap
    Schiff, Liron
    Schmid, Stefan
    [J]. 2018 IFIP NETWORKING CONFERENCE (IFIP NETWORKING) AND WORKSHOPS, 2018, : 217 - 225
  • [13] Preventing and Detecting Cache Side-Channel Attacks in Cloud Computing
    Younis, Younis A.
    Kifayat, Kashif
    Hussain, Abir
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [14] Detecting Link Fabrication Attacks in Software-Defined Networks
    Smyth, Dylan
    McSweeney, Sean
    O'Shea, Donna
    Cionca, Victor
    [J]. 2017 26TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN 2017), 2017,
  • [15] Identifier Binding Attacks and Defenses in Software-Defined Networks
    Jero, Samuel
    Koch, William
    Skowyra, Richard
    Okhravi, Hamed
    Nita-Rotaru, Cristina
    Bigelow, David
    [J]. PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), 2017, : 415 - 432
  • [16] SPHINX: Detecting Security Attacks in Software-Defined Networks
    Dhawan, Mohan
    Poddar, Rishabh
    Mahajan, Kshiteej
    Mann, Vijay
    [J]. 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [17] GPU Acceleration of RSA is Vulnerable to Side-channel Timing Attacks
    Luo, Chao
    Fei, Yunsi
    Kaeli, David
    [J]. 2018 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD) DIGEST OF TECHNICAL PAPERS, 2018,
  • [18] Exploring Timing Side-channel Attacks on Path-ORAMs
    Bao, Chongxi
    Srivastava, Ankur
    [J]. 2017 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2017, : 68 - 73
  • [19] The investigation of neural networks performance in side-channel attacks
    Yinan Kong
    Ehsan Saeedi
    [J]. Artificial Intelligence Review, 2019, 52 : 607 - 623
  • [20] TinyPower: Side-Channel Attacks with Tiny Neural Networks
    Li, Haipeng
    Ninan, Mabon
    Wang, Boyang
    Emmert, John M.
    [J]. 2024 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST, HOST, 2024, : 320 - 331