Demo: Adversarial network forensics in software defined networking

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The essential part of an SDN-based network are flow rules that enable network elements to steer and control the traffic and deploy policy enforcement points with a fine granularity at any entry-point in a network. Such applications, implemented with the usage of OpenFlow rules, are already integral components of widely used SDN controllers such as Floodlight or OpenDayLight. The implementation details of network policies are reflected in the composition of flow rules and leakage of such information provides adversaries with a significant attack advantage such as bypassing Access Control Lists (ACL), reconstructing the resource distribution of Load Balancers or revealing of Moving Target Defense techniques. In this demo [4, 5] we present our open-source scanner SDNMap and demonstrate the findings discussed in the paper "Adversarial Network Forensics in Software Defined Networking" [6]. On two real world examples, Floodlight's Access Control Lists (ACL) and Floodlight's Load Balancer (LBaaS), we show that severe security issues arise with the ability to reconstruct the details of OpenFlow rules on the data-plane.

Original languageEnglish (US)
Title of host publicationSOSR 2017 - Proceedings of the 2017 Symposium on SDN Research
PublisherAssociation for Computing Machinery, Inc
Pages177-178
Number of pages2
ISBN (Electronic)9781450349475
DOIs
StatePublished - Apr 3 2017
Event2017 Symposium on SDN Research, SOSR 2017 - Santa Clara, United States
Duration: Apr 3 2017Apr 4 2017

Publication series

NameSOSR 2017 - Proceedings of the 2017 Symposium on SDN Research

Other

Other2017 Symposium on SDN Research, SOSR 2017
CountryUnited States
CitySanta Clara
Period4/3/174/4/17

Fingerprint

Access control
Controllers
Chemical analysis
Software defined networking
Digital forensics

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Software

Cite this

Achleitner, S., La Porta, T. F., Jaeger, T. R., & McDaniel, P. D. (2017). Demo: Adversarial network forensics in software defined networking. In SOSR 2017 - Proceedings of the 2017 Symposium on SDN Research (pp. 177-178). (SOSR 2017 - Proceedings of the 2017 Symposium on SDN Research). Association for Computing Machinery, Inc. https://doi.org/10.1145/3050220.3060599
Achleitner, Stefan ; La Porta, Thomas F. ; Jaeger, Trent Ray ; McDaniel, Patrick Drew. / Demo : Adversarial network forensics in software defined networking. SOSR 2017 - Proceedings of the 2017 Symposium on SDN Research. Association for Computing Machinery, Inc, 2017. pp. 177-178 (SOSR 2017 - Proceedings of the 2017 Symposium on SDN Research).
@inproceedings{6cca7e2f4aa24b17a2da03485a0a0255,
title = "Demo: Adversarial network forensics in software defined networking",
abstract = "The essential part of an SDN-based network are flow rules that enable network elements to steer and control the traffic and deploy policy enforcement points with a fine granularity at any entry-point in a network. Such applications, implemented with the usage of OpenFlow rules, are already integral components of widely used SDN controllers such as Floodlight or OpenDayLight. The implementation details of network policies are reflected in the composition of flow rules and leakage of such information provides adversaries with a significant attack advantage such as bypassing Access Control Lists (ACL), reconstructing the resource distribution of Load Balancers or revealing of Moving Target Defense techniques. In this demo [4, 5] we present our open-source scanner SDNMap and demonstrate the findings discussed in the paper {"}Adversarial Network Forensics in Software Defined Networking{"} [6]. On two real world examples, Floodlight's Access Control Lists (ACL) and Floodlight's Load Balancer (LBaaS), we show that severe security issues arise with the ability to reconstruct the details of OpenFlow rules on the data-plane.",
author = "Stefan Achleitner and {La Porta}, {Thomas F.} and Jaeger, {Trent Ray} and McDaniel, {Patrick Drew}",
year = "2017",
month = "4",
day = "3",
doi = "10.1145/3050220.3060599",
language = "English (US)",
series = "SOSR 2017 - Proceedings of the 2017 Symposium on SDN Research",
publisher = "Association for Computing Machinery, Inc",
pages = "177--178",
booktitle = "SOSR 2017 - Proceedings of the 2017 Symposium on SDN Research",

}

Achleitner, S, La Porta, TF, Jaeger, TR & McDaniel, PD 2017, Demo: Adversarial network forensics in software defined networking. in SOSR 2017 - Proceedings of the 2017 Symposium on SDN Research. SOSR 2017 - Proceedings of the 2017 Symposium on SDN Research, Association for Computing Machinery, Inc, pp. 177-178, 2017 Symposium on SDN Research, SOSR 2017, Santa Clara, United States, 4/3/17. https://doi.org/10.1145/3050220.3060599

Demo : Adversarial network forensics in software defined networking. / Achleitner, Stefan; La Porta, Thomas F.; Jaeger, Trent Ray; McDaniel, Patrick Drew.

SOSR 2017 - Proceedings of the 2017 Symposium on SDN Research. Association for Computing Machinery, Inc, 2017. p. 177-178 (SOSR 2017 - Proceedings of the 2017 Symposium on SDN Research).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Demo

T2 - Adversarial network forensics in software defined networking

AU - Achleitner, Stefan

AU - La Porta, Thomas F.

AU - Jaeger, Trent Ray

AU - McDaniel, Patrick Drew

PY - 2017/4/3

Y1 - 2017/4/3

N2 - The essential part of an SDN-based network are flow rules that enable network elements to steer and control the traffic and deploy policy enforcement points with a fine granularity at any entry-point in a network. Such applications, implemented with the usage of OpenFlow rules, are already integral components of widely used SDN controllers such as Floodlight or OpenDayLight. The implementation details of network policies are reflected in the composition of flow rules and leakage of such information provides adversaries with a significant attack advantage such as bypassing Access Control Lists (ACL), reconstructing the resource distribution of Load Balancers or revealing of Moving Target Defense techniques. In this demo [4, 5] we present our open-source scanner SDNMap and demonstrate the findings discussed in the paper "Adversarial Network Forensics in Software Defined Networking" [6]. On two real world examples, Floodlight's Access Control Lists (ACL) and Floodlight's Load Balancer (LBaaS), we show that severe security issues arise with the ability to reconstruct the details of OpenFlow rules on the data-plane.

AB - The essential part of an SDN-based network are flow rules that enable network elements to steer and control the traffic and deploy policy enforcement points with a fine granularity at any entry-point in a network. Such applications, implemented with the usage of OpenFlow rules, are already integral components of widely used SDN controllers such as Floodlight or OpenDayLight. The implementation details of network policies are reflected in the composition of flow rules and leakage of such information provides adversaries with a significant attack advantage such as bypassing Access Control Lists (ACL), reconstructing the resource distribution of Load Balancers or revealing of Moving Target Defense techniques. In this demo [4, 5] we present our open-source scanner SDNMap and demonstrate the findings discussed in the paper "Adversarial Network Forensics in Software Defined Networking" [6]. On two real world examples, Floodlight's Access Control Lists (ACL) and Floodlight's Load Balancer (LBaaS), we show that severe security issues arise with the ability to reconstruct the details of OpenFlow rules on the data-plane.

UR - http://www.scopus.com/inward/record.url?scp=85018960648&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85018960648&partnerID=8YFLogxK

U2 - 10.1145/3050220.3060599

DO - 10.1145/3050220.3060599

M3 - Conference contribution

AN - SCOPUS:85018960648

T3 - SOSR 2017 - Proceedings of the 2017 Symposium on SDN Research

SP - 177

EP - 178

BT - SOSR 2017 - Proceedings of the 2017 Symposium on SDN Research

PB - Association for Computing Machinery, Inc

ER -

Achleitner S, La Porta TF, Jaeger TR, McDaniel PD. Demo: Adversarial network forensics in software defined networking. In SOSR 2017 - Proceedings of the 2017 Symposium on SDN Research. Association for Computing Machinery, Inc. 2017. p. 177-178. (SOSR 2017 - Proceedings of the 2017 Symposium on SDN Research). https://doi.org/10.1145/3050220.3060599