Know Your Enemy: Stealth Configuration-Information Gathering in SDN

نویسندگان

  • Mauro Conti
  • Fabio De Gaspari
  • Luigi V. Mancini
چکیده

Software Defined Networking (SDN) is a network architecture that aims at providing high flexibility through the separation of the network logic from the forwarding functions. The industry has already widely adopted SDN and researchers thoroughly analyzed its vulnerabilities, proposing solutions to improve its security. However, we believe important security aspects of SDN are still left uninvestigated. In this paper, we raise the concern of the possibility for an attacker to obtain knowledge about an SDN network. In particular, we introduce a novel attack, named Know Your Enemy (KYE), by means of which an attacker can gather vital information about the configuration of the network. This information ranges from the configuration of security tools, such as attack detection thresholds for network scanning, to general network policies like QoS and network virtualization. Additionally, we show that an attacker can perform a KYE attack in a stealthy fashion, i.e., without the risk of being detected. We underline that the vulnerability exploited by the KYE attack is proper of SDN and is not present in legacy networks. To address the KYE attack, we also propose an active defense countermeasure based on network flows obfuscation, which considerably increases the complexity for a successful attack. Our solution offers provable security guarantees that can be tailored to the needs of the specific network under consideration.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Procedural Guard Placement for Stealth Games

Stealth game mechanics rely on a suitably difficult distribution of enemy observers, the placement of which is typically a manual process. Here we investigate an automatic process for placement of observer opponents. We use a Monte-Carlo approach to generate randomized enemy positions and motions and combine this with a stealth path-planning and analysis framework. This allows us to ensure feas...

متن کامل

Strategies in Social Software

Viewing the way society has defined its rules and mechanisms as “social software”, we want to understand how people behave given their understanding of the societal rules and given their wish to further their interest as they conceive it, and how social mechanisms should be designed to suit people furthering their interest as they conceive it. This chapter is written from the perspective of str...

متن کامل

Digital Defense : Goals , Missions , Achievements

battlefield. Some twenty-five hundred years ago, Sun-Tzu taught us that if you knew the enemy and yourself, you would never be in danger in hundreds of battles. Sun-Tzu’s words, “Know your enemy,” mean knowing the enemy leader’s intentions. Sun-Tzu thought that if we knew the enemy's intentions, we could win a victory without war against the enemy. However, it is very difficult to find out the ...

متن کامل

Collaborating with the Enemy on Network Management

Software Defined Networking (SDN) deconstructs the current routing infrastructure into a small number of controllers, which are general purpose computers, and a large number of switches which are programmable forwarding engines. It is already deployed in data centres, where it offers considerable advantages of both cost and flexibility over a switching fabric of traditional routers. Such applic...

متن کامل

Detection Range of Intercept Sonar for CWFM Signals

Stealth in military sonars applications may be ensured through the use of low power signals making them difficult to intercept by the enemy. In recent years, silent sonar design has been investigated by the Department of Marine Electronic Systems of the Gdansk University of Technology. This article provides an analysis of how an intercept sonar operated by the enemy can detect silent sonar sign...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017