Flow reconnaissance via timing attacks on SDN switches
Title | Flow reconnaissance via timing attacks on SDN switches |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Sheng Liu, Michael K. Reiter, Vyas Sekar |
Conference Name | 37th IEEE International Conference on Distributed Computing Systems |
Date Published | 06/2017 |
Publisher | IEEE |
Conference Location | Atlanta, GA, USA |
Abstract | When encountering a packet for which it has no matching forwarding rule, a software-defined networking (SDN) switch requests an appropriate rule from its controller; this request delays the routing of the flow until the controller responds. We show that this delay gives rise to a timing side channel in which an attacker can test for the recent occurrence of a target flow by judiciously probing the switch with forged flows and using the delays they encounter to discern whether covering rules were previously installed in the switch. We develop a Markov model of an SDN switch to permit the attacker to select the best probe (or probes) to infer whether a target flow has recently occurred. Our model captures practical challenges related to rule evictions to make room for other rules; rule timeouts due to inactivity; the presence of multiple rules that apply to overlapping sets of flows; and rule priorities. We show that our model enables detection of target flows with considerable accuracy in many cases. |
Citation Key | node-34386 |
Refereed Designation | Refereed |