Towards Proactive SDN-Controller Attack and Failure Resilience
Title | Towards Proactive SDN-Controller Attack and Failure Resilience |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Azab, M., Fortes, J. A. B. |
Conference Name | 2017 International Conference on Computing, Networking and Communications (ICNC) |
ISBN Number | 978-1-5090-4588-4 |
Keywords | central SDN controller, checkpointing, Collaboration, composability, computer network performance evaluation, computer network security, Containers, control systems, controller resilience, controller sandboxing mechanism, controller/host isolation, data center networks, failure resilience, failure-and-attack-resilient execution, generic hardware platforms, host-based attacks, Linux, Linux containers, Linux-containers, live remote checkpointing, Moving-Target Defense, network performance, PAFR, plug-and-play operation, policy, Policy-Governed Secure Collaboration, Policy-Governed systems, proactive SDN-controller attack, pubcrawl, resilience, Sandboxing, SDN networks, security, Servers, software defined modules, software defined networking, Software-Defined Networks, virtualization |
Abstract | SDN networks rely mainly on a set of software defined modules, running on generic hardware platforms, and managed by a central SDN controller. The tight coupling and lack of isolation between the controller and the underlying host limit the controller resilience against host-based attacks and failures. That controller is a single point of failure and a target for attackers. ``Linux-containers'' is a successful thin virtualization technique that enables encapsulated, host-isolated execution-environments for running applications. In this paper we present PAFR, a controller sandboxing mechanism based on Linux-containers. PAFR enables controller/host isolation, plug-and-play operation, failure-and-attack-resilient execution, and fast recovery. PAFR employs and manages live remote checkpointing and migration between different hosts to evade failures and attacks. Experiments and simulations show that the frequent employment of PAFR's live-migration minimizes the chance of successful attack/failure with limited to no impact on network performance. |
URL | https://ieeexplore.ieee.org/document/7876169/ |
DOI | 10.1109/ICCNC.2017.7876169 |
Citation Key | azab_towards_2017 |
- resilience
- moving-target defense
- network performance
- PAFR
- plug-and-play operation
- Policy
- Policy-Governed Secure Collaboration
- Policy-Governed systems
- proactive SDN-controller attack
- pubcrawl
- live remote checkpointing
- sandboxing
- SDN networks
- security
- Servers
- software defined modules
- software defined networking
- Software-Defined Networks
- Virtualization
- controller/host isolation
- checkpointing
- collaboration
- composability
- computer network performance evaluation
- computer network security
- Containers
- control systems
- controller resilience
- controller sandboxing mechanism
- central SDN controller
- data center networks
- failure resilience
- failure-and-attack-resilient execution
- generic hardware platforms
- host-based attacks
- Linux
- Linux containers
- Linux-containers