Visible to the public Attack Detection on the Software Defined Networking Switches

TitleAttack Detection on the Software Defined Networking Switches
Publication TypeConference Paper
Year of Publication2020
AuthorsTupakula, Uday, Varadharajan, Vijay, Karmakar, Kallol Krishna
Conference Name2020 6th IEEE Conference on Network Softwarization (NetSoft)
Date Publishedjun
KeywordsComputer architecture, Monitoring, Network Security Architecture, pubcrawl, resilience, Resiliency, security, security application, security attacks, Software, Software Defined Networking (SDN) Security, Switch Security, Switches, Task Analysis
AbstractSoftware Defined Networking (SDN) is disruptive networking technology which adopts a centralised framework to facilitate fine-grained network management. However security in SDN is still in its infancy and there is need for significant work to deal with different attacks in SDN. In this paper we discuss some of the possible attacks on SDN switches and propose techniques for detecting the attacks on switches. We have developed a Switch Security Application (SSA)for SDN Controller which makes use of trusted computing technology and some additional components for detecting attacks on the switches. In particular TPM attestation is used to ensure that switches are in trusted state during boot time before configuring the flow rules on the switches. The additional components are used for storing and validating messages related to the flow rule configuration of the switches. The stored information is used for generating a trusted report on the expected flow rules in the switches and using this information for validating the flow rules that are actually enforced in the switches. If there is any variation to flow rules that are enforced in the switches compared to the expected flow rules by the SSA, then, the switch is considered to be under attack and an alert is raised to the SDN Administrator. The administrator can isolate the switch from network or make use of trusted report for restoring the flow rules in the switches. We will also present a prototype implementation of our technique.
DOI10.1109/NetSoft48620.2020.9165459
Citation Keytupakula_attack_2020