Attacks and Defenses in the Data Plane of Networks
Title | Attacks and Defenses in the Data Plane of Networks |
Publication Type | Journal Article |
Year of Publication | 2012 |
Authors | Chasaki, D., Wolf, T. |
Journal | Dependable and Secure Computing, IEEE Transactions on |
Volume | 9 |
Pagination | 798-810 |
Date Published | Nov |
ISSN | 1545-5971 |
Keywords | Computer crime, computer network security, computer networks, control plane, custom-logic hardware, data plane, denial-of-service attack, embedded system security, Embedded systems, field programmable gate arrays, hardware-based defense mechanism, Internet, logic devices, NetFPGA, network attack, network processor, network routers, Network security, packet forwarding, packet processing software, processing monitor, Program processors, programmable router, Routing protocols, security issues, software vulnerabilities, software-programmable network processors |
Abstract | Security issues in computer networks have focused on attacks on end systems and the control plane. An entirely new class of emerging network attacks aims at the data plane of the network. Data plane forwarding in network routers has traditionally been implemented with custom-logic hardware, but recent router designs increasingly use software-programmable network processors for packet forwarding. These general-purpose processing devices exhibit software vulnerabilities and are susceptible to attacks. We demonstrate-to our knowledge the first-practical attack that exploits a vulnerability in packet processing software to launch a devastating denial-of-service attack from within the network infrastructure. This attack uses only a single attack packet to consume the full link bandwidth of the router's outgoing link. We also present a hardware-based defense mechanism that can detect situations where malicious packets try to change the operation of the network processor. Using a hardware monitor, our NetFPGA-based prototype system checks every instruction executed by the network processor and can detect deviations from correct processing within four clock cycles. A recovery system can restore the network processor to a safe state within six cycles. This high-speed detection and recovery system can ensure that network processors can be protected effectively and efficiently from this new class of attacks. |
URL | http://ieeexplore.ieee.org/document/6231636/ |
DOI | 10.1109/TDSC.2012.50 |
Citation Key | 6231636 |
- NetFPGA
- software-programmable network processors
- software vulnerabilities
- security issues
- Routing protocols
- programmable router
- Program processors
- processing monitor
- packet processing software
- packet forwarding
- network security
- network routers
- network processor
- network attack
- Computer crime
- logic devices
- internet
- hardware-based defense mechanism
- field programmable gate arrays
- embedded systems
- embedded system security
- denial-of-service attack
- data plane
- custom-logic hardware
- control plane
- computer networks
- computer network security