Visible to the public Attacks and Defenses in the Data Plane of Networks

TitleAttacks and Defenses in the Data Plane of Networks
Publication TypeJournal Article
Year of Publication2012
AuthorsChasaki, D., Wolf, T.
JournalDependable and Secure Computing, IEEE Transactions on
Volume9
Pagination798-810
Date PublishedNov
ISSN1545-5971
KeywordsComputer crime, computer network security, computer networks, control plane, custom-logic hardware, data plane, denial-of-service attack, embedded system security, Embedded systems, field programmable gate arrays, hardware-based defense mechanism, Internet, logic devices, NetFPGA, network attack, network processor, network routers, Network security, packet forwarding, packet processing software, processing monitor, Program processors, programmable router, Routing protocols, security issues, software vulnerabilities, software-programmable network processors
Abstract

Security issues in computer networks have focused on attacks on end systems and the control plane. An entirely new class of emerging network attacks aims at the data plane of the network. Data plane forwarding in network routers has traditionally been implemented with custom-logic hardware, but recent router designs increasingly use software-programmable network processors for packet forwarding. These general-purpose processing devices exhibit software vulnerabilities and are susceptible to attacks. We demonstrate-to our knowledge the first-practical attack that exploits a vulnerability in packet processing software to launch a devastating denial-of-service attack from within the network infrastructure. This attack uses only a single attack packet to consume the full link bandwidth of the router's outgoing link. We also present a hardware-based defense mechanism that can detect situations where malicious packets try to change the operation of the network processor. Using a hardware monitor, our NetFPGA-based prototype system checks every instruction executed by the network processor and can detect deviations from correct processing within four clock cycles. A recovery system can restore the network processor to a safe state within six cycles. This high-speed detection and recovery system can ensure that network processors can be protected effectively and efficiently from this new class of attacks.

URLhttp://ieeexplore.ieee.org/document/6231636/
DOI10.1109/TDSC.2012.50
Citation Key6231636