999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Survey of Attacksand Countermeasures for SDN

2019-01-12 02:58:44BAIJiasongZHANGMenghaoandBIJun
ZTE Communications 2018年4期

BAI Jiasong ,ZHANG Menghao,and BI Jun

(1.Institute for Network Sciences and Cyberspace,Tsinghua University,Beijing 100084,China;

2.Department of Computer Science and Technology,Tsinghua University,Beijing 100084,China;

3.Beijing National Research Center for Information Science and Technology(BNRist),Tsinghua University,Beijing 100084,China)

Abstract Software defined networking(SDN)has attracted significant attention from both academia and industry by its ability to reconfigure network devices with logically centralized applications.However,some critical security issues have also been introduced along with the benefits,which put an obstruction to the deployment of SDN.One root cause of these issues lies in the limited resources and capability of devices involved in the SDN architecture,especially the hardware switches lied in the data plane.In this paper,we analyze the vulnerability of SDN and present two kinds of SDN-targeted attacks:1)data-to-control plane saturation attack which exhausts resources of all SDN components,including control plane,data plane,and the in-between downlink channel and 2)control plane reflection attack which only attacks the data plane and gets conducted in a more efficient and hidden way.Finally,we propose the corresponding defense frameworks to mitigate such attacks.

Key words SDN;indirect/direct data plane event;data-to-control plane saturation attack;control plane reflection attack

1 Introduction

S oftware defined networking(SDN)has enabled flexible and dynamic network functionalities with a novel programming paradigm.By decoupling the control plane from the data plane,control logics of different network functionalities could be implemented on top of the logically centralized controller as“applications”.Typical SDN applications are implemented as event-driven programs,which receive information directly or indirectly from switches and distribute the processing decisions of packets to switches accordingly.These applications enable SDN to adapt to the data plane dynamics quickly and make the responses according to the application policies timely.A wide range of network functionalities are implemented in this way,allowing SDN-enabled switches[1]to behave as firewall[2],load balancing[3],L2/L3 routing,and so on.

While the decoupling paradigm has enabled unprecedented programmability in networks,it also becomes the vulnerability of SDN infrastructure.The typical SDN infrastructure consists of three major components:the control plane,the data plane,and a control channel,where the two planes can communicate through standard protocols.To express the logics of control applications,control messages are generated in both the two planes and transferred through the channel.By triggering numerous control messages in a short time,attackers can paralyze the SDN infrastructure by exhausting the available resources of all three components.In particular,the control message processing capability on switches proves to be the bottleneck of the infrastructure,which is constrained by the wimpy central processing units(CPUs),limited ternary content-addressable memory(TCAM)[4],[5]update rate and flow table capacity due to financial and power consumption reasons.These limitations have slowed down network updates and hurt network visibility,which further constrains the control plane applicationswith dynamic policiessignificantly[6].

The applications enablea network todynamically adjust network configurations based on certain data plane eventsas illustrated inFig.1.These events can be categorized into the following two types:direct data plane events(e.g.,Packet-In messages)and indirect data plane events(e.g.,Statistics Query/Reply messages).In the first case,the controller installs a default table-miss flow rule on the switch.Arriving packets which fail to match any flow rule are forwarded to the control plane for further processing.In the second case,the controller installs a counting flow rule on the switch to record the statistics of arriving packets and periodically polls the flow counter values.A large number of control plane applications combine these two kindsof eventstocomposecomplicated network functions.

▲Figure1.Architectureand event pipelinesof current software-defined networking.

From our previous study,we find that flow rule update messages from the SDN control plane will be triggered by both kinds of events,which can be exploited by an intentional attacker.In this article,we present two kinds of attacks,i.e.,the data-to-control saturation attack[7],a dedicated Denial-of-Service(DoS)attack against SDN essentially,and the control plane reflection attack[8],which can be further categorized into the table-miss striking attack and counter manipulation attack by the type of applied events.Furthermore,we propose thedefenseframeworksto mitigatethesetwo attacks.In the following,we illustrate the details of two types of attacks in Sections 2 and 3,present the corresponding defense frameworks in Sections 4 and 5,and conclude this article and make some discussion in Section 6.

2 Data-to-Control Saturation Attacks

Intuitively,an attacker could commit the data-to-control saturation attack by producing a large number of short-flows by controlling a number of zombie hosts in an SDN-enabled network.The attack traffic is mixed with benign traffic,making it difficult to be identified.With the reactive routing and finegrained flow control mechanism taken by the existing mainstream SDN controllers,the unmatched packets in the data plane would be delivered to the controller directly and processed by the corresponding applications.As a result,the data plane,the control channel and the control plane would quickly suffer from the attack,and soon the SDN system could not provideany servicefor benign traffic.

▲Figure2.Adversary model of thedata-to-control saturation attack.

We start from a simplified motivating scenario to illustrate how an adversary attacks the SDN infrastructure.As depicted inFig.2,when a new packet arrives at a switch where there is no matching flow entry in the local flow tables,the switch will store the packet in its buffer memory and send a Packet-In message to the controller.The message only contains the packet header if the buffer memory is not full,but will contain the whole packet when the buffer memory is full.After the controller receives the message,it computes the route and takes the corresponding actions on the switches through control messages including Flow-Mod and Packet-Out.Then the switches parse the packets and install the flow rules in the capacity-limited flow tables.The attacker can exploit the vulnerability of this reactive packet processing mechanism by flooding malicious packets to the switches.The header fields of these packets are filled with deliberately forged values that it is almost impossible for them to be matched by any existing flow entries in the switches.After that,numerous table-misses are triggered,and a large number of packet-in messages are flooded to the controller,making the entire SDN system suffer from resource exhaustion.In this adversary model,all three levels of SDNresourcesarecompromised.

3 Control Plane Reflection Attacks

Compared with saturation attacks,control planereflection attacks are much hidden and sophisticated.It does not target at the controller,nor the end host,but it utilizes the limited processing capability of downlink messages in the SDN-enabled hardware switches and easily gain much more prominent effectsthan saturation attacks.

A general procedure of control plane reflection attacks consists of two phases,i.e.,the probing phase and triggering phase.During the probing phase,an attacker uses several kinds of probe packets to learn the conditions that application adopts to issue new flow rule update messages.Upon the information obtained,the attacker can carefully craft the patterns of attack packet stream to trigger numerous flow rule update mes-sages in a short interval to paralyze the hardware switches.

3.1 Table-Miss Striking Attacks

The table-miss striking attack is an enhanced attack vector from the saturation attack.Instead of leveraging a random packet generation method to commit the attack,a striking attack adopts a more accurate and cost-efficient manner by utilizingprobingand triggeringphases.

The probing phase is to learn the confidential information of the control plane to guide the patterns of attack packet streams.The attacker could first probe the use of direct data plane events by using various low-rate probing packets with deliberately faked headers.By sending these probing packets and observing the response accordingly,the round trip time(RTT)could be obtained.If the first packet has a longer RTT,we can conclude that it is directed to the controller while the others are forwarded directly to the data plane.This indicates that the specific packet header matches no flow rule in the switch.Then the attacker could change one of the header fields with the variable-controlling approach.Within limited trials(42 in the latest OpenFlow specification),the attacker was able to determine which header fields were sensitive to the controller.Then the attacker could deliberately craft attack stream based on probed grains to trigger the expensive flow rule updateoperations.

3.2 Counter Manipulation Attacks

The counter manipulation attack is based on indirect data plane events and much more sophisticated compared with abovementioned attacks.In order to accurately infer the usage of indirect data plane events,three types of packets are required,i.e.,timing probing packets,test packets and data planestreams.

Timing probing packets are used to measure the work load of software agent of a switch,inspired by time pings in[9].Three properties should be satisfied.First,they should go to the control plane by hitting the table-miss flow rule in the switch,and trigger the operations of corresponding applications.Second,each of them must evoke a response from the network to compute the RTT.Third,they should be sent in an extremely low rate(10 packets per second(pps)is enough)and put as low loads as possible to the switch software agent.There are many options for timing probing packets,e.g.,Address Resolution Protocol(ARP)request/reply,Internet Control Message Protocol(ICMP)request/reply.

Test packetsareused to strengthen the effect of timing probing packets by adding extra loads to the software agent of the switch.We consider test packets with a random destination IP address and the broadcast destination Media Access Control(MAC)address is an ideal choice.By hitting the table-miss entry,each of them would be directed to the controller.Then the SDN controller will issue Packet-Out message to forward the test packet directly.As a result,the aim of burdening switch software agent isachieved.

A data plane stream is a series of templates,which should go directly through the data plane to obtain more advanced information such as the specific conditions for indirect eventdriven applications.We provide two templates here,as shown inFig.3.The first template has a steady rate v and packet size p,which is mainly used to probe volume-based statistic calculation and control method.The second has a rate distribution like a jump function,where three variables(v,t,p)determine the shapes of this template as well as the size of each packet,which isoften used toprobetherate-based strategy.

The insight of the probing phase of counter manipulation attacks lies in that different downlink messages have diverse expenses for the downlink channel.Among the interaction approaches between the applications and the data plane,there are mainly three types of downlink messages,i.e.,Flow-Mod,Statistics Query,and Packet-Out.Flow-Mod is the most expensive one,Statistics Query comes at the second and Packet-Out is rather lightweight.The latencies of timing probing packets will vary when the switch encounters different message types.Thus,the attacker could learn the type of message issued by the control plane.As for indirect data plane events,the statistic queries are usually conducted periodically by the applications.As a result,each of these queries would incur a small rise for the RTTs of timing probing packets.If a subsequent Flow-Mod is issued by the controller,there would be a doublepeak.Based on the double-peak phenomenon,the attacker could even infer what statistic calculation methods the application is taking,such asvolume-based or rate-based.With several trails of two templates above and the variations of v and p in a binary search approach,the attacker could quickly obtain the concrete conditions(volume/rate values,packet number/byte-based)that trigger the expensive downlink messages.The confidential information,such as the query period and exact conditions,helps the attacker permute the packet interval and packet size of each flow.By initiating a large number of flows,Flow-Mod of equal number would be triggered every period,makingthehardwareswitch suffer extremely.

▲Figure3.Templatesfor a data planestream.

?Figure4.Timing-based patternsfor the counter manipulation attack.

We use a simplified example(Fig.4)to illustrate the attack.If an attacker obtains a series of successive double-peak phenomenon(Fig.4a)with the input of data plane stream template 1,where v is a big value,and obtains a series of intermittent double-peak phenomenon(Fig.4b),where v is also a significant value.The attacker could determine that packet number volume-based statistic calculation approach is sensitive to streamwith a high pps.With thevariationsof v and p,thecritical value of volumecan be inferred tohelp conduct the attack.

4 Flood Shield:Defending Data-to-Control Plane Saturation Attacks

Floodshield[7]isa SDNdefenseframework against thedatato-control saturation attacks by combining two modules,i.e.,source address validation and stateful packet supervision.The former validates the source addresses of the incoming traffic and filters the forged packets directly in the data plane,since attackers tend to commit attacks with a forged source address to hide the locations of attack sources.Based on it,the last module monitorsthepacket statesof each real addressand performs network service differentiation according to the evaluation scores and network resource usage.

As depicted inFig.5,the source address validation module works when a host connects to the SDN-enabled network.By snooping the address assignment mechanism procedure,the module maintainsaglobal Binding Tableat thecontroller torecord the mapping between end hosts and their IP addresses.Based on the table,the module then takes advantage of the multi-table pipeline of OpenFlow to install filter rules in table 0 and install normal flow rules in the following tables.Packets with forged IP addresses are dropped in table 0 while trusted packetsaredirectly forwarded tothenon-filter flow tables.

Since packets with real source addresses could also be harnessed to conduct attacks,a stateful packet supervision module is introduced to distinguish flows by traffic features and achieve differentiated services for different user dynamically.The module takes packet-in rate and average flow length as two metrics to evaluate user behavior.Users are divided into three levels according to their evaluation scores and allocated with different priorities.Flows with a high priority are processed as usual while those with a lower priority are limited on therateor even dropped.

5 SWGuard:Defending Control Plane Reflection Attacks

The basic idea of SWGuard[8]is to discriminate good from evil,and prioritize downlink messages with discrimination results.SWGuard introduces a multi-queue scheduling strategy to achieve different latency for different downlink messages.The scheduling strategy is based on the statistics of downlink messages during the last period,which takes both fairness and efficiency into consideration.When the downlink channel is becoming congested,the malicious downlink messages are inclined to be put into a low-priority scheduling queue and the requirements of good messages are more likely to be satisfied.As shown in Fig.6,SWGuard mainly redesigns two compo-nents of SDN architecture.On the switch side,it changes the existing software protocol agent to multi-queue based structures.On the controller side,it adds a Behavior Monitor module as a basic service which assigns different priorities to different messages dynamically.

▲Figure5.Framework Design of FloodShield.

▲Figure6.Framework Design of SWGuard.

SWGuard redesigns the software protocol agent of the existing switch to prioritize the downlink messages.Since different types of downlink messages have diverse requirements,SWGuard summarizes the downlink messages into four categories:1)Modify State Messages,2)Statistic Query Messages,3)Configuration Messages,and 4)Consistency Required Messages.It also designs a Classifier to classify the downlink messages into different queues accordingly.The first two types are related to behaviorsof hostsand applicationswhich aresensitivetolatency and order,so a multi-queue is allocated for each.The latter two types inherit from the original single queue.With messages in the queues,a Scheduler is designed to dequeue the messages with a time-based scheduling algorithm.For queues with the highest priority are dequeued immediately,messages are dequeued immediately as they arrive.However,for queues with lower priority,different time interval is added to messages beforedequeued.

To distinguish different downlink messages with different priorities,SWGuard proposes the novel abstraction of Host-Application Pair(HAP)and use it as the granularity for monitoring and statistics.Packets are recorded for each application of each user.Assuming there are K applications in the control plane,and N hostsin the data plane,packets should be categorized into K×N groups.SWGuard is designed as attack-driven.When the number of downlink messages in a period is less than a threshold,all packets are allocated with the highest priority.When the reflection attacks are detected,the SWGuard starts to calculate the penalty coefficient for each HAPby comparing their required resources with their real resource occupation.According to the coefficient,downlink messages are enqueued into queues with different priorities.Besides,multiqueues based software protocol agent may violate the consistency of some messages,which need to be sent in a particular order for correctness reasons.To address this issue,a coordination mechanism between the Behavior Monitor and Classifier in softwareprotocol agent isdesigned.

6 Conclusions

While SDNhasoffered new opportunitiestonetwork automation and innovations,it has also introduced new security concerns.Securing the network infrastructure is crucial to the promotion and adoption of SDN.In thisarticle,wereviewtwo SDN-targeted attacks,data-to-control saturation attacks,and control plane reflection attacks,along with the corresponding defense frameworks,FloodShield and SWGuard.The two attacks are both targeted at limited resources of SDN infrastructure,especially resources and limited processing capability of the data plane.Since hardware switching systems share many common designs like TCAM-based flow table,the SDN-targeted attacks also provide new perspectives to the security of other emerging architecture,e.g.theprogrammabledataplane[10].

主站蜘蛛池模板: 国产亚洲精品自在久久不卡 | 精品黑人一区二区三区| 欧美日韩91| 日韩欧美高清视频| 婷婷成人综合| 一级毛片免费不卡在线| 国产乱人伦精品一区二区| 五月婷婷欧美| 夜精品a一区二区三区| 免费一极毛片| 国产成人精品免费视频大全五级| 在线欧美国产| 久久99国产综合精品1| 国产成人无码AV在线播放动漫| 日韩毛片免费视频| 欧美视频在线第一页| 日韩毛片免费视频| Jizz国产色系免费| 91在线中文| 91精品国产无线乱码在线| 在线国产三级| 欧美日韩中文字幕二区三区| 性欧美在线| 欧美黄网在线| 一区二区三区四区日韩| 午夜性刺激在线观看免费| 欧美一区二区福利视频| 激情综合婷婷丁香五月尤物| 在线一级毛片| 欧美日韩高清在线| 国产美女在线免费观看| 色网在线视频| 免费一看一级毛片| 国产精欧美一区二区三区| 超碰精品无码一区二区| 精品三级在线| 91精品免费高清在线| 欧美五月婷婷| 国产在线自揄拍揄视频网站| 谁有在线观看日韩亚洲最新视频 | 亚洲欧美日韩中文字幕在线| 91成人在线免费观看| 国产亚洲现在一区二区中文| 91福利免费| 成人免费午夜视频| 亚洲AV电影不卡在线观看| 久久国产精品77777| 免费播放毛片| 国内精品自在欧美一区| 91精品国产无线乱码在线 | 1024你懂的国产精品| 亚欧成人无码AV在线播放| 国产欧美中文字幕| 免费A∨中文乱码专区| 国产成人免费| 午夜国产小视频| 精品国产电影久久九九| 国产高清色视频免费看的网址| 国产精品免费电影| 亚洲欧洲日产国码无码av喷潮| 自拍亚洲欧美精品| a级毛片免费看| 国产浮力第一页永久地址| 久久伊人操| 亚洲性日韩精品一区二区| 青青国产在线| 三上悠亚一区二区| 直接黄91麻豆网站| 好久久免费视频高清| 亚洲精品中文字幕午夜| 国产欧美视频在线观看| 福利视频99| 欧美专区在线观看| 无码国产伊人| 成年女人a毛片免费视频| 欧美三级视频网站| 97免费在线观看视频| 88国产经典欧美一区二区三区| 91福利在线观看视频| 无码一区二区波多野结衣播放搜索| 中文字幕人成人乱码亚洲电影| 91视频首页|