999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Survey of Attacksand Countermeasures for SDN

2019-01-12 02:58:44BAIJiasongZHANGMenghaoandBIJun
ZTE Communications 2018年4期

BAI Jiasong ,ZHANG Menghao,and BI Jun

(1.Institute for Network Sciences and Cyberspace,Tsinghua University,Beijing 100084,China;

2.Department of Computer Science and Technology,Tsinghua University,Beijing 100084,China;

3.Beijing National Research Center for Information Science and Technology(BNRist),Tsinghua University,Beijing 100084,China)

Abstract Software defined networking(SDN)has attracted significant attention from both academia and industry by its ability to reconfigure network devices with logically centralized applications.However,some critical security issues have also been introduced along with the benefits,which put an obstruction to the deployment of SDN.One root cause of these issues lies in the limited resources and capability of devices involved in the SDN architecture,especially the hardware switches lied in the data plane.In this paper,we analyze the vulnerability of SDN and present two kinds of SDN-targeted attacks:1)data-to-control plane saturation attack which exhausts resources of all SDN components,including control plane,data plane,and the in-between downlink channel and 2)control plane reflection attack which only attacks the data plane and gets conducted in a more efficient and hidden way.Finally,we propose the corresponding defense frameworks to mitigate such attacks.

Key words SDN;indirect/direct data plane event;data-to-control plane saturation attack;control plane reflection attack

1 Introduction

S oftware defined networking(SDN)has enabled flexible and dynamic network functionalities with a novel programming paradigm.By decoupling the control plane from the data plane,control logics of different network functionalities could be implemented on top of the logically centralized controller as“applications”.Typical SDN applications are implemented as event-driven programs,which receive information directly or indirectly from switches and distribute the processing decisions of packets to switches accordingly.These applications enable SDN to adapt to the data plane dynamics quickly and make the responses according to the application policies timely.A wide range of network functionalities are implemented in this way,allowing SDN-enabled switches[1]to behave as firewall[2],load balancing[3],L2/L3 routing,and so on.

While the decoupling paradigm has enabled unprecedented programmability in networks,it also becomes the vulnerability of SDN infrastructure.The typical SDN infrastructure consists of three major components:the control plane,the data plane,and a control channel,where the two planes can communicate through standard protocols.To express the logics of control applications,control messages are generated in both the two planes and transferred through the channel.By triggering numerous control messages in a short time,attackers can paralyze the SDN infrastructure by exhausting the available resources of all three components.In particular,the control message processing capability on switches proves to be the bottleneck of the infrastructure,which is constrained by the wimpy central processing units(CPUs),limited ternary content-addressable memory(TCAM)[4],[5]update rate and flow table capacity due to financial and power consumption reasons.These limitations have slowed down network updates and hurt network visibility,which further constrains the control plane applicationswith dynamic policiessignificantly[6].

The applications enablea network todynamically adjust network configurations based on certain data plane eventsas illustrated inFig.1.These events can be categorized into the following two types:direct data plane events(e.g.,Packet-In messages)and indirect data plane events(e.g.,Statistics Query/Reply messages).In the first case,the controller installs a default table-miss flow rule on the switch.Arriving packets which fail to match any flow rule are forwarded to the control plane for further processing.In the second case,the controller installs a counting flow rule on the switch to record the statistics of arriving packets and periodically polls the flow counter values.A large number of control plane applications combine these two kindsof eventstocomposecomplicated network functions.

▲Figure1.Architectureand event pipelinesof current software-defined networking.

From our previous study,we find that flow rule update messages from the SDN control plane will be triggered by both kinds of events,which can be exploited by an intentional attacker.In this article,we present two kinds of attacks,i.e.,the data-to-control saturation attack[7],a dedicated Denial-of-Service(DoS)attack against SDN essentially,and the control plane reflection attack[8],which can be further categorized into the table-miss striking attack and counter manipulation attack by the type of applied events.Furthermore,we propose thedefenseframeworksto mitigatethesetwo attacks.In the following,we illustrate the details of two types of attacks in Sections 2 and 3,present the corresponding defense frameworks in Sections 4 and 5,and conclude this article and make some discussion in Section 6.

2 Data-to-Control Saturation Attacks

Intuitively,an attacker could commit the data-to-control saturation attack by producing a large number of short-flows by controlling a number of zombie hosts in an SDN-enabled network.The attack traffic is mixed with benign traffic,making it difficult to be identified.With the reactive routing and finegrained flow control mechanism taken by the existing mainstream SDN controllers,the unmatched packets in the data plane would be delivered to the controller directly and processed by the corresponding applications.As a result,the data plane,the control channel and the control plane would quickly suffer from the attack,and soon the SDN system could not provideany servicefor benign traffic.

▲Figure2.Adversary model of thedata-to-control saturation attack.

We start from a simplified motivating scenario to illustrate how an adversary attacks the SDN infrastructure.As depicted inFig.2,when a new packet arrives at a switch where there is no matching flow entry in the local flow tables,the switch will store the packet in its buffer memory and send a Packet-In message to the controller.The message only contains the packet header if the buffer memory is not full,but will contain the whole packet when the buffer memory is full.After the controller receives the message,it computes the route and takes the corresponding actions on the switches through control messages including Flow-Mod and Packet-Out.Then the switches parse the packets and install the flow rules in the capacity-limited flow tables.The attacker can exploit the vulnerability of this reactive packet processing mechanism by flooding malicious packets to the switches.The header fields of these packets are filled with deliberately forged values that it is almost impossible for them to be matched by any existing flow entries in the switches.After that,numerous table-misses are triggered,and a large number of packet-in messages are flooded to the controller,making the entire SDN system suffer from resource exhaustion.In this adversary model,all three levels of SDNresourcesarecompromised.

3 Control Plane Reflection Attacks

Compared with saturation attacks,control planereflection attacks are much hidden and sophisticated.It does not target at the controller,nor the end host,but it utilizes the limited processing capability of downlink messages in the SDN-enabled hardware switches and easily gain much more prominent effectsthan saturation attacks.

A general procedure of control plane reflection attacks consists of two phases,i.e.,the probing phase and triggering phase.During the probing phase,an attacker uses several kinds of probe packets to learn the conditions that application adopts to issue new flow rule update messages.Upon the information obtained,the attacker can carefully craft the patterns of attack packet stream to trigger numerous flow rule update mes-sages in a short interval to paralyze the hardware switches.

3.1 Table-Miss Striking Attacks

The table-miss striking attack is an enhanced attack vector from the saturation attack.Instead of leveraging a random packet generation method to commit the attack,a striking attack adopts a more accurate and cost-efficient manner by utilizingprobingand triggeringphases.

The probing phase is to learn the confidential information of the control plane to guide the patterns of attack packet streams.The attacker could first probe the use of direct data plane events by using various low-rate probing packets with deliberately faked headers.By sending these probing packets and observing the response accordingly,the round trip time(RTT)could be obtained.If the first packet has a longer RTT,we can conclude that it is directed to the controller while the others are forwarded directly to the data plane.This indicates that the specific packet header matches no flow rule in the switch.Then the attacker could change one of the header fields with the variable-controlling approach.Within limited trials(42 in the latest OpenFlow specification),the attacker was able to determine which header fields were sensitive to the controller.Then the attacker could deliberately craft attack stream based on probed grains to trigger the expensive flow rule updateoperations.

3.2 Counter Manipulation Attacks

The counter manipulation attack is based on indirect data plane events and much more sophisticated compared with abovementioned attacks.In order to accurately infer the usage of indirect data plane events,three types of packets are required,i.e.,timing probing packets,test packets and data planestreams.

Timing probing packets are used to measure the work load of software agent of a switch,inspired by time pings in[9].Three properties should be satisfied.First,they should go to the control plane by hitting the table-miss flow rule in the switch,and trigger the operations of corresponding applications.Second,each of them must evoke a response from the network to compute the RTT.Third,they should be sent in an extremely low rate(10 packets per second(pps)is enough)and put as low loads as possible to the switch software agent.There are many options for timing probing packets,e.g.,Address Resolution Protocol(ARP)request/reply,Internet Control Message Protocol(ICMP)request/reply.

Test packetsareused to strengthen the effect of timing probing packets by adding extra loads to the software agent of the switch.We consider test packets with a random destination IP address and the broadcast destination Media Access Control(MAC)address is an ideal choice.By hitting the table-miss entry,each of them would be directed to the controller.Then the SDN controller will issue Packet-Out message to forward the test packet directly.As a result,the aim of burdening switch software agent isachieved.

A data plane stream is a series of templates,which should go directly through the data plane to obtain more advanced information such as the specific conditions for indirect eventdriven applications.We provide two templates here,as shown inFig.3.The first template has a steady rate v and packet size p,which is mainly used to probe volume-based statistic calculation and control method.The second has a rate distribution like a jump function,where three variables(v,t,p)determine the shapes of this template as well as the size of each packet,which isoften used toprobetherate-based strategy.

The insight of the probing phase of counter manipulation attacks lies in that different downlink messages have diverse expenses for the downlink channel.Among the interaction approaches between the applications and the data plane,there are mainly three types of downlink messages,i.e.,F(xiàn)low-Mod,Statistics Query,and Packet-Out.Flow-Mod is the most expensive one,Statistics Query comes at the second and Packet-Out is rather lightweight.The latencies of timing probing packets will vary when the switch encounters different message types.Thus,the attacker could learn the type of message issued by the control plane.As for indirect data plane events,the statistic queries are usually conducted periodically by the applications.As a result,each of these queries would incur a small rise for the RTTs of timing probing packets.If a subsequent Flow-Mod is issued by the controller,there would be a doublepeak.Based on the double-peak phenomenon,the attacker could even infer what statistic calculation methods the application is taking,such asvolume-based or rate-based.With several trails of two templates above and the variations of v and p in a binary search approach,the attacker could quickly obtain the concrete conditions(volume/rate values,packet number/byte-based)that trigger the expensive downlink messages.The confidential information,such as the query period and exact conditions,helps the attacker permute the packet interval and packet size of each flow.By initiating a large number of flows,F(xiàn)low-Mod of equal number would be triggered every period,makingthehardwareswitch suffer extremely.

▲Figure3.Templatesfor a data planestream.

?Figure4.Timing-based patternsfor the counter manipulation attack.

We use a simplified example(Fig.4)to illustrate the attack.If an attacker obtains a series of successive double-peak phenomenon(Fig.4a)with the input of data plane stream template 1,where v is a big value,and obtains a series of intermittent double-peak phenomenon(Fig.4b),where v is also a significant value.The attacker could determine that packet number volume-based statistic calculation approach is sensitive to streamwith a high pps.With thevariationsof v and p,thecritical value of volumecan be inferred tohelp conduct the attack.

4 Flood Shield:Defending Data-to-Control Plane Saturation Attacks

Floodshield[7]isa SDNdefenseframework against thedatato-control saturation attacks by combining two modules,i.e.,source address validation and stateful packet supervision.The former validates the source addresses of the incoming traffic and filters the forged packets directly in the data plane,since attackers tend to commit attacks with a forged source address to hide the locations of attack sources.Based on it,the last module monitorsthepacket statesof each real addressand performs network service differentiation according to the evaluation scores and network resource usage.

As depicted inFig.5,the source address validation module works when a host connects to the SDN-enabled network.By snooping the address assignment mechanism procedure,the module maintainsaglobal Binding Tableat thecontroller torecord the mapping between end hosts and their IP addresses.Based on the table,the module then takes advantage of the multi-table pipeline of OpenFlow to install filter rules in table 0 and install normal flow rules in the following tables.Packets with forged IP addresses are dropped in table 0 while trusted packetsaredirectly forwarded tothenon-filter flow tables.

Since packets with real source addresses could also be harnessed to conduct attacks,a stateful packet supervision module is introduced to distinguish flows by traffic features and achieve differentiated services for different user dynamically.The module takes packet-in rate and average flow length as two metrics to evaluate user behavior.Users are divided into three levels according to their evaluation scores and allocated with different priorities.Flows with a high priority are processed as usual while those with a lower priority are limited on therateor even dropped.

5 SWGuard:Defending Control Plane Reflection Attacks

The basic idea of SWGuard[8]is to discriminate good from evil,and prioritize downlink messages with discrimination results.SWGuard introduces a multi-queue scheduling strategy to achieve different latency for different downlink messages.The scheduling strategy is based on the statistics of downlink messages during the last period,which takes both fairness and efficiency into consideration.When the downlink channel is becoming congested,the malicious downlink messages are inclined to be put into a low-priority scheduling queue and the requirements of good messages are more likely to be satisfied.As shown in Fig.6,SWGuard mainly redesigns two compo-nents of SDN architecture.On the switch side,it changes the existing software protocol agent to multi-queue based structures.On the controller side,it adds a Behavior Monitor module as a basic service which assigns different priorities to different messages dynamically.

▲Figure5.Framework Design of FloodShield.

▲Figure6.Framework Design of SWGuard.

SWGuard redesigns the software protocol agent of the existing switch to prioritize the downlink messages.Since different types of downlink messages have diverse requirements,SWGuard summarizes the downlink messages into four categories:1)Modify State Messages,2)Statistic Query Messages,3)Configuration Messages,and 4)Consistency Required Messages.It also designs a Classifier to classify the downlink messages into different queues accordingly.The first two types are related to behaviorsof hostsand applicationswhich aresensitivetolatency and order,so a multi-queue is allocated for each.The latter two types inherit from the original single queue.With messages in the queues,a Scheduler is designed to dequeue the messages with a time-based scheduling algorithm.For queues with the highest priority are dequeued immediately,messages are dequeued immediately as they arrive.However,for queues with lower priority,different time interval is added to messages beforedequeued.

To distinguish different downlink messages with different priorities,SWGuard proposes the novel abstraction of Host-Application Pair(HAP)and use it as the granularity for monitoring and statistics.Packets are recorded for each application of each user.Assuming there are K applications in the control plane,and N hostsin the data plane,packets should be categorized into K×N groups.SWGuard is designed as attack-driven.When the number of downlink messages in a period is less than a threshold,all packets are allocated with the highest priority.When the reflection attacks are detected,the SWGuard starts to calculate the penalty coefficient for each HAPby comparing their required resources with their real resource occupation.According to the coefficient,downlink messages are enqueued into queues with different priorities.Besides,multiqueues based software protocol agent may violate the consistency of some messages,which need to be sent in a particular order for correctness reasons.To address this issue,a coordination mechanism between the Behavior Monitor and Classifier in softwareprotocol agent isdesigned.

6 Conclusions

While SDNhasoffered new opportunitiestonetwork automation and innovations,it has also introduced new security concerns.Securing the network infrastructure is crucial to the promotion and adoption of SDN.In thisarticle,wereviewtwo SDN-targeted attacks,data-to-control saturation attacks,and control plane reflection attacks,along with the corresponding defense frameworks,F(xiàn)loodShield and SWGuard.The two attacks are both targeted at limited resources of SDN infrastructure,especially resources and limited processing capability of the data plane.Since hardware switching systems share many common designs like TCAM-based flow table,the SDN-targeted attacks also provide new perspectives to the security of other emerging architecture,e.g.theprogrammabledataplane[10].

主站蜘蛛池模板: 亚洲乱亚洲乱妇24p| 色九九视频| 91啪在线| 亚洲伊人天堂| 日韩小视频网站hq| 成人va亚洲va欧美天堂| 亚洲高清资源| 91在线精品麻豆欧美在线| 大陆精大陆国产国语精品1024 | 国产91高清视频| 亚洲中文无码av永久伊人| 高h视频在线| 强奷白丝美女在线观看| 国产自在线播放| 亚洲欧美日韩视频一区| 亚洲天堂网2014| 国产欧美日韩精品综合在线| 久久精品一品道久久精品| 亚洲综合第一页| 亚洲国产精品不卡在线| 国产特一级毛片| 久久99精品久久久久久不卡| 韩日免费小视频| 伊人色天堂| av色爱 天堂网| 视频二区中文无码| 欧美三級片黃色三級片黃色1| 97se亚洲综合| 国产无码性爱一区二区三区| 99re视频在线| 天堂亚洲网| 国产一级毛片网站| 国产簧片免费在线播放| 国产女同自拍视频| 天天操精品| 制服丝袜一区| 无码高潮喷水在线观看| 国产国产人成免费视频77777| 亚洲国产精品无码AV| 91口爆吞精国产对白第三集| 国产精品免费电影| 亚洲欧美不卡视频| 婷婷午夜天| 日韩a在线观看免费观看| 色一情一乱一伦一区二区三区小说| 久操中文在线| 日本一区二区三区精品视频| 久久香蕉欧美精品| www成人国产在线观看网站| 欧美日本中文| 全裸无码专区| 波多野结衣亚洲一区| 老熟妇喷水一区二区三区| 亚洲午夜国产精品无卡| 国产办公室秘书无码精品| 视频一区亚洲| 亚洲伦理一区二区| 中文字幕天无码久久精品视频免费 | 欧美怡红院视频一区二区三区| 久久综合亚洲鲁鲁九月天| 国产青榴视频| 欧美日韩久久综合| 毛片基地美国正在播放亚洲| 2021无码专区人妻系列日韩| 亚洲精品色AV无码看| 久久香蕉国产线看观看式| 国产一区二区在线视频观看| 欧美成人精品一级在线观看| 国产在线观看第二页| 欧美亚洲欧美区| 国产69精品久久久久妇女| 国产香蕉97碰碰视频VA碰碰看| 天天躁夜夜躁狠狠躁图片| 亚洲精品视频免费观看| 日韩欧美中文字幕一本| A级全黄试看30分钟小视频| 视频二区亚洲精品| 99爱在线| 亚洲最新地址| 视频二区亚洲精品| 99re在线视频观看| 人妻丰满熟妇av五码区|