OpenFlow Vulnerability Assessment
|
|
|
- Annice Lynch
- 10 years ago
- Views:
Transcription
1 OpenFlow Vulnerability Assessment Kevin Benton School of Informatics and Computing Indiana University Bloomington, Indiana, USA L. Jean Camp School of Informatics and Computing Indiana University Bloomington, Indiana, USA Chris Small School of Informatics and Computing Indiana University Bloomington, Indiana, USA ABSTRACT In this paper, we provide a brief overview of the vulnerabilities present in the OpenFlow protocol as it is currently deployed by hardware and software vendors. We show that there has been a widespread failure to adopt TLS protection for the OpenFlow control channel by both controller and switch vendors, leaving OpenFlow vulnerable to manin-the-middle attacks. We also highlight the classes of vulnerabilities that emerge from the separation of the control plane and data planes in OpenFlow network designs. We illustrate that, due to the centralized design of the network, special care must be taken to avoid denial of service vulnerabilities in OpenFlow applications. Finally, we offer suggestions to address the vulnerabilities and paths for future work to secure OpenFlow networks. Categories and Subject Descriptors C.2.6 [COMPUTER-COMMUNICATION NET- WORKS]: Internetworking General Terms Security, Software-Defined Networking Keywords OpenFlow, Vulnerabilities, Denial-of-Service 1. INTRODUCTION OpenFlow [20] and other software defined network protocols have generated interest due to the amount of control they offer developers of network control software. By creating a standardized, network-accessible interface to control the data-plane of network equipment, control-plane logic can be moved from individual network devices to a centralized controller or group of controllers. By implementing the control logic in the controller, network protocol changes and complex traffic engineering requirements can be accommodated by re-configuring, updating or swapping out the controller instead of upgrading or replacing the network hardware. 1.1 OpenFlow Protocol The OpenFlow specification defines a protocol to communicate with a network device and control the operation of its data plane. The data plane is controlled by providing rules (referred to as flows) to the network devices (referred to as switches). Each flow specifies a condition to match incoming packets and an instruction to be applied to matched packets. As the specification has evolved, the available operations and matching criteria have become more complicated (e.g. queuing control for quality of service and matching against multiple flow tables), but the basic idea of matching a rule and performing an action has remained the same. There are two general styles of rule creation in Open- Flow networks: proactive, in which rules are inserted into switches before they are needed; and reactive, in which rules are inserted into switches in response to packets observed by the controller via Packet-In messages. In reactive networks, the switch generates a Packet-In message in response to a packet that does not match a rule, which encapsulates the packet and sends it to the controller for a decision to be made. The controller can then either acknowledge the message and ignore the packet, or respond with an action to apply to the packet along with an optional rule to install into the switch s flow-table to match future packets. When strictly adhering to the specification, the flow rules for a switch can only be installed by an Open- Flow controller over a TCP connection initiated by the switch. However, some switches support an additional listener mode, in which they accept connections to a configured TCP port from any network source [7]. These externally initiated connections can also be used to write rules to switches and read information from them. This mode of operation allows for easy debugging and verification of rule states without adding load or complexity to controllers. However, it introduces a major vulnerability because it has no built-in authentication or access control methods. The communications between the controller and switches are carried over a TCP connection that can optionally be protected by TLS with mutually authenticated certificates signed by a private key generated by the site 1
2 Figure 1: In-band vs. Out-of-band. (The dashed lines represent OpenFlow controlled links) (i.e. a root certificate). The TCP connection is initiated by the switch (barring the non-standard listener mode mentioned above) with an operator-configured setting that specifies the IP address and TCP port of the controller. There have been discussions on the official mailing lists since 2009 [2] to include a controller discovery protocol in the standard, but the latest version (v1.3) still specifies manual configuration only [8]. There are two general methods of handling the Open- Flow traffic between the switches and controller, which are referred to as in-band and out-of-band control. In the out-of-band control deployments, the switches have network paths to communicate with the controller that are not affected by the operation of OpenFlow. This requires the configuration of VLANs or separate physical interfaces that don t have OpenFlow rules applied to them. Conversely, in in-band control configurations, the switches use the OpenFlow network both to carry data and to communicate with the controller. Figure 1 illustrates the difference between the two. 2. RELATED WORK There have been several papers focused on creating secure networks using OpenFlow. FRESCO [23] operates on top of the NOX controller and provides a programming framework to execute and link together security related applications. Jafarian et. al [18] developed a system using OpenFlow that makes the IP addresses of internal hosts appear to change frequently to external networks to make network reconnaissance and attacks difficult. NICE [17] uses OpenFlow to build a DDoS detection and mitigation system for large infrastructureas-a-service cloud providers. However, these works are focused on providing security to networks controlled with OpenFlow and rely on the assumption that the underlying OpenFlow network is secure. FortNOX [21] was developed as an extension to the NOX OpenFlow controller to deal with conflicting and possibly malicious OpenFlow applications by adding rolebased authorization and constraints to the permitted rules that an OpenFlow application can send to switches. In this case, an application could be anything that wants to modify, record, duplicate, or block network traffic using OpenFlow (e.g. firewalls, intrusion prevention systems, traffic logging, etc.). In a similar context, FlowVisor [22] acts as a mediator between controllers and switches to apply limitations to the rules created by controllers. It does this by rewriting the rules generated by the controllers to restrict their effect to a specific slice of the network. These slices can be defined by physical ports, or by packet headers (e.g. only traffic on TCP port 80). In this case, the difference between FortNOX and FlowVisor is that FlowVisor runs separately from the controller (normally on a different host), where FortNOX is a single controller that executes many concurrent applications. Both of these applications focus on restricting untrusted controllers or applications running on controllers; however, there has not been any work published examining the vulnerabilities that emerge from OpenFlow network designs or vulnerabilities with the protocol. Our work examines these vulnerabilities. 3. VULNERABILITY ANALYSIS 3.1 Lack of TLS Adoption The original OpenFlow specification (v1.0) required the control channel between the controllers and switches to be protected using TLS [3]. However, the subsequent specifications, including the current one (v1.3.0), removed the requirement and made it an optional feature [8]. Using TLS has a higher technical barrier for operators due to the steps required to configure it correctly, which include the following: generating a sitewide certificate, generating controller certificates, generating switch certificates, signing the certificates with the site-wide private key, and finally installing the correct keys and certificates into all of the devices. Comparatively, the plaintext operation only requires a single configuration parameter (the controller address) to function, which may incentivize network administrators to skip TLS completely. Due to the rapidly evolving nature of OpenFlow, many vendors of both switches and controllers have not fully implemented the specification and have skipped the TLS portion entirely. Table 1 and 2 show the current TLS support for many popular OpenFlow switches and controllers. There is a noticeable lack of support from both sides, which consequently deters both sides from spending significant effort implementing it. For example, when referring to TLS support, one of the developers for the Floodlight controller wrote, it would be pretty trivial to add it if there was sufficient interest and that the lack of demand for the feature was due to limited support from the switches [6]. 2
3 Switch Vendor TLS Support HP No [7] Brocade No Dell No NEC Partial 1 Indigo No Pica8 No OpenWRT Yes [10] Open vswitch Yes [5] Table 1: TLS Support by OpenFlow Switch Vendor OpenFlow Controller TLS Support NOX Controller only 2 POX No [14] Beacon No [11] Floodlight No [6] MuL No [13] FlowVisor No 3 Big Network Controller No 4 Open vswitch Controller Yes [5] Table 2: TLS Support in Popular OpenFlow Controllers The lack of TLS support and lack of motivation to implement it leaves an avenue for attackers to infiltrate OpenFlow networks and remain largely undetected. While this might be infeasible for some physically secure networks, such as data-centers where access to switches is difficult for adversaries, it becomes a greater concern in campus-style and remote-office deployments in which switches are deployed to less-monitored locations easier to access without detection (e.g. closets, offices, outdoor junction boxes, etc). It could even be the case that the OpenFlow traffic is carried by an inherently adversarial ISP (e.g. a remote office in a foreign country interested in eavesdropping). Once an attacker can place a device between the controller and the switch to intercept OpenFlow traffic, he/she could insert additional rules into the switch to record/modify sensitive traffic, gain access to protected segments of the network, interfere with other devices access, and even control all down-stream switches from 1 Only on the IP8800 model 2 The controller can be configured with TLS and a certificate for switches to verify but it does not authenticate switches [1]. 3 The RPC Interface for configuring FlowVisor supports TLS; however, the connections to the switches and controllers currently do not [15]. 4 Big Network Controller (from Big Switch Networks) is built on top of the Floodlight controller [12] and has not made public any datasheets, advertisements, or configuration guides that indicate that they added TLS support. the controller. Additionally, this can all be done with no observable difference to the controller because the adversary can modify the OpenFlow messages coming from the switches to hide the malicious flows in the same way FlowVisor does to isolate network slices [22]. While this type of attack is possible with traditional network equipment, it is difficult to make configuration changes to the devices and correctly spoof the responses to network management software to conceal the change due to the varying nature of SNMP OIDs 5 and configuration formats between vendors. OpenFlow greatly reduces this technical barrier by standardizing statistics gathering and flow management between all vendors. The risks posed by a successful man-in-the-middle attack in an in-band managed OpenFlow network are arguably worse than a regular network due to the ability for the attacker to immediately reconfigure all of the down-stream switches. In a normal network, an attacker would have to wait until an operator logs into the management interface of each down-stream switch using an insecure protocol (e.g. Telnet, SNMPv2) to capture the credentials. However, due to the constant connectivity and lack of authentication in the plaintext Open- Flow TCP control channel, an attacker can immediately seize full control of any down-stream switches and execute very fine-grained eavesdropping attacks that would be difficult to detect. For example, in figure 2, the attacker could pass Open- Flow traffic between the controller and the lower switches as normal, but install an additional rule in switch 3 that duplicates any database traffic between the two hosts and sends it to a remote host. With a normal network, duplicating the specific traffic between two hosts connected to a switch and passing the traffic along to a remote host would require a complex reconfiguration of each switch after waiting to capture administrative credentials, possibly even requiring features that many switches don t have (e.g. GRE encapsulation, TCP header matching). While this type of attack was technically achievable before, OpenFlow drastically lowered the difficulty level to the point where it could easily be automated and packaged into malware. It eliminated both the heterogeneity in the interfaces for network reconfiguration and the time-consuming requirement of capturing management credentials. The risk of these types of attacks is greatly exacerbated if a switch is left configured with a passive listening port. It eliminates the requirement for the attacker to conduct the initial man-in-the-middle attack. By simply discovering a switch with a passive listening port via network scanning, the attacker can dump the 5 An SNMP OID is a object identifier for use in the simple network management protocol. Vendors often have custom OIDs for managing proprietary aspects of their devices. 3
4 Figure 2: Man-in-the-middle Attack in an Inband OpenFlow Network flows to conduct additional reconnaissance and then insert rules to hijack downstream switches, capture traffic passing through the switch, and/or configure it to act as a proxy for further attacks. Even when TLS is implemented, failure to implement switch authentication in the controller (e.g. NOX) can allow an attacker to perform network reconnaissance by observing how the controller responds to different packets. Additionally, depending on the logic in the controller application, an attacker could potentially take down portions of the network or receive sensitive traffic by pretending that it has hosts attached to it that are present elsewhere in the network, causing the controller to redirect traffic towards the malicious switch. 3.2 Flow Enforcement Due to the lack of TLS, there is no way for a controller to verify that switch flow tables are configured with the expected rules. This is demonstrated by FlowVisor [22], which acts as a proxy between OpenFlow switches and multiple controllers to provision slices of the network for individual controllers to control. FlowVisor accepts rules from controllers and re-writes them so the resulting rules only affect the slices of the network that a given controller is allowed to control. For example, a controller may be given the network slice comprised of all traffic to and from an organization s web servers. This controller might then create a rule to drop all UDP traffic in response to a denial-of-service attack. When FlowVisor receives this rule, it will rewrite it to drop all UDP traffic to and from the web servers, leaving the rest of the network unaffected. In traditional networking hardware, hijacking control plane messages is very unlikely because the messages traverse a backplane physically internal to the networking hardware. There were no external interfaces exposing the control network. A full TLS implementation could help guarantee the safety of the messages between the two; however, it wouldn t help detect switches that erroneously insert/remove additional or incorrect rules. Additionally, tracking the state changes of the flow-table for each switch by recording all of the flowremoved messages generated by switches requires extra logic on the controller, especially when faced with handling power outages or other temporary network outages. This doesn t necessarily expose any exploitable vulnerabilities. However, it can lead to a condition where the controller has a different view of how traffic will flow through the network, which in turn could lead to a temporary vulnerability, network outage, or other unexpected behavior. Currently, the only way to verify the rules is by frequently dumping and inspecting the flow tables from each switch, which can be computationally costly for the switches along with the controller if it is monitoring a significant number of switches. A potential solution could be a simple checksum of all of the rules in the flow table that the switch includes in the keep-alive messages to the controller. This would provide a fast way for a controller to see if the network flow-state changed unexpectedly, at which point it could dump the flows on the switch to see what changed. 3.3 Denial of Service Risks By centralizing the control plane, a new critical point of failure is introduced into the network. This can be mitigated by the use of multiple controllers (e.g. Onix [19]), but without careful rule design, controllers can be exposed to denial of service attacks. When a switch receives a packet that doesn t match a flow, it applies the table-miss flow to it, which defines an action to perform on these un-matched packets. In proactive networks, the design might not care about these packets and configure the table-miss rule to drop them. However, reactive networks and some proactive networks that require the controller to know about such packets will require the table-miss rule to generate a Packet-In message, which encapsulates the received packet and forwards it to the controller. The controller must either acknowledge the message and drop the packet, or respond with an action to apply to the packet along with an optional rule to install to match similar packets in the future. If an adversary can consistently cause Packet-In messages, he/she could quickly inundate the controller with a large volume of traffic - making it unavailable to make decisions about the rest of the network. Similarly, if the adversary can consistently cause new rule generation (i.e. Flow-Mod messages), the rules can fill the flow table on the switch and cause legitimate traffic on that switch to be dropped. Even if the controller takes this into account and implements logic to remove flows from the switch as it fills up, the slow processing of Flow- Mod messages by some switches (<10 per second [9]) 4
5 can result in it falling far behind the changes requested by the controller DoS Vulnerabilities in POX layer 2 learning switch A simple illustration of the DoS vulnerabilities that arise from an OpenFlow reactive rule design can be found in the layer 2 learning switch that is included with the POX controller [4]. The rule design is intuitive for a learning switch, but it contains the following denial of service vulnerabilities that affect the controller and the switch: The controller instructs the switches to flood multicast without installing a rule to match future multicast packets. Therefore, every multicast packet is sent to the controller, leaving an attacker a direct avenue to DoS the controller with a traffic flood to a multicast address. Traffic to unknown MAC addresses is flooded without a rule insertion or a limit counter, creating another controller DoS vulnerability. The mapping the application maintains of MAC addresses to ports is based solely on the received packet, so it has no protection against MAC spoofing. Since this application inserts rules into switches based on source MAC addresses, an attacker can generate an unlimited number of rules, quickly filling up a switch s flow-table by crafting packets with random source MAC addresses destined to a known network host. Additionally, since the mapping has no age-out or removal mechanism, an attacker could fill the memory of the controller by generating lots of traffic from random MAC addresses to other unknown MAC addresses on the network, which results in added mappings, but no new flows. Even for an application as simple as this one, protecting it requires implementing MAC spoofing protection through port counters (with timers if network flexibility is required), rate limiters for traffic to unknown hosts, and switch rules for multicast. In normal networks, network devices have specialized firmware designed to deal with the known vulnerabilities of the protocols it supported. For example, most modern enterprise Ethernet switches have code that offers ARP poisoning protection, DHCP snooping, broadcast/multicast rate limiting, and MAC address limits for ports. In OpenFlow networks, all of these basic protections are left up to the controller. While it is possible to do, it places the burden of implementing complex security protections on the developers of the OpenFlow applications, who may not even be aware of these attacks, let alone the protections required to stop them. The majority of these DoS issues impact networks that use reactive rules. Networks based on proactive rule insertion do not have the same exposure to DoS attacks as long as there is no traffic that can generate arbitrary Packet-In events. However, the switches are still vulnerable to a DoS caused by excessive flow insertions/modifications from the controller so special care has to be taken by application developers to avoid conditions that cause excessive Flow-Mod messages. The OpenFlow 1.3 specification [8] briefly suggests policing packets destined to the controller; however, it indicates that it is outside the scope of the specification. It provides no guidance for rate limiting messages to the controller, nor rule-insertions to the switches, leaving DoS protection entirely up to the controller developers. 3.4 Controller Vulnerabilities By placing OpenFlow applications that perform deep packet inspection and conversation reconstruction on the host responsible for the control of the entire network, application isolation/sandboxing becomes an integral part of network security. Without it, compromising one OpenFlow application could lead to adversarial control of the entire network. Just correctly parsing complex protocols can lead to vulnerabilities, as demonstrated by the long list of Wireshark dissector security advisories [16]. FortNOX [21] has addressed this problem by compartmentalizing OpenFlow applications. However, the rest of the controllers do not support this compartmentalization and assume the code they are running can always be trusted. 4. SUGGESTIONS AND FUTURE WORK The solution to the problems related to the lack of TLS is obvious on the surface, just implement TLS in all of the switches and controllers. However, this doesn t address the configuration cost it imposes on the network operators. An alternative to the plaintext mode could be to default to auto-generated keys and a trustof-first-use method of protection in the same manner as SSH. This could be configured to require that a network operator be present to verify the thumbprint of each device s public key the first time a switch connects to a controller. Alternatively, without network operator verification, it would still limit the window for a successful attack to the small time-frame between when the switch is connected to a network and before it has connected to the controller for the first time, affording significantly better security with no additional configuration required. Without pushing transport security as a default early on, OpenFlow risks repeating the errors of other insecure network management protocols (e.g. Telnet, SN- MPv2, TFTP) where The link should be physically secure was initially asserted as acceptable security. Many 5
6 current use-cases focus on the data-center and other tightly-controlled networks where assuming a low-cost, independent, physically-secure control channel is acceptable. However, one of the many potentials for Open- Flow is to control switches over the Internet to manage branch-office networks or to offer network management and security-as-a-service to other organizations. Without wide-spread adoption of strong protocol security, OpenFlow will be unable to expand into those roles. With regard to denial-of-service vulnerabilities, controller vendors need to emphasize the importance of rate-limiting and any rule-generation activity with the publication of guidelines for developers. However, this will have the inherent limitation of requiring extra effort by the developers to be successful. Native support by the controllers to recognize DoS attacks and insert rules to stop them could be a feasible short-term solution. A possible alternative solution and future work could be a tool that combines OpenFlow application code analysis and flow-table analysis to systematically identify the events and traffic that can generate Packet-In and Flow-Mod messages in order to warn the developer of potential DoS vulnerabilities so they can be addressed during development rather than after implementation. 5. CONCLUSION We illustrated the classes of vulnerabilities that affect OpenFlow networks based on the current specification and its widespread implementation by vendors. We showed that networks that rely heavily on Packet- In messages (i.e. reactive designs) can be exposed to denial-of-service attacks against the switches and controller(s) without complex rate-limiting logic in the controller. We also showed that TLS has been widely ignored by controller and switch vendors, making Open- Flow vulnerable to man-in-the-middle attacks. Finally, we suggested an additional trust-of-first-use alternative to reduce the configuration necessary to establish a secure OpenFlow network. Acknowledgments This material is based upon work supported, in part, by DARPA FA Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the DoD or Indiana University. 6. REFERENCES [1] nox-dev mailing list: Ssl controlling channel. https: //groups.google.com/forum/?fromgroups=#!searchin/ nox_dev/ssl$20/nox_dev/n641gladsla/hspbn8zsppcj, Jun [2] [openflow-spec] openflow 0.9 features list. openflow-spec/2009-may/ html, May [3] Openflow switch specification: Version openflow.org/documents/openflow-spec-v1.0.0.pdf, Dec [4] l2 learning: An l2 learning switch. forwarding/l2_learning.py, [5] Configuring open vswitch for ssl. openvswitch;a=blob_plain;f=install.ssl;hb=head, Aug [6] Floodlight-developers mailing list: Tls support. Jan [7] Hp switch software - openflow supplement. SupportManual/c /c pdf, Feb [8] Openflow switch specification: Version downloads/specification/openflow-spec-v1.3.0.pdf, Jun [9] Openflow/sdn: A new approach to networking. CenicOpenFlow submit.pdf, [10] Pantou : Openflow 1.0 for openwrt. org/wk/index.php/openflow_1.0_for_openwrt, Oct [11] Ssl - stanford openflow forums. https: //openflow.stanford.edu/forums/topic/210-ssl/page p 737 hl certificate fromsearch 1#entry737, Jul [12] Big network controller - big switch networks, inc. Mar [13] Mul - openflow controller. Feb [14] noxrepo/pox - github. Feb [15] Opennetworkinglab/flowvisor - github. Mar [16] Wireshark - security advisories. Feb [17] C. Chung, P. Khatkar, T. Xing, J. Lee, and D. Huang. Nice: Network intrusion detection and countermeasure selection in virtual network systems [18] J. H. Jafarian, E. Al-Shaer, and Q. Duan. Openflow random host mutation: transparent moving target defense using software defined networking. In Proceedings of the first workshop on Hot topics in software defined networks, HotSDN 12, pages , New York, NY, USA, ACM. [19] T. Koponen, M. Casado, N. Gude, J. Stribling, L. Poutievski, M. Zhu, R. Ramanathan, Y. Iwata, H. Inoue, T. Hama, et al. Onix: A distributed control platform for large-scale production networks. OSDI, Oct, [20] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner. Openflow: enabling innovation in campus networks. ACM SIGCOMM Computer Communication Review, 38(2):69 74, [21] P. Porras, S. Shin, V. Yegneswaran, M. Fong, M. Tyson, and G. Gu. A security enforcement kernel for openflow networks. In Proceedings of the first workshop on Hot topics in software defined networks, HotSDN 12, pages , New York, NY, USA, ACM. [22] R. Sherwood, G. Gibb, K. Yap, G. Appenzeller, M. Casado, N. McKeown, and G. Parulkar. Flowvisor: A network virtualization layer. OpenFlow Switch Consortium, Tech. Rep, [23] S. Shin, P. Porras, V. Yegneswaran, M. Fong, G. Gu, and M. Tyson. Fresco: Modular composable security services for software-defined networks. Internet Society NDSS (Feb. 2013). To appear,
SDN Security Design Challenges
Nicolae Paladi SDN Security Design Challenges SICS Swedish ICT! Lund University In Multi-Tenant Virtualized Networks Multi-tenancy Multiple tenants share a common physical infrastructure. Multi-tenancy
OpenFlow: Enabling Innovation in Campus Networks
OpenFlow: Enabling Innovation in Campus Networks Nick McKeown Stanford University Presenter: Munhwan Choi Table of contents What is OpenFlow? The OpenFlow switch Using OpenFlow OpenFlow Switch Specification
Information- Centric Networks. Section # 13.2: Alternatives Instructor: George Xylomenos Department: Informatics
Information- Centric Networks Section # 13.2: Alternatives Instructor: George Xylomenos Department: Informatics Funding These educational materials have been developed as part of the instructors educational
Software Defined Networking What is it, how does it work, and what is it good for?
Software Defined Networking What is it, how does it work, and what is it good for? slides stolen from Jennifer Rexford, Nick McKeown, Michael Schapira, Scott Shenker, Teemu Koponen, Yotam Harchol and David
Multiple Service Load-Balancing with OpenFlow
2012 IEEE 13th International Conference on High Performance Switching and Routing Multiple Service Load-Balancing with OpenFlow Marc Koerner Technische Universitaet Berlin Department of Telecommunication
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX
Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX Shie-Yuan Wang Hung-Wei Chiu and Chih-Liang Chou Department of Computer Science, National Chiao Tung University, Taiwan Email: [email protected]
OpenFlow and Onix. OpenFlow: Enabling Innovation in Campus Networks. The Problem. We also want. How to run experiments in campus networks?
OpenFlow and Onix Bowei Xu [email protected] [1] McKeown et al., "OpenFlow: Enabling Innovation in Campus Networks," ACM SIGCOMM CCR, 38(2):69-74, Apr. 2008. [2] Koponen et al., "Onix: a Distributed Control
Enabling Software Defined Networking using OpenFlow
Enabling Software Defined Networking using OpenFlow 1 Karamjeet Kaur, 2 Sukhveer Kaur, 3 Vipin Gupta 1,2 SBS State Technical Campus Ferozepur, 3 U-Net Solutions Moga Abstract Software Defined Networking
IINS Implementing Cisco Network Security 3.0 (IINS)
IINS Implementing Cisco Network Security 3.0 (IINS) COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using
How To Understand The Power Of The Internet
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach, Kurose, Ross Slides: - Course book Slides - Slides from Princeton University COS461
A denial of service attack against the Open Floodlight SDN controller
A denial of service attack against the Open Floodlight SDN controller Jeremy M. Dover Dover Networks LLC [email protected] Open Floodlight is an open-source software-defined network controller,
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
Software Defined Networks
Software Defined Networks Damiano Carra Università degli Studi di Verona Dipartimento di Informatica Acknowledgements! Credits Part of the course material is based on slides provided by the following authors
Cloud Computing Security: What Changes with Software-Defined Networking?
Cloud Computing Security: What Changes with Software-Defined Networking? José Fortes Center for Cloud and Autonomic Computing Advanced Computing and Information Systems Lab ARO Workshop on Cloud Security
SDN. What's Software Defined Networking? Angelo Capossele
SDN What's Software Defined Networking? Angelo Capossele Outline Introduction to SDN OpenFlow Network Functions Virtualization Some examples Opportunities Research problems Security Case study: LTE (Mini)Tutorial
Chapter 6: Fundamental Cloud Security
Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
Intro to Firewalls. Summary
Topic 3: Lesson 2 Intro to Firewalls Summary Basic questions What is a firewall? What can a firewall do? What is packet filtering? What is proxying? What is stateful packet filtering? Compare network layer
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Securing Local Area Network with OpenFlow
Securing Local Area Network with OpenFlow Master s Thesis Presentation Fahad B. H. Chowdhury Supervisor: Professor Jukka Manner Advisor: Timo Kiravuo Department of Communications and Networking Aalto University
Tutorial: OpenFlow in GENI
Tutorial: OpenFlow in GENI GENI Project Office The current Internet is at an impasse because new architecture cannot be deployed or even adequately evaluated [PST04] [PST04]: Overcoming the Internet Impasse
ProCurve Networking. Hardening ProCurve Switches. Technical White Paper
ProCurve Networking Hardening ProCurve Switches Technical White Paper Executive Summary and Purpose... 3 Insecure Protocols and Secure Alternatives... 3 Telnet vs. Secure Shell... 3 HTTP vs. HTTPS... 3
APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)
APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist [email protected] Specialties: Routing &
Security Challenges & Opportunities in Software Defined Networks (SDN)
Security Challenges & Opportunities in Software Defined Networks (SDN) June 30 th, 2015 SEC2 2015 Premier atelier sur la sécurité dans les Clouds Nizar KHEIR Cyber Security Researcher Orange Labs Products
Traffic-based Malicious Switch Detection in SDN
, pp.119-130 http://dx.doi.org/10.14257/ijsia.2014.8.5.12 Traffic-based Malicious Switch Detection in SDN Xiaodong Du 1, Ming-Zhong Wang 1, Xiaoping Zhang 2* and Liehuang Zhu 1 1 Beijing Engineering Research
Implementing Cisco IOS Network Security
Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles
Open Source Network: Software-Defined Networking (SDN) and OpenFlow
Open Source Network: Software-Defined Networking (SDN) and OpenFlow Insop Song, Ericsson LinuxCon North America, Aug. 2012, San Diego CA Objectives Overview of OpenFlow Overview of Software Defined Networking
Securing SDN deployments right from the start.
SDN Security Attack Vectors and SDN Hardening Network World http://www.networkworld.com/article/2840273/sdn/sdn-security-at... CORE NETWORKING AND SECURITY By Scott Hogg About! Scott Hogg is the CTO for
Network Security Fundamentals
APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer [email protected] Specialties: Network Security IPv6
A collaborative model for routing in multi-domains OpenFlow networks
A collaborative model for routing in multi-domains OpenFlow networks Xuan Thien Phan, Nam Thoai Faculty of Computer Science and Engineering Ho Chi Minh City University of Technology Ho Chi Minh city, Vietnam
OF-RHM: Transparent Moving Target Defense using Software Defined Networking
OF-RHM: Transparent Moving Target Defense using Software Defined Networking Haadi Jafarian, Qi Duan and Ehab Al-Shaer ACM SIGCOMM HotSDN Workshop August 2012 Helsinki, Finland Why IP Mutation Static assignment
Software Defined Networking
Software Defined Networking Richard T. B. Ma School of Computing National University of Singapore Material from: Scott Shenker (UC Berkeley), Nick McKeown (Stanford), Jennifer Rexford (Princeton) CS 4226:
Towards Secure Multi-tenant Virtualized Networks
Towards Secure Multi-tenant Virtualized Networks Nicolae Paladi SICS Swedish ICT [email protected] Christian Gehrmann SICS Swedish ICT [email protected] Abstract Network virtualization enables multi-tenancy
PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ
PAVING THE PATH TO THE ELIMINATION A RSACCESS WHITE PAPER 1 The Traditional Role of DMZ 2 The Challenges of today s DMZ deployments 2.1 Ensuring the Security of Application and Data Located in the DMZ
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
General Network Security
4 CHAPTER FOUR General Network Security Objectives This chapter covers the following Cisco-specific objectives for the Identify security threats to a network and describe general methods to mitigate those
Cconducted at the Cisco facility and Miercom lab. Specific areas examined
Lab Testing Summary Report July 2009 Report 090708 Product Category: Unified Communications Vendor Tested: Key findings and conclusions: Cisco Unified Communications solution uses multilayered security
Limitations of Current Networking Architecture OpenFlow Architecture
CECS 572 Student Name Monday/Wednesday 5:00 PM Dr. Tracy Bradley Maples OpenFlow OpenFlow is the first open standard communications interface that enables Software Defined Networking (SDN) [6]. It was
ForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
Secure Networks for Process Control
Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
IP Link Best Practices for Network Integration and Security. Introduction...2. Passwords...4 ACL...5 VLAN...6. Protocols...6. Conclusion...
IP Link Best Practices for Network Integration and Security Table of Contents Introduction...2 Passwords...4 ACL...5 VLAN...6 Protocols...6 Conclusion...9 Abstract Extron IP Link technology enables A/V
SDN, OpenFlow and the ONF
SDN, OpenFlow and the ONF OpenFlow/Software-Defined Networking (SDN) OpenFlow/SDN is emerging as one of the most promising and disruptive networking technologies of recent years. It has the potential to
EventBus Module for Distributed OpenFlow Controllers
EventBus Module for Distributed OpenFlow Controllers Igor Alekseev Director of the Internet Center P.G. Demidov Yaroslavl State University Yaroslavl, Russia [email protected] Mikhail Nikitinskiy System
SDN and OpenFlow. Naresh Thukkani (ONF T&I Contributor) Technical Leader, Criterion Networks
SDN and OpenFlow Naresh Thukkani (ONF T&I Contributor) Technical Leader, Criterion Networks Open 2014 Open SDN Networking India Foundation Technology Symposium, January 18-19, 2015, Bangalore Agenda SDN
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Technical Note. ForeScout CounterACT: Virtual Firewall
ForeScout CounterACT: Contents Introduction... 3 What is the vfw?.... 3 Technically, How Does vfw Work?.... 4 How Does vfw Compare to a Real Firewall?.... 4 How Does vfw Compare to other Blocking Methods?...
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
Software Defined Networking What is it, how does it work, and what is it good for?
Software Defined Networking What is it, how does it work, and what is it good for? Many slides stolen from Jennifer Rexford, Nick McKeown, Scott Shenker, Teemu Koponen, Yotam Harchol and David Hay Agenda
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
Wedge Networks: Transparent Service Insertion in SDNs Using OpenFlow
Wedge Networks: EXECUTIVE SUMMARY In this paper, we will describe a novel way to insert Wedge Network s multiple content security services (such as Anti-Virus, Anti-Spam, Web Filtering, Data Loss Prevention,
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
Network Security through Software Defined Networking: a Survey
[email protected] 09/30/14 Network Security through Software Defined Networking: a Survey Jérôme François, Lautaro Dolberg, Olivier Festor, Thomas Engel 2 1 Introduction 2 Firewall 3 Monitoring
The Internet: A Remarkable Story. Inside the Net: A Different Story. Networks are Hard to Manage. Software Defined Networking Concepts
The Internet: A Remarkable Story Software Defined Networking Concepts Based on the materials from Jennifer Rexford (Princeton) and Nick McKeown(Stanford) Tremendous success From research experiment to
Security Technology White Paper
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24
Introduction to Computer Networks Lecture24 Network security (continued) Key distribution Secure Shell Overview Authentication Practical issues Firewalls Denial of Service Attacks Definition Examples Key
WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
Final exam review, Fall 2005 FSU (CIS-5357) Network Security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
Software Defined Networking Basics
Software Defined Networking Basics Anupama Potluri School of Computer and Information Sciences University of Hyderabad Software Defined Networking (SDN) is considered as a paradigm shift in how networking
IP Phone Security: Packet Filtering Protection Against Attacks. Introduction. Abstract. IP Phone Vulnerabliities
W H I T E P A P E R By Atul Verma Engineering Manager, IP Phone Solutions Communications Infrastructure and Voice Group [email protected] Introduction The advantages of a converged voice and data network are
Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka. www.ijreat.org
Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks Kruthika S G 1, VenkataRavana Nayak 2, Sunanda Allur 3 1, 2, 3 Department of Computer Science, Visvesvaraya Technological
iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi
iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi Agenda Introduction iscsi Attacks Enumeration Authorization Authentication iscsi Defenses Information Security Partners (isec) isec Partners Independent
Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2
Report No. 13-35 September 27, 2013 Appalachian Regional Commission Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning
A1.1.1.11.1.1.2 1.1.1.3S B
CS Computer 640: Network AdityaAkella Lecture Introduction Networks Security 25 to Security DoS Firewalls and The D-DoS Vulnerabilities Road Ahead Security Attacks Protocol IP ICMP Routing TCP Security
Improving Network Management with Software Defined Networking
Improving Network Management with Software Defined Networking Hyojoon Kim and Nick Feamster, Georgia Institute of Technology 2013 IEEE Communications Magazine Presented by 101062505 林 瑋 琮 Outline 1. Introduction
Programmable Network Using OpenFlow for Network Researches and Experiments
Programmable Network Using for Network Researches and Experiments HIDEyuki Shimonishi *, Yasuhito Takamiya *, Yasunobu Chiba *, Kazushi Sugyo *, Youichi Hatano *, Kentaro Sonoda *, Kazuya Suzuki *, Daisuke
How OpenFlow-based SDN can increase network security
How OpenFlow-based SDN can increase network security Charles Ferland, IBM System Networking Representing the ONF [email protected] +49 151 1265 0830 Important elements The objective is to build SDN networks
Xperience of Programmable Network with OpenFlow
International Journal of Computer Theory and Engineering, Vol. 5, No. 2, April 2013 Xperience of Programmable Network with OpenFlow Hasnat Ahmed, Irshad, Muhammad Asif Razzaq, and Adeel Baig each one is
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
ΕΠΛ 674: Εργαστήριο 5 Firewalls
ΕΠΛ 674: Εργαστήριο 5 Firewalls Παύλος Αντωνίου Εαρινό Εξάμηνο 2011 Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized
Outline. Institute of Computer and Communication Network Engineering. Institute of Computer and Communication Network Engineering
Institute of Computer and Communication Network Engineering Institute of Computer and Communication Network Engineering Communication Networks Software Defined Networking (SDN) Prof. Dr. Admela Jukan Dr.
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
FRESCO: Modular Composable Security Services for So;ware- Defined Networks
FRESCO: Modular Composable Security Services for So;ware- Defined Networks Seungwon Shin, Phil Porras, Vinod Yegneswaran, MarIn Fong, Guofei Gu, and Mabry Tyson SUCCESS LAB, Texas A&M and SRI Interna7onal
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
Solution of Exercise Sheet 5
Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????
Solutions for LAN Protection
Solutions Guide Solutions for LAN Protection Allied Telesis security features safeguard networks and mitigate attacks Introduction The increasing number of connected devices in today s networks has created
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
Future of DDoS Attacks Mitigation in Software Defined Networks
Future of DDoS Attacks Mitigation in Software Defined Networks Martin Vizváry, Jan Vykopal Institute of Computer Science, Masaryk University, Brno, Czech Republic {vizvary vykopal}@ics.muni.cz Abstract.
Basic Vulnerability Issues for SIP Security
Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] The Session Initiation Protocol (SIP) is the future
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Security Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
Vidder PrecisionAccess
Vidder PrecisionAccess Security Architecture February 2016 910 E HAMILTON AVENUE. SUITE 410 CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview... 3 II. Components...
LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks
LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks Moreno Ambrosin, Mauro Conti, Fabio De Gaspari, University of Padua, Italy {surname}@math.unipd.it
Security in Mellanox Technologies InfiniBand Fabrics Technical Overview
WHITE PAPER Security in Mellanox Technologies InfiniBand Fabrics Technical Overview Overview...1 The Big Picture...2 Mellanox Technologies Product Security...2 Current and Future Mellanox Technologies
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
PROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
Chapter 8 Router and Network Management
Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by
Software Defined Networking, openflow protocol and its controllers
Software Defined Networking, openflow protocol and its controllers OSS Technology Section II OSS Platform Technology Center Business Strategy Group SCSK LinuxCon Japan June 6 th, 2012 Agenda SDN and openflow
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Introduction: Cyber attack is an unauthorized access to a computer
