Taxonomic Modeling of Security Threats in Software Defined Networking. Jennia Hizver PhD in Computer Science



Similar documents
Taxonomic Modeling of Security Threats in Software Defined Networking

Basics of Internet Security

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Potential Targets - Field Devices

Security Implications Associated with Mass Notification Systems

Cloud Computing Governance & Security. Security Risks in the Cloud

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Windows Remote Access

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Name. Description. Rationale

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

FISMA / NIST REVISION 3 COMPLIANCE

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT

PCI Compliance for Cloud Applications

Evaluation Report. Office of Inspector General

SDN AND SECURITY: Why Take Over the Hosts When You Can Take Over the Network

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

SUPPLIER SECURITY STANDARD

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010

The Protection Mission a constant endeavor

GFI White Paper PCI-DSS compliance and GFI Software products

Department of Education. Network Security Controls. Information Technology Audit

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Defending Against Data Beaches: Internal Controls for Cybersecurity

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Office of Inspector General

Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples

Goals. Understanding security testing

DIVISION OF INFORMATION SECURITY (DIS)

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014

Discovering passwords in the memory

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

Not for distribution or reproduction.

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Data Security Incident Response Plan. [Insert Organization Name]

Chap. 1: Introduction

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE

Industrial Communication. Securing Industrial Wireless

Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

QuickBooks Online: Security & Infrastructure

Juniper Networks Secure

The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements:

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

Meeting the Challenges of Virtualization Security

HIPAA Privacy & Security White Paper

Ohio Supercomputer Center

Penetration Test Report

Intro to Firewalls. Summary

HIPAA Compliance Evaluation Report

State of Texas. TEX-AN Next Generation. NNI Plan

Passing PCI Compliance How to Address the Application Security Mandates

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0

Database Security & Auditing

Secure Software Programming and Vulnerability Analysis

Application Intrusion Detection

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

UF Risk IT Assessment Guidelines

Attachment A. Identification of Risks/Cybersecurity Governance

An Introduction to Network Vulnerability Testing

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

COSC 472 Network Security

What is Penetration Testing?

Voltage SecureData Web with Page-Integrated Encryption (PIE) Technology Security Review

Security Testing Summary of Next-Generation Enterprise VoIP Solution: Unify Inc. OpenScape SBC V8

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

PENTEST. Pentest Services. VoIP & Web.

Locking down a Hitachi ID Suite server

Big Data, Big Risk, Big Rewards. Hussein Syed

Closing Wireless Loopholes for PCI Compliance and Security

Penetration Testing Report Client: Business Solutions June 15 th 2015

NIST National Institute of Standards and Technology

Virtualization System Security

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

Hong Kong Baptist University

Network Security Audit. Vulnerability Assessment (VA)

What is Web Security? Motivation

Chapter 6: Fundamental Cloud Security

An overwhelming majority of IaaS clouds leverage virtualization for their foundation.

IoT & SCADA Cyber Security Services

NERC CIP VERSION 5 COMPLIANCE

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

What is Management Responsible For?

Abusing Software Defined Networks. DefCon 22, Las Vegas 2014

Transcription:

Taxonomic Modeling of Security Threats in Software Defined Networking Jennia Hizver PhD in Computer Science

SDN Adoption Rates SDN Attack Surface SDN Threat Model Attack Examples Threat Mitigation Agenda

SDN Adoption Rates By the end of 2016, more than 10,000 enterprises worldwide will have deployed SDN in their networks (Gartner, 2014) 75% of the surveyed companies planned on SDN deployments in the next 5 years (Gartner, 2014) The worldwide SDN market will reach $8 billion by 2018 (International Data Corporation, 2014)

Security of SDN Limited knowledge on SDN vulnerabilities, threats, and attacks Increased architecture complexity => increased risk Vendors jumping on the SDN bandwagon => no time for secure SDLC No existing SDN threat identification framework

SDN Attack Surface Management APP APP APP Application Plane NBI CTRL CTRL CTRL Controller Plane SBI Data Plane MGI EWBI APP: application CTRL: controller NE: network element : manager SBI: Southbound interface EWI: east/westbound interface NBI: northbound interface MGI: management interface

SDN Threat Characterization Threat source -source triggering the vulnerability Vulnerability source -a SDN component where the vulnerability arises Threat action -by which a threat is carried out Threat Source Threat Action Vulnerability Source

Threat Sources Non-SDN APP APP APP ROGUE CTRL CTRL CTRL CTRL NE APP: application CTRL: controller NE: network element : manager

Vulnerability Sources APP APP APP CTRL CTRL CTRL APP: application CTRL: controller NE: network element : manager

Threat Actions A threat is any event with the potential to adversely impact organizational operations and assets through an information system via unauthorized access, destruction, disclosure, or modification of information, and/or denial of service. -NIST Special Publication 800-30 Threat Actions: Unauthorized access (ACC) Unauthorized disclosure (DISC) Unauthorized modification (MOD) Disruption of service (DISR) Unauthorized destruction (DEST)

Many-To-Many Relationships Threat Source EXT APP CTRL NE ROG Threat Action ACC DISC MOD DISR DEST Vulnerability Source APP NBI CTRL EWI SBI NE MGI

Unauthorized Access An attacker conducts a password brute-forcing or password guessing attack EXT ACC Non-SDN APP APP APP CTRL CTRL CTRL

Unauthorized Access An attacker exploits a software vulnerability to achieve unauthorized access ACC APP APP APP APP CTRL CTRL CTRL

Disclosure of Information An attacker scans the physical memory to extract flow rules APP DISC APP APP APP APP CTRL CTRL CTRL

Disclosure of Information An attacker exploits an API vulnerability to harvest information about flow rules APP DISC NBI APP APP APP CTRL CTRL CTRL

Unauthorized Destruction An attacker exploits an API vulnerability to delete flows APP DEST NBI APP APP APP CTRL CTRL CTRL

Unauthorized Access An attacker with limited privileges exploits a software vulnerability to escalate her privileges APP ACC APP APP APP APP CTRL CTRL CTRL

Disclosure of Information An attacker intercepts communications to gain access to transmitted information APP DISC EWBI APP APP APP CTRL CTRL CTRL

Unauthorized Modification An attacker conducts an identity spoofing attack ROG MOD NE APP APP APP ROGUE CTRL CTRL CTRL CTRL

Disruption of Service An attacker exploits a software vulnerability to cause DoS DISR CTRL NE APP APP APP CTRL CTRL CTRL

Disclosure of Information A attacker tries to determine if a flow rule exists using a side channel attack DISC NE APP APP APP CTRL CTRL CTRL

Disruption of Service The attacker leverages a compromised network element to flood a controller NE DISR CTRL APP APP APP CTRL CTRL CTRL

Unauthorized Modification A malicious user attempts to poison the controller s view of the network topology NE MOD CTRL APP APP APP CTRL CTRL CTRL

Threat Mitigation Determine what threats have to be mitigated Specify security requirements to address the threats Implement the mitigation measures

Threat Mitigation Examples TH: Conduct brute force login attempts/password guessing attacks against the management console SR: A management console shall not allow any user to successfully use a password guessing attack to gain unauthorized access MM: All vendor default passwords for management consoles should be changed TH: Exploit a known information disclosure vulnerability in the NBI. SR:An application shall not allow any user to successfully exploit a vulnerability to access information which the user is not authorized to access MM: All application server patches should be applied in a timely manner

Threat Mitigation Examples TH: Conduct communications interception attack against the EWI SR: The east/west bound interface shall not allow unauthorized users to eavesdrop on network communications between the controllers MM: The east/west bound communication channels should be protected using strong cryptography TH: Cause a denial of service on a controller SR:A controller shall not allow any network element to successfully use a denial of service attack to reduce its availability MM: Rate limiting and packet dropping at the controller plane to avoid denial of service attacks. Specific rules should be installed on the network elements where the attack is being originated.

High-Level Recommendations Allow only required ports and services in the controller Limit the number of accounts requiring direct access to the controller Implement HA controller architecture Integrate the SDN specific user accounts with the enterprise IM infrastructure Place the management interfaces in a dedicated virtual network segment Implement SDN patch management practices Use strong encryption to protect SDN communication channels Follow secure coding practices for all applications Validate NE flow tables against the controller to identify discrepancies Implement integrity checks on controllers Implement security monitoring and security policy enforcement of SDN elements Enable logging and audit trails

BlackHat Sound Bytes Our current knowledge on SDN threats and attacks is limited. To better anticipate potential SDN threats at the early design stage, enterprises could use the presented SDN threat model The proposed framework could be further extended by incorporating the details of specific SDN designs. It could also serve as a foundation for planning and carrying out SDN penetration tests The model enables comprehensive development of security requirements and mitigation measures to increase the state of preparedness in the event of attacks on SDN