OrchSec: An Orchestrator-Based Architecture For Enhancing Network Monitoring and SDN Control Functions



Similar documents
SDN_CDN Documentation

Designing Virtual Network Security Architectures Dave Shackleford

Security Challenges & Opportunities in Software Defined Networks (SDN)

OpenDaylight Project Proposal Dynamic Flow Management

Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES

Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures Sungmin Hong, Lei Xu, Haopei Wang, Guofei Gu

Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre

An Introduction to Software-Defined Networking (SDN) Zhang Fu

Security of IPv6 and DNSSEC for penetration testers

Carrier/WAN SDN Brocade Flow Optimizer Making SDN Consumable

Scalable and Reliable control and Management for SDN-based Large-scale Networks. CJK CFI

Packet Sniffing on Layer 2 Switched Local Area Networks

SOFTWARE-DEFINED NETWORKING AND OPENFLOW

Towards Autonomic DDoS Mitigation using Software Defined Networking

Future of DDoS Attacks Mitigation in Software Defined Networks

Two State Intrusion Detection System Against DDos Attack in Wireless Network

Software Defined Networks

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

CS 356 Lecture 16 Denial of Service. Spring 2013

DoS: Attack and Defense

A Fuzzy Logic-Based Information Security Management for Software-Defined Networks

Network Security: Network Flooding. Seungwon Shin GSIS, KAIST

Network Security Demonstration - Snort based IDS Integration -

BEHAVIORAL SECURITY THREAT DETECTION STRATEGIES FOR DATA CENTER SWITCHES AND ROUTERS

SDN/Virtualization and Cloud Computing

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

A denial of service attack against the Open Floodlight SDN controller

SDN Architecture and Service Trend

Adaptive Distributed Traffic Control Service for DDoS Attack Mitigation

Introduction to DDoS Attacks. Chris Beal Chief Security Architect on Twitter

Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心

The server will respond to the client with a list of instances. One such attack was analyzed by an information security researcher in January 2015.

Improving Network Management with Software Defined Networking

What is SDN (Software Defined Networking) and Openflow? SDN/OF Part of Kernel / SoC to provide security, steering & monitoring

Network Virtualization and Application Delivery Using Software Defined Networking

A Presentation at DGI 2014 Government Cloud Computing and Data Center Conference & Expo, Washington, DC. September 18, 2014.

SOFTWARE-DEFINED NETWORKING AND OPENFLOW

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

SDN AND SECURITY: Why Take Over the Hosts When You Can Take Over the Network

Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka.

Analysis of a DDoS Attack

DNS amplification attacks

Brocade NetIron Denial of Service Prevention

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

SOFTWARE DEFINED NETWORKS REALITY CHECK. DENOG5, Darmstadt, 14/11/2013 Carsten Michel

What is SDN? And Why Should I Care? Jim Metzler Vice President Ashton Metzler & Associates

How To Write A Network Plan In Openflow V1.3.3 (For A Test)

Intrusion Detection Systems: A Formal Algorithmic approach

Exploring OpenDaylight

Acquia Cloud Edge Protect Powered by CloudFlare

Distributed Denial of Service (DDoS)

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

Distributed Denial of Service Attack Tools

SDN. What's Software Defined Networking? Angelo Capossele

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

Effective disaster recovery using Software defined networking

CloudFlare advanced DDoS protection

Software Defined Networking Seminar

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

ARP Storm Detection and Prevention Measures

Ten Things to Look for in an SDN Controller

DOMAIN NAME SECURITY EXTENSIONS

How Cisco IT Protects Against Distributed Denial of Service Attacks

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

SDN in the Public Cloud: Windows Azure. Albert Greenberg Partner Development Manager Windows Azure Networking

Software Defined Network (SDN)

A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack

Defining SDN. Overview of SDN Terminology & Concepts. Presented by: Shangxin Du, Cisco TAC Panelist: Pix Xu Jan 2014

DDoS Threat Report. Chris Beal Chief Security Architect on Twitter

On-Premises DDoS Mitigation for the Enterprise

How To Understand A Network Attack

Ethernet-based Software Defined Network (SDN)

Detection of Distributed Denial of Service Attack with Hadoop on Live Network

SDN Interfaces and Performance Analysis of SDN components

Linux KVM Virtual Traffic Monitoring

Distributed Denial of Service Attacks defenses and OpenFlow:

Using SDN-OpenFlow for High-level Services

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

Towards Secure and Dependable Software-Defined Networks

Recommended IP Telephony Architecture

Datacenter Transformation

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

TDC s perspective on DDoS threats

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

Trusting SDN. Brett Sovereign Trusted Systems Research National Security Agency 28 October, 2015

Attack and Defense Techniques

Software Defined Networking What is it, how does it work, and what is it good for?

Content Distribution Networks (CDN)

Mobility Management Framework in Software Defined Networks

Chapter 8 Security Pt 2

Software Defined Networks

OpenFlow, Network Function Virtualisation, Virtualised Network Function, Network Virtualisation, IEEE 802.1X, Authentication and Authorization.

Denial of Service Attacks

Software Defined Networking Security

Transcription:

OrchSec: An Orchestrator-Based Architecture For Enhancing Network Monitoring and SDN Control Functions 9 May 2014 Dr.-Ing. Kpatcha Bayarou Head, Mobile Networks Fraunhofer SIT Kpatcha.bayarou@sit.fraunhofer.de http://dgallery.s3.amazonaws.com/simulating_brain.jpg Fraunhofer-Gesellschaft 2011

Outline! Introduction! Architectural Design! Orchestrator-Based Security! Experimental Examination! Conclusion 2

Introduction! Many protocols of current Internet expose a set of vulnerabilities.! One of these protocols is the Address Resolution Protocol (ARP).! ARP is Stateless! It provides no mechanisms for reply authentication! These vulnerabilities led to threats such as:! ARP spoofing / cache poisoning! CAM table overflow! Null address attack! Services in the Internet are provided using a client-server model.! This later led to threats such as:! Denial of Service (DoS) / Distributed Denial of Service (DDoS)! Domain Name System (DNS) amplification 3

Introduction! Traditional approaches against these threats have their drawbacks.! Can Challenges Software in Defined traditional Networking DNS DoS ARP security amplification (SDN) address security these challenges?!! Horizontally Relies Distributed Changes on in attack network integrated the network prevention, management hosts with no reactive mitigation Plane ()!! Vendor-agnostic Limited Proprietary Hardware-based no middleboxes control over (e.g., network IDS) devices (i.e., Open DNS resolvers)!! Network Lack Detection-only of automated visibility without real-time attack response mitigation! Security as applications! Incomplete threat coverage! Automated traffic steering Data Plane (Switches)!! Centralized Proprietary management ARP Security Challenges! Changes in the network host! Hardware-based! Detection-only! Incomplete threat coverage! Proprietary! DoS Security Challenges! Decentralized network management! Proprietary middle-boxes (e.g., IDS)! Detection without mitigation! Performance bottlenecks! DNS Amplification Security Challenges! Relies on attack prevention, with no reactive mitigation! Limited or no control over network devices! Lack of Automated attack response 4

Introduction Security-Centric SDN! Using the features provided by SDN to improve or enable security in traditional networks.! The To solve research these done problems, in security-centric the following SDN adjustments has the following can be considered: problems:! Tight Develop coupling controller-agnostic of SDN applications applications to the (using controllers a Northbound-API)! Tight Decouple coupling network of network monitoring monitoring and control and control functions functions! Making Use multiple use of controllers only one SDN for a more controller reliable (i.e., and Single diverse Point architecture of Failure) APP APP APP APP APP APP Monitor Platform 1 n 5

Outline! Introduction! Architectural Design! Orchestrator-Based Security! Experimental Examination! Conclusion 6

Architectural Design Architectural Requirements Secure & reliable SDN architecture:! Using multiple controller instances for reliability and diversity. Flexibility in application development:! Develop applications using a Northbound API. Decoupling control & monitoring functions:! Decouple network monitoring from control functions to reduce the overhead on the controller. Providing high-resolution attack-detection:! Provide more information as an input for attack detection.! Detect attacks that require access to all packets. 7

Architectural Design Proposed Architecture I First Iteration: Sampling-based Security Requirements Secure & reliable SDN architecture Flexibility in application development Decoupling control & monitoring functions Providing high-resolution attack detection App App App Network Monitor (sflow Collector) Switch Northbound API (REST, ) 1 Virtualization Layer N Southbound API (OpenFlow, ) Switch vswitch vswitch Switch SDN Device Network Monitor SDN SDN Device Pros! Northbound applications! Multiple controllers! Decoupled monitoring & control Cons! Flow-shortening! Flow-reduction 8

Architectural Design Proposed Architecture II Second Iteration: High Resolution Sampling Requirements Secure & reliable SDN architecture Flexibility in application development Decoupling control & monitoring functions Providing high-resolution attack detection App App App Network Monitor (sflow Collector) Northbound API (REST, ) 1 Virtualization Layer N Southbound API (OpenFlow, ) Filter Device Network Monitor SDN Switch Switch vswitch vswitch Switch SDN Device Pros! Higher sampling budget! Northbound applications! Multiple controllers! Decoupled monitoring & control Cons! Flow shortening was not completely solved 9

Architectural Design Proposed Architecture III Third Iteration: Delegating Attack Detection Requirements Secure & reliable SDN architecture Flexibility in application development Decoupling control & monitoring functions Providing high-resolution attack detection App App App Network Monitor (sflow Collector) Northbound API (REST, ) App App App App 1 N Virtualization Layer Southbound API (OpenFlow, ) SDN Device Network Monitor SDN Switch Switch vswitch vswitch Switch SDN Device Pros! High resolution attack detection using delegation! Multiple controllers! Decoupled monitoring & control Cons! Tightly-coupled applications 10

Architectural Design Proposed Architecture IV Orchestrator-based Architecture Requirements Secure & reliable SDN architecture Flexibility in application development Decoupling control & monitoring functions Providing high-resolution attack detection App App App App App Orchestrator Northbound API (REST, ) App Orchestrator Network Monitor (sflow Collector) Agent 1 Virtualization Layer Agent N Network Monitor SDN Controlle r Southbound API (OpenFlow, sflow ) SDN Device Switch Switch vswitch vswitch Switch Pros! High resolution attack detection! Northbound applications! Multiple controllers! Decoupled monitoring and control SDN Device Cons! Overhead for high resolution attack detection 11

Outline! Introduction! Architectural Design! Orchestrator-Based Security! Experimental Examination! Conclusion 12

Orchestrator-Based Security DNS Amplification Security DNS Attack! Flooding-based DNS amplification DDoS DNS Amplifica1on Security Applica1on RR Ratio Calculation Destination Address Entropy Related Work! Hardware-based Spoofed [5] small DNS requests! Stateful detection (store requests Servers / and replies) [6] Open DNS Recursive Resolvers Security Blocks! Network Monitor threshold checker! Received-Reply (RR) ratio calculation! Destination IP address entropy Large DNS response NM Threshold Victim Checker Network Monitor (sflow Collector) Switch Packet Orchestrator Northbound API (REST, ) Agent 1 Packet Virtualization Layer Southbound API (OpenFlow, sflow ) Agent N Switch vswitch vswitch Switch 13

Orchestrator-Based Security DNS Amplification Security Orchestrator DNS Amplifica1on Security Applica1on RR Ratio Calculation Destination Address Entropy Suspicious event on port x Forward traffic to me from port x Packet Packet Orchestrator sflo w C2 C1 NM Threshold Checker Northbound API (REST, ) Agent 1 Agent N Suspicious DNS traffic Network Monitor (sflow Collector) Virtualization Layer DNS Resolvers Large DNS responses Switch Southbound API (OpenFlow, sflow ) Switch vswitch vswitch Switch 14

Outline! Introduction! Architectural Design! Orchestrator-Based Security! Experimental Examination! Conclusion 15

Experimental Examination Testing Enviroment Host System! Ubuntu 12.04 LTS! Intel Core i7-3630qm! 8 GB RAM s! Floodlight! POX Network Monitor! sflow Virtualization! Virtualbox VM (with a NAT adapter and a host-only adapter)! Mininet 16

Experimental Examination DNS Security Experiment I DNS Amplification Experiment Orchestrator sflow Floodlight POX vswitch H1 (Attacker) H3 (Victim) H2 (DNS Resolver) 17

Experimental Examination DNS Security Experiment II 18

Conclusion & Future Work Conclusion! SDN provides features that can enhance network security.! However, SDN has some architectural deficiencies when it comes to security.! To address these deficiencies, an Orchestrator-based architecture is proposed.! The proposed architecture provides:! Reliability through the use of multiple controllers! Flexibility in application development! Decoupled monitoring and control functions! High-resolution attack detection! Using the proposed architecture, applications to mitigate against ARP cache poisoning, DoS /DDoS and DNS amplifications were developed.! The proposed architecture provides flexibility at the cost of increased latency. Future work! Orchestrator-agents support! Further attack analysis! Threshold optimization! Attack mitigation strategies 19

Contact for specific questions Fraunhofer Institute for Secure Information Technology (SIT) Rheinstr. 75, Darmstadt, Germany! Rahamatullah Khondoker rahamatullah.khondoker@sit.fraunhofer.de! Ronald Marx ronald.marx@sit.fraunhofer.de RWTH Aachen University Aachen, Germany! Adel Zaalouk adel.zaalouk@rwth-aachen.de 20

References 1. Carnut, M., and J. Gondim. "ARP spoofing detection on switched Ethernet networks: A feasibility study." Proceedings of the 5th Simposio Seguranca em Informatica. 2003. 2. Gao Jinhua; Xia Kejian, "ARP spoofing detection algorithm using ICMP protocol," Computer Communication and Informatics (ICCCI), 2013 International Conference on, vol., no., pp.1,6, 4-6 Jan. 2013 3. Kim, Myung-Sup, et al. "A flow-based method for abnormal network traffic detection." Network Operations and Management Symposium, 2004. NOMS 2004. IEEE/IFIP. Vol. 1. IEEE, 2004. 4. Jun, Jae-Hyun, Hyunju Oh, and Sung-Ho Kim. "DDoS flooding attack detection through a step-by-step investigation." Networked Embedded Systems for Enterprise Applications (NESEA), 2011 IEEE 2nd International Conference on. IEEE, 2011. 5. Sun, Changhua, Bin Liu, and Lei Shi. "Efficient and low-cost hardware defense against DNS amplification attacks." Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE. IEEE, 2008. 6. Kambourakis, Georgios, et al. "A fair solution to DNS amplification attacks." Digital Forensics and Incident Analysis, 2007. WDFIA 2007. Second International Workshop on. IEEE, 2007. 21