10.1145/2491185.2491199acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedings
research-article
Free Access

Towards secure and dependable software-defined networks

ABSTRACT

Software-defined networking empowers network operators with more flexibility to program their networks. With SDN, network management moves from codifying functionality in terms of low-level device configurations to building software that facilitates network management and debugging. By separating the complexity of state distribution from network specification, SDN provides new ways to solve long-standing problems in networking --- routing, for instance --- while simultaneously allowing the use of security and dependability techniques, such as access control or multi-path.

However, the security and dependability of the SDN itself is still an open issue. In this position paper we argue for the need to build secure and dependable SDNs by design. As a first step in this direction we describe several threat vectors that may enable the exploit of SDN vulnerabilities. We then sketch the design of a secure and dependable SDN control platform as a materialization of the concept here advocated. We hope that this paper will trigger discussions in the SDN community around these issues and serve as a catalyser to join efforts from the networking and security & dependability communities in the ultimate goal of building resilient control planes.

References

  1. T. Koponen et al. "Onix: a distributed control platform for large-scale production networks". In: OSDI. 2010. Google ScholarGoogle Scholar
  2. N. Gude et al. "NOX: towards an operating system for networks". In: Comp. Comm. Rev. (2008). Google ScholarGoogle Scholar
  3. M. Caesar et al. "Design and implementation of a routing control platform". In: NSDI. 2005. Google ScholarGoogle Scholar
  4. M. Casado et al. "Rethinking Enterprise Network Control". In: ACM Trans. on Networking 17.4 (2009). Google ScholarGoogle Scholar
  5. P. Porras et al. "A security enforcement kernel for OpenFlow networks". In: HotSDN. ACM, 2012. Google ScholarGoogle Scholar
  6. S. Shin et al. "FRESCO: Modular Composable Security Services for Software-Defined Networks". In: Internet Society NDSS. 2013.Google ScholarGoogle Scholar
  7. N. McKeown et al. "OpenFlow: enabling innovation in campus networks". In: Comp. Comm. Rev. (2008). Google ScholarGoogle Scholar
  8. S. Sorensen. Security implications of software-defined networks. 2012. url: http://goo.gl/BiXH2.Google ScholarGoogle Scholar
  9. S. M. Kerner. Is SDN Secure? 2013. url: http://goo.gl/lPn2V.Google ScholarGoogle Scholar
  10. D. Kushner. The Real Story of Stuxnet. 2013. url: http://goo.gl/HIEHQ.Google ScholarGoogle Scholar
  11. C. Tankard. "Advanced Persistent threats and how to monitor and deter them". In: Network Sec. (2011).Google ScholarGoogle Scholar
  12. Z. Yan and C. Prehofer. "Autonomic Trust Management for a Component-Based Software System". In: IEEE Trans. on Dep. and Sec. Computing 8.6 (2011). Google ScholarGoogle Scholar
  13. R. Holz et al. "X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle". In: Computer Security. LNCS. 2012.Google ScholarGoogle Scholar
  14. M. Georgiev et al. "The most dangerous code in the world: validating SSL certificates in non-browser software". In: ACM CCS. 2012. Google ScholarGoogle Scholar
  15. R. Sherwood et al. FlowVisor: A Network Virtualization Layer. Tech. rep. Deutsche Telekom Inc. R&D Lab, Stanford, Nicira Networks, 2009.Google ScholarGoogle Scholar
  16. Y. G. Desmedt. "Threshold cryptography". In: European Trans. on Telecommunications 5.4 (1994).Google ScholarGoogle Scholar
  17. F. B. Schneider. "Implementing fault-tolerant services using the state machine approach: a tutorial". In: ACM Comput. Surv. 22.4 (Dec. 1990). Google ScholarGoogle Scholar
  18. P. Sousa et al. "Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery". In: IEEE Trans. Parallel Distrib. Syst. 21.4 (2010). Google ScholarGoogle Scholar
  19. G. Veronese et al. "Efficient Byzantine Fault-Tolerance". In: IEEE Trans. on Computers 62.1 (2013). Google ScholarGoogle Scholar
  20. G. Veronese et al. \EBAWA: Efficient Byzantine Agreement for Wide-Area Networks". In: IEEE HASE. 2010. Google ScholarGoogle Scholar
  21. R. Kapitza et al. "CheapBFT: resource-efficient byzantine fault tolerance". In: ACM EuroSys. 2012. Google ScholarGoogle Scholar
  22. J. Hendricks, G. R. Ganger, and M. K. Reiter. "Low-overhead byzantine fault-tolerant storage". In: SIGOPS Oper. Syst. Rev. 41.6 (Oct. 2007). Google ScholarGoogle Scholar
  23. P. Verissimo et al. "Intrusion-tolerant middleware: the road to automatic security". In: IEEE Security & Privacy 4.4 (2006). Google ScholarGoogle Scholar
  24. J. Korniak. "The GMPLS Controlled Optical Networks as Industry Communication Platform". In: IEEE Trans. on Industrial Informatics 7.4 (2011).Google ScholarGoogle Scholar
  25. S. Neti, A. Somayaji, and M. E. Locasto. "Software diversity: Security, Entropy and Game Theory". In: 7th USENIX HotSec. 2012. Google ScholarGoogle Scholar
  26. M. Garcia et al. "Analysis of operating system diversity for intrusion tolerance". In: Software: Practice and Experience (2013).Google ScholarGoogle Scholar
  27. B. Heller, R. Sherwood, and N. McKeown. "The controller placement problem". In: HotSDN. 2012. Google ScholarGoogle Scholar
  28. J. C. Mogul and P. Congdon. "Hey, you darned counters!: get off my ASIC!" In: HotSDN. 2012. Google ScholarGoogle Scholar
  29. A. Barth et al. The Security Architecture of the Chro-mium Browser. Tech. rep. Stanford University, 2008.Google ScholarGoogle Scholar
  30. J. H. Perkins et al. "Automatically patching errors in deployed software". In: ACM SIGOPS SOSP. 2009. Google ScholarGoogle Scholar
  31. N. Foster et al. "Frenetic: a network programming language". In: SIGPLAN Not. (2011). Google ScholarGoogle Scholar
  32. A. Khurshid et al. "VeriFlow: verifying network-wide invariants in real time". In: HotSDN. 2012. Google ScholarGoogle Scholar

Index Terms

  1. Towards secure and dependable software-defined networks

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!