Software Defined Networking (SDN) is a recent network architecture based on the separation of forwarding functions from network logic, and provides high flexibility in the management of the network. In this paper, we show how an attacker can exploit SDN programmability to obtain detailed knowledge about the network behaviour. In particular, we introduce a novel attack, named Know Your Enemy (KYE), which allows an attacker to gather vital information about the configuration of the network. Through the KYE attack, an attacker can obtain information ranging from the configuration of security tools, such as attack detection thresholds for network scanning, to general network policies like QoS and network virtualization. Additionally, we show that the KYE attack can be performed in a stealthy fashion, allowing an attacker to learn configuration secrets without being detected. We underline that the vulnerability exploited by the KYE attack is proper of SDN and is not present in legacy networks. Finally, we address the KYE attack by proposing an active defense countermeasure based on network flows obfuscation, which considerably increases the complexity for a successful attack. Our solution offers provable security guarantees that can be tailored to the needs of the specific network under consideration.

A Novel Stealthy Attack to Gather SDN Configuration-Information / Conti, Mauro; De Gaspari, Fabio; Mancini, Luigi Vincenzo. - In: IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING. - ISSN 2168-6750. - 8:2(2020), pp. 328-340. [10.1109/TETC.2018.2806977]

A Novel Stealthy Attack to Gather SDN Configuration-Information

Conti, Mauro
;
De Gaspari, Fabio
;
Mancini, Luigi Vincenzo
2020

Abstract

Software Defined Networking (SDN) is a recent network architecture based on the separation of forwarding functions from network logic, and provides high flexibility in the management of the network. In this paper, we show how an attacker can exploit SDN programmability to obtain detailed knowledge about the network behaviour. In particular, we introduce a novel attack, named Know Your Enemy (KYE), which allows an attacker to gather vital information about the configuration of the network. Through the KYE attack, an attacker can obtain information ranging from the configuration of security tools, such as attack detection thresholds for network scanning, to general network policies like QoS and network virtualization. Additionally, we show that the KYE attack can be performed in a stealthy fashion, allowing an attacker to learn configuration secrets without being detected. We underline that the vulnerability exploited by the KYE attack is proper of SDN and is not present in legacy networks. Finally, we address the KYE attack by proposing an active defense countermeasure based on network flows obfuscation, which considerably increases the complexity for a successful attack. Our solution offers provable security guarantees that can be tailored to the needs of the specific network under consideration.
2020
Control systems; Decision making; Electronic mail; Network architecture; Process control; SDN; Security; Side-Channel; Stealth Information-Gathering; Virtualization; Computer Science (miscellaneous); Information Systems; Human-Computer Interaction; Computer Science Applications1707 Computer Vision and Pattern Recognition
01 Pubblicazione su rivista::01a Articolo in rivista
A Novel Stealthy Attack to Gather SDN Configuration-Information / Conti, Mauro; De Gaspari, Fabio; Mancini, Luigi Vincenzo. - In: IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING. - ISSN 2168-6750. - 8:2(2020), pp. 328-340. [10.1109/TETC.2018.2806977]
File allegati a questo prodotto
File Dimensione Formato  
Conti_Postprint_A-Novel-Stealthy_2018.pdf

accesso aperto

Note: https://ieeexplore.ieee.org/document/8293865
Tipologia: Documento in Post-print (versione successiva alla peer review e accettata per la pubblicazione)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 635.8 kB
Formato Adobe PDF
635.8 kB Adobe PDF
Conti_A-Novel-Stealthy_2020.pdf

solo gestori archivio

Tipologia: Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 1.18 MB
Formato Adobe PDF
1.18 MB Adobe PDF   Contatta l'autore

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/1120681
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 18
  • ???jsp.display-item.citation.isi??? 13
social impact