Abstract
Software-Defined Networking (SDN) continues to be deployed spanning from enterprise data centers to cloud computing with emerging of various SDN-enabled hardware switches. In this paper, we present Control Plane Reflection Attacks to exploit the limited processing capability of SDN-enabled hardware switches. The reflection attacks adopt direct and indirect data plane events to force the control plane to issue massive expensive control messages towards SDN switches. Moreover, we propose a two-phase probing-triggering attack strategy to make the reflection attacks much more efficient, stealthy and powerful. Experiments on a testbed with physical OpenFlow switches demonstrate that the attacks can lead to catastrophic results such as hurting establishment of new flows and even disruption of connections between SDN controller and switches. To mitigate such attacks, we propose a novel defense framework called SWGuard. In particular, SWGuard detects anomalies of downlink messages and prioritizes these messages based on a novel monitoring granularity, i.e., host-application pair (HAP). Implementations and evaluations demonstrate that SWGuard can effectively reduce the latency for legitimate hosts and applications under Control Plane Reflection Attacks with only minor overheads.
Author supplied keywords
Cite
CITATION STYLE
Zhang, M., Li, G., Xu, L., Bi, J., Gu, G., & Bai, J. (2018). Control plane reflection attacks in SDNs: New attacks and countermeasures. In Lecture Notes in Computer Science (Vol. 11050 LNCS, pp. 161–183). Springer Verlag. https://doi.org/10.1007/978-3-030-00470-5_8
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.