skip to main content
10.1145/2914642.2914647acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
research-article

Enabling Dynamic Access Control for Controller Applications in Software-Defined Networks

Published:06 June 2016Publication History

ABSTRACT

Recent findings have shown that network and system attacks in Software-Defined Networks (SDNs) have been caused by malicious network applications that misuse APIs in an SDN controller. Such attacks can both crash the controller and change the internal data structure in the controller, causing serious damage to the infrastructure of SDN-based networks. To address this critical security issue, we introduce a security framework called AEGIS to prevent controller APIs from being misused by malicious network applications. Through the run-time verification of API calls, AEGIS performs a fine-grained access control for important controller APIs that can be misused by malicious applications. The usage of API calls is verified in real time by sophisticated security access rules that are defined based on the relationships between applications and data in the SDN controller. We also present a prototypical implementation of AEGIS and demonstrate its effectiveness and efficiency by performing six different controller attacks including new attacks we have recently discovered.

References

  1. AspectJ: A seamless aspect-oriented extension to the Java programming language. https://www.eclipse.org/aspectj/.Google ScholarGoogle Scholar
  2. cbench: Performance benchmarking tool for the controller. https://www.github.com/andi-bigswitch/oflops/tree/master/cbench.Google ScholarGoogle Scholar
  3. The daikon invariant detector. http://plse.cs.washington.edu/daikon/.Google ScholarGoogle Scholar
  4. Floodlight: Open SDN Controller. http://www.projectfloodlight.org.Google ScholarGoogle Scholar
  5. ONOS: Open Networking Operation System. http://onosproject.org/.Google ScholarGoogle Scholar
  6. OpenDaylight Platform. https://www.opendaylight.org/.Google ScholarGoogle Scholar
  7. SDN. http://www.sdncentral.com/flow/sdn-software-defined-networking/.Google ScholarGoogle Scholar
  8. Spring: Platform with inbuilt AspecJ libraries for JVM-based systems. https://www.spring.io/.Google ScholarGoogle Scholar
  9. Project Foodlight. Circuit Pusher. http://www.projectfloodlight.org/circuit-pusher/.Google ScholarGoogle Scholar
  10. Nate Foster, Rob Harrison, Michael J Freedman, Christopher Monsanto, Jennifer Rexford, Alec Story, and David Walker. Frenetic: A network programming language. In ACM SIGPLAN Notices, volume 46, pages 279--291. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Open Networking Fundation. Software-defined networking: The new norm for networks. ONF White Paper, 2012.Google ScholarGoogle Scholar
  12. Sungmin Hong, Lei Xu, Haopei Wang, and Guofei Gu. Poisoning network visibility in software-defined networks: New attacks and countermeasures. In Proceedings of the 22nd Annual Network and Distributed System Security Symposium (NDSS'15), February 2015.Google ScholarGoogle ScholarCross RefCross Ref
  13. Ahmed Khurshid, Wenxuan Zhou, Matthew Caesar, and P Godfrey. Veriflow: verifying network-wide invariants in real time. ACM SIGCOMM Computer Communication Review, 42(4):467--472, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Felix Klaedtke, Ghassan O Karame, Roberto Bifulco, and Heng Cui. Access control for sdn controllers. In Proceedings of the third workshop on Hot topics in software defined networking, pages 219--220. ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Nick McKeown, Tom Anderson, Hari Balakrishnan, Guru Parulkar, Larry Peterson, Jennifer Rexford, Scott Shenker, and Jonathan Turner. Openflow: enabling innovation in campus networks. ACM SIGCOMM Computer Communication Review, 38(2):69--74, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Phillip Porras, Steven Cheung, Martin Fong, Keith Skinner, and Vinod Yegneswaran. Securing the software-defined network control layer. In Proceedings of the 2015 Network and Distributed System Security Symposium (NDSS), San Diego, California, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  17. Sandra Scott-Hayward, Christopher Kane, and Sakir Sezer. Operationcheckpoint: Sdn application control. In Network Protocols (ICNP), 2014 IEEE 22nd International Conference on, pages 618--623. IEEE, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Seungwon Shin, Yongjoo Song, Taekyung Lee, Sangho Lee, Jaewoong Chung, Phillip Porras, Vinod Yegneswaran, Jiseong Noh, and Brent Byunghoon Kang. Rosemary: A robust, secure, and high-performance network operating system. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pages 78--89. ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Seungwon Shin, Vinod Yegneswaran, Phillip Porras, and Guofei Gu. Avant-guard: Scalable and vigilant switch flow management in software-defined networks. In Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, pages 413--424. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S. Son, Seungwon Shin, V. Yegneswaran, P. Porras, and Guofei Gu. Model checking invariant security properties in OpenFlow. In Communications (ICC), 2013 IEEE International Conference on, pages 1974--1979, June 2013.Google ScholarGoogle ScholarCross RefCross Ref
  21. Xitao Wen, Yan Chen, Chengchen Hu, Chao Shi, and Yi Wang. Towards a secure controller platform for openflow applications. In Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, pages 171--172. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Enabling Dynamic Access Control for Controller Applications in Software-Defined Networks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SACMAT '16: Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies
      June 2016
      248 pages
      ISBN:9781450338028
      DOI:10.1145/2914642

      Copyright © 2016 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 6 June 2016

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      SACMAT '16 Paper Acceptance Rate18of55submissions,33%Overall Acceptance Rate177of597submissions,30%

      Upcoming Conference

      SACMAT 2024

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader