Security threats and countermeasures of SDN(Software Defined Network)
Security for SDN (Software Defined
Networks)
SDN (Software Defined Networks) – SDN is a network
architecture which deals with network dynamics through software enabled
control. Security for SDN has become an important concern. We discuss about
security threats and their effects with this we also discuss about SDN Security
Controls.
·
Security
Threats : Denial of service(Dos), Information Disclosure, Spoofing, Tampering,
Repudiation, Elevation of Privilege.
·
Security
Controls : Access Control, firewalls, IDS(Intrusion detection system),
IPS(Intrusion prevention system), policy management and auditing.
STRIDE(Spoofing, Tampering, Repudiation, Information
Disclosure, Denial of service, Elevation of Privilege ) is a threat
classification model developed by Microsoft for thinking about computer
security threats.
SDN security threats and
countermeasures:
We
are going to use STRIDE threat model for analyzing the type of threats which
are exposed to SDN networks. This threat model is very generic and it is
applicable to all the networks in general. The attacks can also be based on
what resources the SDN is using, so this attacks are very classified. For
example, attacks on switches which include their flow tables, attacks on
controllers which include central location for management.
·
Spoofing : It is a process where all the network information
such as IP address, MAC address, ARP etc. are forged to hide the identity of
the attackers which done intentionally. Spoofing is the part of large attacks
which include DNS amplification, Smurf and SYN flooding. For launching the
Distributed denial of service attacks which is also called as DDOS attacks spoofed
address are used. Now-a-days spoofing includes IP spoofing and ARP spoofing
(Packet level attacks). To avoid unauthorized intrusion strong password and
encryption methods should be enforced. To counter IP spoofing IP validation
methods are also used. Another counter measure includes Software Defined
Filtering Architecture (SEFA) which used for same IP based and router based
spoofing. For spoofing occurrences
SEFA adds filtering rules.
·
Tampering : It is a process of modifying or destructing all
the network information such as access lists, flows in flow tables, topology,
policies. For example, injection of flow rules will lead to the network
misbehavior. The injection of firewall rules allow the illegitimate hosts. Unintended
traffic tampering can be prevented by SDN, as a flow based traffic management.
For some integrity attributes, packets can be inspected
before they travel through some medium. By monitoring computers and
distributing auditing tampering can be mitigated across many network points. In
such situations if one point is attacked
then we can use other network points to detect and correct such tampering. For
tampering purpose Transport Layer Security (TLS) is used.
·
Repudiation : It is a process of denying by one of the
entities as it is not part of communication. Non-repudiation is a legal
concept, which tries to make sure that denial does not occur. The receiver
needs to verify that packets are sent from the actual sender included in the
packet header and the sender needs to verify that packets sent to the actual
receiver included in the packet header. Non Repudiation is all about accountability,
which hold individuals entity.
·
Information disclosure : This attacks have no direct
intention to destroy the network but to spy on the network information.
Attackers initially tries to sniff the network information such as
communications details among nodes, topology and nodes features. The impact of
SDN architecture can be mixed on scanning attacks. Switches include flow rules
in SDN. Man in the Middle (MiM) attack is an information disclosure type
attack. There are two countermeasures, which are as follows:
1. Scanning countermeasures :
Scanning methods are used at the initial steps of this attacks. For potential
information leakage and vulnerability the network scanners are used. For
counter scanning attacks encryption methods are used.
2. Information disclosure
countermeasures : To filter traffic, white listing and black listing can be
used. White and black listings are on IP and MAC addresses. They are also used
in OpenFlow networks.
·
DOS : DOS stands for Denial of service, it is basically
flooding the network with requests. This attacks are most dangerous threats for
the network performance. This attacks also lead to increase in latency and drop
of legitimate packets. DOS attack may disable the whole network or stop it from
functioning. Its easy to detect all DoS attacks by flow
level information. Another simple method
to detect DoS attacks is to keep monitoring how the traffic flows. A threshold
value can be specified to considered large and abnormal traffic. And once this
threshold value gets exceeded, a DoS occurrence can be notified and then
controller can inserts a flow rule to drop packets.
·
Elevation of privilege : In this
attack , the attacker tries to elevate their access system resources and
applications that requires special permission as they enter into the system. The ability to detect privilege elevation attacks requires a
robust and intelligent auditing process. The idea of a fine grained RBAC system
was proposed earlier which is based on OpenFlow. This idea gives emphasis on a
flow basis rather than on a user or host basis. The advantage of this flow
based authentication is that a user needs to be verified frequently on a flow
by flow basis.
Comments
Post a Comment