Proceedings 2020 Network and Distributed System Security Symposium 2020
DOI: 10.14722/ndss.2020.24080
|View full text |Cite
|
Sign up to set email alerts
|

Automated Discovery of Cross-Plane Event-Based Vulnerabilities in Software-Defined Networking

Abstract: Software-defined networking (SDN) achieves a programmable control plane through the use of logically centralized, event-driven controllers and through network applications (apps) that extend the controllers' functionality. As control plane decisions are often based on the data plane, it is possible for carefully crafted malicious data plane inputs to direct the control plane towards unwanted states that bypass network security restrictions (i.e., cross-plane attacks). Unfortunately, because of the complex inte… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 31 publications
(80 reference statements)
0
6
0
Order By: Relevance
“…4) Program Analysis: This method examines program behavior to find flaws that abuse security-sensitive APIs or violate network policies (invariant). Prior studies have utilized diverse program analysis techniques, such as static analysis looking into control flows [69], [70] or dynamic instrumentation investigating execution traces [48], [71].…”
Section: Defense Typementioning
confidence: 99%
See 3 more Smart Citations
“…4) Program Analysis: This method examines program behavior to find flaws that abuse security-sensitive APIs or violate network policies (invariant). Prior studies have utilized diverse program analysis techniques, such as static analysis looking into control flows [69], [70] or dynamic instrumentation investigating execution traces [48], [71].…”
Section: Defense Typementioning
confidence: 99%
“…Under the shadow of the For example, an attacker can abuse a host-to-application event chain, denoting a case when events generated from hosts affect an application's behavior. EventScope [70] presents a cross-plane attack that focuses on "unparsed" events by applications. They show that an attacker can trigger a malformed HOST ADDED event containing an invalid IP address (e.g., 10.0.0.256).…”
Section: Sdn Attack Classificationmentioning
confidence: 99%
See 2 more Smart Citations
“…In this case, the host tracking application indirectly obtains permission to modify the flow rules through the routing application [50]. Besides, on the data plane, the hosts can utilize inappropriate responsibility assigning of the applications to bypass access control [51].…”
Section: Elevation Of Privilegementioning
confidence: 99%