2016 IEEE Global Communications Conference (GLOBECOM) 2016
DOI: 10.1109/glocom.2016.7841843
|View full text |Cite
|
Sign up to set email alerts
|

Fingerprinting OpenFlow Controllers: The First Step to Attack an SDN Control Plane

Abstract: Abstract-Software-Defined Networking (SDN) controllers are considered as Network Operating Systems (NOSs) and often viewed as a single point of failure. Detecting which SDN controller is managing a target network is a big step for an attacker to launch specific/effective attacks against it. In this paper, we demonstrate the feasibility of fingerpirinting SDN controllers. We propose techniques allowing an attacker placed in the data plane, which is supposed to be physically separate from the control plane, to d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 33 publications
(29 citation statements)
references
References 8 publications
0
29
0
Order By: Relevance
“…3 We found that ONOS contains 95 network event listeners across 45 apps' event listeners. 4 Popular event kinds handled were DeviceEvent (25 instances), NetworkConfigEvent (22 instances), and HostEvent (18 instances). Overall, we found 45 event types among 11 (network) event kinds.…”
Section: B Event Use Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…3 We found that ONOS contains 95 network event listeners across 45 apps' event listeners. 4 Popular event kinds handled were DeviceEvent (25 instances), NetworkConfigEvent (22 instances), and HostEvent (18 instances). Overall, we found 45 event types among 11 (network) event kinds.…”
Section: B Event Use Resultsmentioning
confidence: 99%
“…Attackers can infer whether the network is non-SDN or SDN and which controller is being used in an SDN setting [4], [71]. Defenses to date, such as control plane causality tracking [59], [62], trusted data plane identities [26], and timingbased link fabrication prevention [57], are useful in preventing specific classes of attacks but are not designed for vulnerability discovery because they track specific execution traces as they occur rather than all possible execution traces prior to runtime.…”
Section: B Sdn Security Challengesmentioning
confidence: 99%
“…The proposed random mapping may suffer from performance degradation. A model to collect SDN Controller information was presented in [17]. The attack model proposed in this paper assumed that attacker is connected in Data plane of SDN.…”
Section: Related Workmentioning
confidence: 99%
“…Controller fingerprinting. As we explained in a previous work [11], the LLDP content is different from one controller to another which allows fingerprinting attacks on SDN controllers. An adversary (h1 in figure 5) matches the LLDP content he receives from s1 (LLDP packets originate from the controller) against a controller signature database to detect which controller is managing the network.…”
Section: A Ofdp Is Not Securementioning
confidence: 99%