Proceedings of the 33rd Annual Computer Security Applications Conference 2017
DOI: 10.1145/3134600.3134603
|View full text |Cite
|
Sign up to set email alerts
|

A Security-Mode for Carrier-Grade SDN Controllers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
25
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(25 citation statements)
references
References 15 publications
0
25
0
Order By: Relevance
“…Furthermore, our attacks can disrupt not only the application layer but also the control layer and the data plane layer. Particularly, our attacks can bypass all the previous defense systems [12], [1], [10], [9], [15], [7], [16], [21] that prevent various attacks from disrupting different SDN layers. We detail our attacks and the mechanisms of bypassing existing defense systems in Section IV.…”
Section: A Threat Modelmentioning
confidence: 99%
See 3 more Smart Citations
“…Furthermore, our attacks can disrupt not only the application layer but also the control layer and the data plane layer. Particularly, our attacks can bypass all the previous defense systems [12], [1], [10], [9], [15], [7], [16], [21] that prevent various attacks from disrupting different SDN layers. We detail our attacks and the mechanisms of bypassing existing defense systems in Section IV.…”
Section: A Threat Modelmentioning
confidence: 99%
“…By abusing APIs and permissions provided by controllers, malicious applications can significantly disrupt SDN systems, such as controller rootkits [44] and SDN environment killing [11]. Therefore, researchers have provided many security enhancement systems [16], [10], [12], [7], [13], [14]. Rosemary [16] isolates applications in sandboxes to safeguard controllers from errant operations performed by applications.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…To date, defenses that limit the SDN attack surface have included app sandboxing [75], TLS-enabled APIs [61,64,68], API abuse prevention [65,78], and role-based access control (RBAC) for apps [68,89], among others. Although these mechanisms improve control plane security, we posit that they are not sufficient for mitigating information flow attacks within the control plane.…”
Section: Introductionmentioning
confidence: 99%