2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) 2017
DOI: 10.1109/icdcs.2017.281
|View full text |Cite
|
Sign up to set email alerts
|

Flow Reconnaissance via Timing Attacks on SDN Switches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(8 citation statements)
references
References 15 publications
0
8
0
Order By: Relevance
“…First, network switches (including software switches) can be compromised. Actually, many serious vulnerabilities have been found in SDN-enabled switches [3], [2], [36], [26]. Second, in many cases, attackers might not need to compromise network switches; instead, they just compromise normal hosts or virtual machines to launch attacks.…”
Section: A Scenariomentioning
confidence: 99%
See 1 more Smart Citation
“…First, network switches (including software switches) can be compromised. Actually, many serious vulnerabilities have been found in SDN-enabled switches [3], [2], [36], [26]. Second, in many cases, attackers might not need to compromise network switches; instead, they just compromise normal hosts or virtual machines to launch attacks.…”
Section: A Scenariomentioning
confidence: 99%
“…There are existing studies that target the data plane to launch attacks[36],[26],[13]; however, such attacks are not the focus of this paper.2 Many real-world networks take this in-band operation approach due to its cost-efficiency[12],[42].3 Note that the control channel does not enforce SSL/TLS by default[9],[8], and it can be very complex to manage in real-world deployments especially when there are multiple controllers[32].…”
mentioning
confidence: 99%
“…Finally, the flow rules information can be captured from the switch via side channel attacking techniques. 63 Network topology: the controller builds up its topology record by looking at the topology protocol's packet, for example, LLDP (Link Layer Discovery Protocol), IGMP (Internet Group Management Protocol), and ARP (Address Resolution Protocol) generated by the switches.…”
Section: Security In Sdnmentioning
confidence: 99%
“…Finally, the flow rules information can be captured from the switch via side channel attacking techniques. 63…”
Section: Security Threats and Challenges To Sdwsnmentioning
confidence: 99%
“…If |ΔRTT| ≫ 0, it can be speculated that the target network is an SDN and the detection packet leads to the installation of flow table rules. Furthermore, the attacker can infer more fingerprint information such as flow matching rules of the target network by carefully constructing detection packets [2][3][4], thereby exposing the entire SDN to a sea of threats as well as laying the foundation for the attacker to carry out the next more threatening and precise attack, such as Distributed Denial of Service (DDoS) attacks through forged data packets, etc. Panjwani et al concluded that up to 70% of network attacks were carried out after fingerprint attacks [5].…”
Section: Introductionmentioning
confidence: 99%