Study the Past If You Would Define the Future: Implementing Secure Multi-party SDN Updates

Liron Schiff, S. Schmid
{"title":"Study the Past If You Would Define the Future: Implementing Secure Multi-party SDN Updates","authors":"Liron Schiff, S. Schmid","doi":"10.1109/SWSTE.2016.24","DOIUrl":null,"url":null,"abstract":"A highly available and robust control plane is a critical prerequisite for any Software-Defined Network (SDN) providing dependability guarantees. While there is a wide consensus that the logically centralized SDN controller should be physically distributed, today, we do not have a good understanding of how to design such a distributed and robust control plane. This is problematic, given the potentially large influence an SDN controller has on the network state compared to the distributed legacy protocols: the control plane can be an attractive target for a malicious attack. This paper initiates the study of distributed SDN control planes which are resilient to malicious controllers, for example controllers which have been compromised by a cyber attack. We introduce an adversarial control plane model and observe that approaches based on redundancy or threshold cryptography are insufficient, as incomplete or out-dated information about the network state introduces vulnerabilities. The approach presented in this paper is based on the insight that a control plane resilient to malicious behavior requires a basic notion of memory, and must be history-aware. In particular, we propose an in band approach, implemented on the SDN switch, to efficiently coordinate the different controller actions, and guarantee correct network updates even in the presence of malicious behavior. In our approach, the switch maintains a digest of the controller state and history, and only implements the update after verifying that a majority of controllers agree to the change. Our solution is not only robust but also, compared to existing consensus protocols such as Paxos, light-weight.","PeriodicalId":118525,"journal":{"name":"2016 IEEE International Conference on Software Science, Technology and Engineering (SWSTE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Conference on Software Science, Technology and Engineering (SWSTE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SWSTE.2016.24","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

A highly available and robust control plane is a critical prerequisite for any Software-Defined Network (SDN) providing dependability guarantees. While there is a wide consensus that the logically centralized SDN controller should be physically distributed, today, we do not have a good understanding of how to design such a distributed and robust control plane. This is problematic, given the potentially large influence an SDN controller has on the network state compared to the distributed legacy protocols: the control plane can be an attractive target for a malicious attack. This paper initiates the study of distributed SDN control planes which are resilient to malicious controllers, for example controllers which have been compromised by a cyber attack. We introduce an adversarial control plane model and observe that approaches based on redundancy or threshold cryptography are insufficient, as incomplete or out-dated information about the network state introduces vulnerabilities. The approach presented in this paper is based on the insight that a control plane resilient to malicious behavior requires a basic notion of memory, and must be history-aware. In particular, we propose an in band approach, implemented on the SDN switch, to efficiently coordinate the different controller actions, and guarantee correct network updates even in the presence of malicious behavior. In our approach, the switch maintains a digest of the controller state and history, and only implements the update after verifying that a majority of controllers agree to the change. Our solution is not only robust but also, compared to existing consensus protocols such as Paxos, light-weight.
如果你想定义未来,研究过去:实现安全的多方SDN更新
高可用性和鲁棒性控制平面是任何软件定义网络(SDN)提供可靠性保证的关键先决条件。虽然人们普遍认为逻辑集中式SDN控制器应该在物理上是分布式的,但今天,我们对如何设计这样一个分布式和鲁棒的控制平面还没有很好的理解。考虑到与分布式遗留协议相比,SDN控制器对网络状态的潜在巨大影响,这是有问题的:控制平面可能成为恶意攻击的诱人目标。本文开始了分布式SDN控制平面的研究,这些控制平面能够抵御恶意控制器,例如被网络攻击破坏的控制器。我们引入了一个对抗控制平面模型,并观察到基于冗余或阈值加密的方法是不够的,因为关于网络状态的不完整或过时的信息会引入漏洞。本文提出的方法是基于这样一种见解,即对恶意行为具有弹性的控制平面需要内存的基本概念,并且必须具有历史意识。特别是,我们提出了一种在SDN交换机上实现的带内方法,以有效地协调不同的控制器动作,并且即使在存在恶意行为的情况下也能保证正确的网络更新。在我们的方法中,交换机维护控制器状态和历史的摘要,并且只有在验证大多数控制器同意更改后才实现更新。我们的解决方案不仅健壮,而且与现有的共识协议(如Paxos)相比,轻量级。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信