World-Leading Research with Real-World Impact! 1
Security Challenges in
Software Defined Networks (SDN)
Lecture 18
World-Leading Research with Real-World Impact! 2
Outline
• Market and SDN
• Conventional Networks v.s SDN
• OpenFlow-enabled SDN devices
• SDN Security Applications
• SDN Security Challenges
• Community Debate regarding Security in SDN
World-Leading Research with Real-World Impact! 3
Market and SDN
• In 2016, the market research firm IDC predicted that the
market for SDN network applications would reach
US$3.5 billion by 2020.
• Leading IT companies such as Nokia, Cisco, Dell, HP,
Juniper, IBM, and VMware have developed their own
SDN strategies.
• In 2015, AT&T reduced provisioning cycle by 95% with
SDN.
Marc C. Dacier, Hartmut Cwalinski , Frank Kargl , Sven Dietrich, Security Challenges and
Opportunities of Software-Defined Networking, Apr 3, 2017
“We have taken a process from low automation and weeks to
complete to high automation and minutes to complete. We’re turning
the industry on its head in an unprecedented way.” John Donovan
AT&T’s analyst conference in August 2015, John Donovan
World-Leading Research with Real-World Impact!
Conventional Networks vs. SDN
4
Customization
Programmability
Control Plane
Data Plane Dumb, fast
Control Plane
Data Plane
Abstract
view
Global
view
Control Plane
S S
S
S
Network
Applications
Open
North-bound API
OpenFlow
South-bound API
Traffic mngmnt,QoS
Policy Imp.
Security services
Decentralized Control
•Limited visibility
•Vendor-specfic
•Missconfiguration
•Poor responses
•Policy conflicts
•Security breaches
•Decentralized.
•Complex
•Static architecture
•Innovation is difficult
•Costly
•Yes costly
*Figure: Kreutz, Diego, et al. "Software-defined networking: A comprehensive survey." Proceedings of the IEEE 103.1 (2015): 14-76.
*
Conventional Networks
Data Plane
Software Defined Networks
Decoupling
Smart
Policy mngmnt
World-Leading Research with Real-World Impact! 5
OpenFlow-enabled SDN devices
Match Fields
* 00:2E * * * * * * *
* * * * * 4.5.6.7 * * *
* * * * * * * * 10
port3
port5
drop
Switching
Routing
Firewall
300
250
500
OpenFlow is: Enabler of SDN
• Protocol between the control plan and data plane
• Describes how controller and a network forwarding device should
communicate
Packet+ byte Counters
World-Leading Research with Real-World Impact! 6
SDN security applications
Control Plane
Application plane
Routing, Load Balancer,
Access Control, monitoring,
firewall, DDoS Mitigation,
IDS/IPS
examples
• Load Balancer: send each HTTP request over
lightly loaded path to lightly loaded server.
• Firewall: inform Central Controller about
malware’s packets, controller pushes new rules
to drop packets.
S S
R
S S
S
S
S
S
S
AB drop
Network Virtualization
Up-to-date Global Network View
Abstract Network View
Incoming packets
6
Server
World-Leading Research with Real-World Impact! 7
The big Picture
SDN Archetucture
Alsmadi, Izzat, and Dianxiang Xu. "Security of software defined networks: A survey." Computers & security 53 (2015): 79-108.
World-Leading Research with Real-World Impact! 8
SDN Security Challenges
World-Leading Research with Real-World Impact! 9
Application Plane
Security Challenges
SDN aware & SDN unaware apps
Nested applications
Lack of Access
Control and
Accountability
Lack of
Authentication
and Authorization
Fraudulent
flow rule
insertion
Path characteristics
Access ports
Monitor traffic
Reject/Accept flows
sensitive apps
Service apps
Apps classes
World-Leading Research with Real-World Impact! 10
Application Plane
Targeted Threat/Proposed Solution
Security policy
verification framework
-Flover:
on controller
new/old rules conflict
-ndb: root cause
-OFRewind : trace anomalies
Security policy
violation
Threats
within/from apps
flow rules
contradiction
Framework for security
apps development
(FRESCO Scripting
language)
Access control
breach
Assertion-based language
-catch bugs before deployed
- forwarding loops
- black holes
Permission system
(PermOF ):
least privilege on apps
World-Leading Research with Real-World Impact! 11
PermOF
Wen, Xitao, et al. "Towards a secure controller platform for openflow applications." Proceedings of the second ACM SIGCOMM
workshop on Hot topics in software defined networking. ACM, 2013.
The design is based on a Set of permissions & Isolation mechanisms
–Ensures controller superiority over applications
–Isolates control flow and data flow
–controller should be able to mediate all the apps’ activity
Availability of
sensitive info
real time
controlled by the
controller kernel
dynamic
execute
World-Leading Research with Real-World Impact!
Control Plane
Security Challenges
12
DoS Attacks
Threats due to
Scalability
Challenges in
Distributed
Control Plane
-SDN response times
-IP packets with
random headers
-Huge # flow rules
-saturation
World-Leading Research with Real-World Impact!
Control Plane
Targeted Threat/Proposed Solution
13
DDoS Attack
Controller scalability Challenges in
distributed control
plane
1. Wildcards mechanism
-Load balancing: direct an
aggregate of client requests to
replicas
2. Increase the processing power
(McNettle controller)
parallelism
3. Hybrid reactively/Proactive
controller
Detection Framework
SDN DDoSDetection
intra-domain & inter-domain
(DISO)
McNettle
http://haskell.cs.yale.edu/wp-content/uploads/
2013/04/thesis-singlespace.pdf
• NOX-MT scales to 5m f/s at 10 CPU cores
• Beacon  13m f/s at 20 CPU cores
• McNettle 20m f/s at 46 CPU cores
World-Leading Research with Real-World Impact!
Reactively vs. Proactive Controller
14
Marcial P. Fernandez, Evaluating OpenFlow Controller Paradigms, 2013
World-Leading Research with Real-World Impact! 15
SDN DDoSDetection
1. Flow collector module: gathers flow
entries within intervals.
2. Feature extractor: Avg. packets/f, Avg.
Bytes /f, avg duration/f, growth of single-
flows, and growth of different ports.
3. Classifier: Analyzes  Alarm?
R. Braga, E. Mota, and A. Passito, “Lightweight DDoS flooding attack detection using NOX/OpenFlow,” in Proc. IEEE 35th Conf. LCN, Oct.
2010, pp. 408–415.
World-Leading Research with Real-World Impact! 16
intra-domain & inter-domain
(DISO)
– intra-domain : manages its
own network domain
• compute the paths of flows
• dynamically react to network
issues (broken line, high latency,
bandwidth cap exceeded)
• redirecting and/or stopping
traffic
– inter-domain:
• discovers neighboring controllers
and manages communication
among controllers
• exchange aggregated network-
wide information with others
C2 C3
C1
SubD3
SubD2
SubD1
Traffic Optimization...
Topology!
Link information!
A
World-Leading Research with Real-World Impact! 17
Data Plane
Security Challenges
Switch-Controller link
Flow rules installation
Genuine vs. malicious rules
Limited table entries
Limited switch buffer
#switches per controller
path Length
World-Leading Research with Real-World Impact! 18
Data Plane
Targeted Threat/Proposed Solution
Real-time contradiction check
FortNox
man-in-the-middle
attacks
flow rule
contradiction
World-Leading Research with Real-World Impact! 19
High level points
-- Debate
World-Leading Research with Real-World Impact! 20
Centralization in SDN
The Good:
• Fast responsiveness
• Easy to removing policy inconsistencies
– centralized routing algorithms
– Firewalls
– network-monitoring
The Bad:
• Single point of failure may be exploited by an internal or external attacker
Regarding DDoS
Bad: centralization added a new type of denial-of-service (DoS) vector.
Good: Effective management of existing DoS attack types
– Using Global view
– Traffic analysis
New security challenges but benefits appear to be predominant!!!
Marc C. Dacier, Hartmut Cwalinski , Frank Kargl , Sven Dietrich, Security Challenges and Opportunities of Software-Defined Networking, Apr 3, 2017
World-Leading Research with Real-World Impact! 21
Attack Surface vs. Defense Opportunities
Good:
• In SDN defenders can create customized security solutions
• e.g Anomaly detection systems
– Global view
– Open hardware interfaces
– Centralized control
Bad:
• Benefit the attackers (zero day attacks)
– The centralized architecture
– Lack of defender expertise
– Still immature technology
Marc C. Dacier, Hartmut Cwalinski , Frank Kargl , Sven Dietrich, Security Challenges and Opportunities of Software-Defined Networking, Apr 3, 2017
World-Leading Research with Real-World Impact! 22
Centralized vs. Distributed Approach
Good:
• Reduced complexity by splitting into planes.
– Easier testable
– E.g, routing algorithms simpler than the distributed approach in
conventional networks.
Bad:
• Stressed by two aspects that strongly call for the use of a
distributed approach.
– The need for scalability
– Operational requirements (fault tolerance)
Marc C. Dacier, Hartmut Cwalinski , Frank Kargl , Sven Dietrich, Security Challenges and Opportunities of Software-Defined Networking, Apr 3, 2017
World-Leading Research with Real-World Impact! 23
Is SDN More Complex?, or Is It Simpler?
Implementing the control plane completely in software
Good :
• Programmability
Bad:
• Opposes simplicity : raises issues about algorithmic complexity.
– Why: additional requirements that weren’t imposed on classical networks
but are now thinkable in SDN.
– Simplicity is a key design principle in building secure systems.
SDN has the potential to be simple—but making it simple is quite complex.
Marc C. Dacier, Hartmut Cwalinski , Frank Kargl , Sven Dietrich, Security Challenges and Opportunities of Software-Defined Networking, Apr 3, 2017
World-Leading Research with Real-World Impact! 24
Open problems & research directions
• How to implement authentication and authorization to certify SDN
applications.
• How to implement access control and accountability in SDN.
• How to implement customized security procedures based on the type or
categories of applications.
• How can we find automated derivation of Secure SDN Configurations.
• How can we secure the controller-switches communication?
• How can we perform efficient intrusion detection and anomaly detection in
SDNs?
• How can we operate SDN in presence of untrusted HW components?
• How can we protect the controller itself?
Without security, SDN will not succeed!
World-Leading Research with Real-World Impact! 25
Thank you

More Related Content

PPTX
IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...
PDF
SDN-ppt-new
PDF
SDN Security: Two Sides of the Same Coin
DOCX
Software Defined Networking Attacks and Countermeasures .docx
PDF
Sdn&security
PDF
Critical Information Infrastructure Systems Worldwide
PDF
A Novel SDN Architecture for IoT Security
PPT
Security of software defined networking (sdn) and cognitive radio network (crn)
IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...
SDN-ppt-new
SDN Security: Two Sides of the Same Coin
Software Defined Networking Attacks and Countermeasures .docx
Sdn&security
Critical Information Infrastructure Systems Worldwide
A Novel SDN Architecture for IoT Security
Security of software defined networking (sdn) and cognitive radio network (crn)

Similar to Lqsqsssssssssssssssssssssssssssssssssssq18.pptx (20)

DOCX
Detecting_and_Mitigating_Botnet_Attacks_in_Software-Defined_Networks_Using_De...
PDF
SDN Security Talk - (ISC)2_3
PPTX
Software_Defined_Networking.pptx
PDF
sdnppt.pdf
PDF
Final_Report
PPTX
Sdn pres v2-Software-defined networks
PPTX
New Threats, New Approaches in Modern Data Centers
PDF
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
PPTX
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
PDF
A review on software defined network security risks and challenges
PDF
IRJET- Detection of Distributed Denial-of-Service (DDos) Attack on Software D...
PDF
Controller Placement Problem resiliency evaluation in SDN-based architectures
PDF
Controller Placement Problem Resiliency Evaluation in SDN-based Architectures
PDF
Controller Placement Problem Resiliency Evaluation in SDN-based Architectures
PDF
SDN and Security: A Marriage Made in Heaven. Or Not.
PPT
Sbrc 2014 Painel SDN
PPTX
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
PPTX
Training manual on scada
PDF
Private sector cyber resilience and the role of data diodes
PPTX
Simplifying SDN Networking Across Private and Public Clouds
Detecting_and_Mitigating_Botnet_Attacks_in_Software-Defined_Networks_Using_De...
SDN Security Talk - (ISC)2_3
Software_Defined_Networking.pptx
sdnppt.pdf
Final_Report
Sdn pres v2-Software-defined networks
New Threats, New Approaches in Modern Data Centers
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
A review on software defined network security risks and challenges
IRJET- Detection of Distributed Denial-of-Service (DDos) Attack on Software D...
Controller Placement Problem resiliency evaluation in SDN-based architectures
Controller Placement Problem Resiliency Evaluation in SDN-based Architectures
Controller Placement Problem Resiliency Evaluation in SDN-based Architectures
SDN and Security: A Marriage Made in Heaven. Or Not.
Sbrc 2014 Painel SDN
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
Training manual on scada
Private sector cyber resilience and the role of data diodes
Simplifying SDN Networking Across Private and Public Clouds
Ad

More from pfeprojet (7)

PPTX
slides-91wxxwxwxwxwwxwxwxwx-i2nsf-0.pptx
PPT
slidessdddsdssdssdsdsdsdsddssaver.com.ppt
PPTX
Day 2 - 1. Denial of Service (DoS) Attacks.pptx
PPTX
système experdgffffffffffffffffffffffffffft.pptx
PPTX
Day 2 - 1. Denial of Sergvice (DoS) Attacks.pptx
PPTX
les mécanismes de transitions frzdsd.pptx
PPTX
système expert technologieeeeeeeeee.pptx
slides-91wxxwxwxwxwwxwxwxwx-i2nsf-0.pptx
slidessdddsdssdssdsdsdsdsddssaver.com.ppt
Day 2 - 1. Denial of Service (DoS) Attacks.pptx
système experdgffffffffffffffffffffffffffft.pptx
Day 2 - 1. Denial of Sergvice (DoS) Attacks.pptx
les mécanismes de transitions frzdsd.pptx
système expert technologieeeeeeeeee.pptx
Ad

Recently uploaded (20)

PDF
When the World Becomes the Stage Enzo Zelocchi’s Vision of a Cinema Without W...
PPTX
1st_Powerpoint_Hehe_bhdsvnjdnkzckdsfffff
PDF
Elevating Brand Relevance in the U.S Creator Economy.pdf
PPTX
Badminton Sports Center Infographics by Slidesgo.pptx
PPTX
Program Implementation Review nutrition.pptx
PPTX
Sex and the City from a gender perspective
DOC
价格咨询GWU毕业证学历认证,莱图尔诺大学毕业证海外学位认证
PPTX
柏林巴德学院学历认证范本ECLA成绩单柏林巴德学院在读证明信学历认证
PDF
The Script Masters: How TV Writers Turn Ideas into Must-Watch Shows
PDF
Jake Seal Black Hangar Shares 5 Future Trends Shaping the World of Cinema
PDF
Crimson animation project storyboard art
PDF
Ordinary_Member_2022-23 of the coating indus
PPTX
Dt Project 2024_20240509_225417_0000[1].pptx
PPTX
Free Photo Galleries Website Where Art Meets Accessibility.pptx
PPTX
德国学位证(HTWG毕业证书)康斯坦茨应用技术大学毕业证书如何办理
PDF
Between Fiction and Fire, Enzo Zelocchi’s Cinema Emerges as a Testament to Wh...
PPTX
Cristiano Ronaldo.pptx. The greatest footballer of all time
PPTX
UPSA毕业证范本萨拉曼卡天主教大学成绩单如何制作UPSA在读证明信文凭
PDF
Together (2025) – A Haunting Love Story.pdf
PPTX
Stock Images vs. Custom Photos What Works Best.pptx
When the World Becomes the Stage Enzo Zelocchi’s Vision of a Cinema Without W...
1st_Powerpoint_Hehe_bhdsvnjdnkzckdsfffff
Elevating Brand Relevance in the U.S Creator Economy.pdf
Badminton Sports Center Infographics by Slidesgo.pptx
Program Implementation Review nutrition.pptx
Sex and the City from a gender perspective
价格咨询GWU毕业证学历认证,莱图尔诺大学毕业证海外学位认证
柏林巴德学院学历认证范本ECLA成绩单柏林巴德学院在读证明信学历认证
The Script Masters: How TV Writers Turn Ideas into Must-Watch Shows
Jake Seal Black Hangar Shares 5 Future Trends Shaping the World of Cinema
Crimson animation project storyboard art
Ordinary_Member_2022-23 of the coating indus
Dt Project 2024_20240509_225417_0000[1].pptx
Free Photo Galleries Website Where Art Meets Accessibility.pptx
德国学位证(HTWG毕业证书)康斯坦茨应用技术大学毕业证书如何办理
Between Fiction and Fire, Enzo Zelocchi’s Cinema Emerges as a Testament to Wh...
Cristiano Ronaldo.pptx. The greatest footballer of all time
UPSA毕业证范本萨拉曼卡天主教大学成绩单如何制作UPSA在读证明信文凭
Together (2025) – A Haunting Love Story.pdf
Stock Images vs. Custom Photos What Works Best.pptx

Lqsqsssssssssssssssssssssssssssssssssssq18.pptx

  • 1. World-Leading Research with Real-World Impact! 1 Security Challenges in Software Defined Networks (SDN) Lecture 18
  • 2. World-Leading Research with Real-World Impact! 2 Outline • Market and SDN • Conventional Networks v.s SDN • OpenFlow-enabled SDN devices • SDN Security Applications • SDN Security Challenges • Community Debate regarding Security in SDN
  • 3. World-Leading Research with Real-World Impact! 3 Market and SDN • In 2016, the market research firm IDC predicted that the market for SDN network applications would reach US$3.5 billion by 2020. • Leading IT companies such as Nokia, Cisco, Dell, HP, Juniper, IBM, and VMware have developed their own SDN strategies. • In 2015, AT&T reduced provisioning cycle by 95% with SDN. Marc C. Dacier, Hartmut Cwalinski , Frank Kargl , Sven Dietrich, Security Challenges and Opportunities of Software-Defined Networking, Apr 3, 2017 “We have taken a process from low automation and weeks to complete to high automation and minutes to complete. We’re turning the industry on its head in an unprecedented way.” John Donovan AT&T’s analyst conference in August 2015, John Donovan
  • 4. World-Leading Research with Real-World Impact! Conventional Networks vs. SDN 4 Customization Programmability Control Plane Data Plane Dumb, fast Control Plane Data Plane Abstract view Global view Control Plane S S S S Network Applications Open North-bound API OpenFlow South-bound API Traffic mngmnt,QoS Policy Imp. Security services Decentralized Control •Limited visibility •Vendor-specfic •Missconfiguration •Poor responses •Policy conflicts •Security breaches •Decentralized. •Complex •Static architecture •Innovation is difficult •Costly •Yes costly *Figure: Kreutz, Diego, et al. "Software-defined networking: A comprehensive survey." Proceedings of the IEEE 103.1 (2015): 14-76. * Conventional Networks Data Plane Software Defined Networks Decoupling Smart Policy mngmnt
  • 5. World-Leading Research with Real-World Impact! 5 OpenFlow-enabled SDN devices Match Fields * 00:2E * * * * * * * * * * * * 4.5.6.7 * * * * * * * * * * * 10 port3 port5 drop Switching Routing Firewall 300 250 500 OpenFlow is: Enabler of SDN • Protocol between the control plan and data plane • Describes how controller and a network forwarding device should communicate Packet+ byte Counters
  • 6. World-Leading Research with Real-World Impact! 6 SDN security applications Control Plane Application plane Routing, Load Balancer, Access Control, monitoring, firewall, DDoS Mitigation, IDS/IPS examples • Load Balancer: send each HTTP request over lightly loaded path to lightly loaded server. • Firewall: inform Central Controller about malware’s packets, controller pushes new rules to drop packets. S S R S S S S S S S AB drop Network Virtualization Up-to-date Global Network View Abstract Network View Incoming packets 6 Server
  • 7. World-Leading Research with Real-World Impact! 7 The big Picture SDN Archetucture Alsmadi, Izzat, and Dianxiang Xu. "Security of software defined networks: A survey." Computers & security 53 (2015): 79-108.
  • 8. World-Leading Research with Real-World Impact! 8 SDN Security Challenges
  • 9. World-Leading Research with Real-World Impact! 9 Application Plane Security Challenges SDN aware & SDN unaware apps Nested applications Lack of Access Control and Accountability Lack of Authentication and Authorization Fraudulent flow rule insertion Path characteristics Access ports Monitor traffic Reject/Accept flows sensitive apps Service apps Apps classes
  • 10. World-Leading Research with Real-World Impact! 10 Application Plane Targeted Threat/Proposed Solution Security policy verification framework -Flover: on controller new/old rules conflict -ndb: root cause -OFRewind : trace anomalies Security policy violation Threats within/from apps flow rules contradiction Framework for security apps development (FRESCO Scripting language) Access control breach Assertion-based language -catch bugs before deployed - forwarding loops - black holes Permission system (PermOF ): least privilege on apps
  • 11. World-Leading Research with Real-World Impact! 11 PermOF Wen, Xitao, et al. "Towards a secure controller platform for openflow applications." Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking. ACM, 2013. The design is based on a Set of permissions & Isolation mechanisms –Ensures controller superiority over applications –Isolates control flow and data flow –controller should be able to mediate all the apps’ activity Availability of sensitive info real time controlled by the controller kernel dynamic execute
  • 12. World-Leading Research with Real-World Impact! Control Plane Security Challenges 12 DoS Attacks Threats due to Scalability Challenges in Distributed Control Plane -SDN response times -IP packets with random headers -Huge # flow rules -saturation
  • 13. World-Leading Research with Real-World Impact! Control Plane Targeted Threat/Proposed Solution 13 DDoS Attack Controller scalability Challenges in distributed control plane 1. Wildcards mechanism -Load balancing: direct an aggregate of client requests to replicas 2. Increase the processing power (McNettle controller) parallelism 3. Hybrid reactively/Proactive controller Detection Framework SDN DDoSDetection intra-domain & inter-domain (DISO) McNettle http://haskell.cs.yale.edu/wp-content/uploads/ 2013/04/thesis-singlespace.pdf • NOX-MT scales to 5m f/s at 10 CPU cores • Beacon  13m f/s at 20 CPU cores • McNettle 20m f/s at 46 CPU cores
  • 14. World-Leading Research with Real-World Impact! Reactively vs. Proactive Controller 14 Marcial P. Fernandez, Evaluating OpenFlow Controller Paradigms, 2013
  • 15. World-Leading Research with Real-World Impact! 15 SDN DDoSDetection 1. Flow collector module: gathers flow entries within intervals. 2. Feature extractor: Avg. packets/f, Avg. Bytes /f, avg duration/f, growth of single- flows, and growth of different ports. 3. Classifier: Analyzes  Alarm? R. Braga, E. Mota, and A. Passito, “Lightweight DDoS flooding attack detection using NOX/OpenFlow,” in Proc. IEEE 35th Conf. LCN, Oct. 2010, pp. 408–415.
  • 16. World-Leading Research with Real-World Impact! 16 intra-domain & inter-domain (DISO) – intra-domain : manages its own network domain • compute the paths of flows • dynamically react to network issues (broken line, high latency, bandwidth cap exceeded) • redirecting and/or stopping traffic – inter-domain: • discovers neighboring controllers and manages communication among controllers • exchange aggregated network- wide information with others C2 C3 C1 SubD3 SubD2 SubD1 Traffic Optimization... Topology! Link information! A
  • 17. World-Leading Research with Real-World Impact! 17 Data Plane Security Challenges Switch-Controller link Flow rules installation Genuine vs. malicious rules Limited table entries Limited switch buffer #switches per controller path Length
  • 18. World-Leading Research with Real-World Impact! 18 Data Plane Targeted Threat/Proposed Solution Real-time contradiction check FortNox man-in-the-middle attacks flow rule contradiction
  • 19. World-Leading Research with Real-World Impact! 19 High level points -- Debate
  • 20. World-Leading Research with Real-World Impact! 20 Centralization in SDN The Good: • Fast responsiveness • Easy to removing policy inconsistencies – centralized routing algorithms – Firewalls – network-monitoring The Bad: • Single point of failure may be exploited by an internal or external attacker Regarding DDoS Bad: centralization added a new type of denial-of-service (DoS) vector. Good: Effective management of existing DoS attack types – Using Global view – Traffic analysis New security challenges but benefits appear to be predominant!!! Marc C. Dacier, Hartmut Cwalinski , Frank Kargl , Sven Dietrich, Security Challenges and Opportunities of Software-Defined Networking, Apr 3, 2017
  • 21. World-Leading Research with Real-World Impact! 21 Attack Surface vs. Defense Opportunities Good: • In SDN defenders can create customized security solutions • e.g Anomaly detection systems – Global view – Open hardware interfaces – Centralized control Bad: • Benefit the attackers (zero day attacks) – The centralized architecture – Lack of defender expertise – Still immature technology Marc C. Dacier, Hartmut Cwalinski , Frank Kargl , Sven Dietrich, Security Challenges and Opportunities of Software-Defined Networking, Apr 3, 2017
  • 22. World-Leading Research with Real-World Impact! 22 Centralized vs. Distributed Approach Good: • Reduced complexity by splitting into planes. – Easier testable – E.g, routing algorithms simpler than the distributed approach in conventional networks. Bad: • Stressed by two aspects that strongly call for the use of a distributed approach. – The need for scalability – Operational requirements (fault tolerance) Marc C. Dacier, Hartmut Cwalinski , Frank Kargl , Sven Dietrich, Security Challenges and Opportunities of Software-Defined Networking, Apr 3, 2017
  • 23. World-Leading Research with Real-World Impact! 23 Is SDN More Complex?, or Is It Simpler? Implementing the control plane completely in software Good : • Programmability Bad: • Opposes simplicity : raises issues about algorithmic complexity. – Why: additional requirements that weren’t imposed on classical networks but are now thinkable in SDN. – Simplicity is a key design principle in building secure systems. SDN has the potential to be simple—but making it simple is quite complex. Marc C. Dacier, Hartmut Cwalinski , Frank Kargl , Sven Dietrich, Security Challenges and Opportunities of Software-Defined Networking, Apr 3, 2017
  • 24. World-Leading Research with Real-World Impact! 24 Open problems & research directions • How to implement authentication and authorization to certify SDN applications. • How to implement access control and accountability in SDN. • How to implement customized security procedures based on the type or categories of applications. • How can we find automated derivation of Secure SDN Configurations. • How can we secure the controller-switches communication? • How can we perform efficient intrusion detection and anomaly detection in SDNs? • How can we operate SDN in presence of untrusted HW components? • How can we protect the controller itself? Without security, SDN will not succeed!
  • 25. World-Leading Research with Real-World Impact! 25 Thank you

Editor's Notes

  • #3: International Data Corporation (IDC), an American market research, analysis and advisory firm, specializes in information technology, AT&T reduces provisioning cycle by 95% with SDN  reduction in the time spent ordering, managing and changing services by up up to 95%. “We have taken a process from low automation and weeks to complete to high automation and minutes to complete. We’re turning the industry on its head in an unprecedented way.” John Donovan John Donovan : senior executive vice president of technology and network operations