SlideShare a Scribd company logo
SDN security
Supervised by Dr Ashraf Tammam
prepared by Mahmoud Fathy
Outline
Introduction
Security via SDN
Threats
Mininet
Future work
Conclusion
Outline
Introduction
Security via SDN
Threats
Mininet
Future work
Conclusion
Software-defined networks
Network operators need to configure each individual network device
separately using vendor specific commands.
Networks are dynamic, and operators have little or no mechanisms to
automatically respond to network events.
With an SDN, network flows are controlled at the level of the global
network abstraction, rather than at the level of the individual devices,
usually, but not necessarily, with the aid of the OpenFlow protocol.
Network devices become simple forwarding devices.
The control logic is implemented in a logical controller.
Introduction
Software-defined networks
Separation of the control plane from the data
plane that lays the ground to the Software
Defined Networking paradigm.
Data plane is responsible for packet forwarding
and it is widely known by its OSI seven layers.
Control plane serves the Data plane, it shapes
the traffic that the network exists to carry.
Introduction
Software-defined networks
Traditional networks
Operating system
Specialised
packet forwarding
hardware
Operating system
Specialised
packet forwarding
hardware
Operating system
Specialised
packet forwarding
hardware
Operating system
Specialised
packet forwarding
hardware
Operating system
Specialised
packet forwarding
hardware
SSH/CLI
Software-defined networks
packet forwarding
hardware
packet forwarding
hardware packet forwarding
hardware
packet forwarding
hardware
packet forwarding
hardware
Network Operating System runs Controller
App App App
southbound API
northbound API
Slide by Nick McKeown
Sdn pres v2-Software-defined networks
Software-defined networks
Open Networking Foundation (ONF) is a user-driven organization dedicated to the promotion
and adoption of Software-Defined Networking (SDN) through open standards development.
Working groups continue to analyze SDN requirements, evolve the OpenFlow Standard to
address the needs of commercial deployments, and research new standards to expand SDN
benefits.
website: opennetworking.org
Open networking foundation
Software-defined networks
Open networking foundation
Open Networking Foundation (ONF) is a user-driven organization dedicated to the promotion
and adoption of Software-Defined Networking (SDN) through open standards development.
Working groups continue to analyze SDN requirements, evolve the OpenFlow Standard to
address the needs of commercial deployments, and research new standards to expand SDN
benefits.
website: opennetworking.org
Software-defined networks
An open interface to packet forwarding, not the standard but it is
the most widespread used.
The origins of OpenFlow, when a PhD student at Stanford
University developed something called Ethane, intended as a
way of centrally managing global policy.
That idea eventually led to what become known as OpenFlow,
thanks to more research conducted jointly by teams at Stanford
and the University of California, Berkeley.
This is how the controller configures the switches’ Flow tables.
OpenFlow
Software-defined networks
Network Operating System
App features
Operating System
(Windows, Linux or Mac)
CPU
(Intel, AMD)
OpenFlow
Instruction set
OpenFlow analogy
Software-defined networks
OpenFlow
Header Payload
Match
Match on any header, or new header
Action
Forward to port(s), drop, send to controller.
Overwrite header.
Forward at specific bit-rate.
Software-defined networks
OpenFlow
Switch
Port
MAC
src
MAC
dst
Eth
type
VLAN
ID
IP
src
IP
dst
IP
protoco
l
TCP
sport
TCP
dport
Action
VLAN switching
Switch
Port
MAC
src
MAC
dst
Eth
type
VLAN
ID
IP
src
IP
dst
IP
protoco
l
TCP
sport
TCP
dport
Action
Routing
Switch
Port
MAC
src
MAC
dst
Eth
type
VLAN
ID
IP
src
IP
dst
IP
protoco
l
TCP
sport
TCP
dport
Action
Firewall
00:2f.. vlan1 port6
port61.2.3.4
drop22
X X X X X X X X
X X X XX X X XX
X X X XX X XX X
Software-defined networks
Network Operating System
Control Program
OpenFlow
IF header = x, forward to port 4
IF header = y, overwrite header with q then
forward to port 5
IF header = other, forward to me
Flow
Tabl
e
Software-defined networks
Advantages
Greater agility resulting from reduced reliance on switch installation
and configuration, and centralised management and control.
Software-defined networks
Advantages
An OpenFlow-only switch would be extremely simple and
inexpensive to build
10 Gigabit Ethernet OpenFlow switch from IBM
Software-defined networks
Advantages
Reduced dependence on vendors’ equipment
product cycles.
Software-defined networks
Advantages
The centralization of the control logic in a controller with global knowledge of
the network state simplifies the development of more sophisticated network
functions.
http://sourceforge.net/projects/itransformer/
Software-defined networks
Advantages
Enabling the introduction of sophisticated network policies
simultaneously with the operation (e.g., security, resource control,
prioritization).
Connect
Load balance
Secure
…
Software-defined networks
Other advantages
A control program can automatically react to spurious
changes of the network state.
Easier to test and deploy newly researched protocols.
Facilitates troubleshooting.
One advantage of this capability is that it enables the
network to dynamically respond to application
requirements.
SDN in use
Google
SDN in use
Amazon
SDN in use
Facebook
Software-defined networks
Empower network owners/operators.
Increase the pace of innovation.
Diversify the supply chain.
Build a robust foundation.
How SDN will shape networking
Outline
Introduction
Security via SDN
Threats
Mininet
Future work
Conclusion
Security via SDN
In SDN, we have the flexibility to program the security
set of
APIs
Network
OS
Network
Features
OpenFlow
Security via SDN
This reduces security expenses by limiting the
need to purchase new hardware.
Security via SDN
The controller has a full view of the network which
gives it an advantage implementing security
policies.
Sdn pres v2-Software-defined networks
Security via SDN
Control of multiple simultaneous security policies thro
Authentication
IPS
Firewall
…
Controller
Security via SDN
No need to have dedicated tap devices as it can
be replaced by openflow instructions.
Match any,
forward to A
A
Security via SDN
It allows us to build vague boundaries make it
impossible to determine where security devices,
such as firewalls, are deployed.
Attacker
Security via SDN
It allows us to build vague boundaries make it
impossible to determine where security devices,
such as firewalls, are deployed.
Attacker
Where ?!
Firewall
functionality
is distributed
on switches
Security via SDN
A scheme proposed by ONF, Automated Malware Quarantine
(AMQ).
AMQ detects and isolates insecure network devices.
It identifies the problem and automatically downloads the
necessary patches to resolve it.
After the threat has been contained, AMQ software
automatically allows the device to rejoin the network.
It has the potential to reduce operating expenses.
Outline
Introduction
Security via SDN
Threats
Mininet
Future work
Conclusion
Threats
Traditional networks have inherited protections, proprietary nature of
network devices, the heterogeneity of software, and the decentralized
structure of the control plane represent defences against common threats.
A common standard (e.g., OpenFlow) among vendors and clients can also
increase the risk.
Softwares are always subject to bugs and a score of other vulnerabilities.
Centralization of the “network intelligence” in implies that anyone with
access to the servers that host the control software can potentially control
the entire network.
Concerns
Diego Kreutz, Fernando M. V. Ramos and Paulo Verissimo, “Towards Secure and Dependable Software-Defined
Networks”, ACM August 16, 2013
Can be used to target switches and controllers
This threat can be triggered by faulty (non-malicious) devices or by a
malicious user.
An attacker can use network elements to launch a DoS attack against
OpenFlow switches by exhausting TCAMs or controller resources
Faked traffic flows
Threats
1
The use of intrusion detection systems could help
identify abnormal flows, or enforce a policy to bound
the rate for control plane requests.
One single switch could be used to drop or slow down packets
in the network, clone or deviate network traffic.
This is mostly performed for data theft purposes.
Attacker has the ability inject traffic or forged requests to
overload the controller or neighbouring switches.
Threats
Vulnerabilities in switches2
Mechanisms to monitor and detect abnormal
behaviour of network devices can be a useful to
defeat this kind of threats.
Diego Kreutz, Fernando M. V. Ramos and Paulo Verissimo, “Towards Secure and Dependable Software-Defined
Networks”, ACM August 16, 2013
Can be used to generate DoS attacks or for data theft.
Control plane communications rely on using TLS/SSL which is
considered a non-guarantee for secure communication.
Once an attacker gains access to the control plane, it may be
capable of aggregating enough power force (in terms of the
number of switches under its control) to launch DDoS attacks.
Threats
Attacks on control plane communications3
The use of automated device association
mechanisms may be considered, dedicated to
guarantee trust between the control plane and data
plane devices.
The most severe threats to SDNs as a malicious controller could compromise the
entire network
Use of a common intrusion detection system isn’t a solution, as it is practically
hard to find the exact combination of events that trigger a particular behavior to
label a controller as malicious
Similarly, a malicious application can potentially do anything it pleases in the
network.
Threats
Vulnerabilities in controllers4
Security policies enforcing correct behavior might be
mapped onto those techniques, restricting which
interfaces an application can use and what kind of
rules it can generate to program the network.
Diego Kreutz, Fernando M. V. Ramos and Paulo Verissimo, “Towards Secure and Dependable Software-Defined
Networks”, ACM August 16, 2013
There is a lack of mechanisms to ensure trust between
the controller and management applications.
The techniques used to certify network devices are
different from those used for applications.
.
Threats
Management applications5
Mechanisms for autonomic trust management could
be used to guarantee that the application is trusted
during its lifetime.
Used in SDNs to access the network controller
These machines are already an exploitable target in
traditional networks, what makes it worse being that
the threat surface as seen from a single compromised
machine increases dramatically in SDNs.
Threats
Vulnerabilities in administrative stations6
The use of protocols requiring more than one
credential verification.
Diego Kreutz, Fernando M. V. Ramos and Paulo Verissimo, “Towards Secure and Dependable Software-Defined
Networks”, ACM August 16, 2013
Forensics and remediation would allow to understand the cause of a detected problem and
proceed to a fast and secure mode recovery.
There is a lack of trusted resources for forensics and remediation in SDN.
In order to investigate and establish facts about an incident, we need reliable information from all
components of the network
This data will only be useful if its trustworthiness (integrity, authenticity, etc.) can be assured.
Remediation requires safe and reliable system snapshots to guarantee a fast and correct recovery
of network elements to a known working state.
Threats
Forensics and remediation7
In order to be effective, logging and tracing should be
indelible. Furthermore, logs should be stored in
remote and secure environments.
Slide by Nick McKeown
Future Work
Controllers are designed in order that they can be easily
replicated, are capable of interoperating and providing
support to execute applications across controllers.
The switches will also need to be able to dynamically
associate with more than one controller.
Diversity helps improve the robustness of the system.
In summary, replication, diversity, dynamic switch
association
Security and Dependability
Conclusion
We have been introduced to SDN which is a new paradigm in networking
that is needed for today’s applications.
OpenFlow made SDN possible but it haven’t been designed with security
in mind.
SDN is vulnerable to several threats but enough work can be done to
mitigate this.
A handy tool to emulate SDN and examine new schemes in networks
before deployment.
There is research trend to design security schemes for SDN before widely
deploying it.
References
https://www.opennetworking.org/
An attempt to motivate and clarify Software-Defined
Networking (SDN), video by Professor Scott Shenker
Diego Kreutz, Fernando M. V. Ramos and Paulo Verissimo,
“Towards Secure and Dependable Software-Defined
Networks”, ACM August 16, 2013
Questions
Thank you

More Related Content

DOCX
SDN-Security
Paras Hematbhai Dudhatra
 
PPTX
The Potential Impact of Software Defined Networking SDN on Security
Brent Salisbury
 
PDF
SDN Security: Two Sides of the Same Coin
Zivaro Inc
 
ODP
OWASP Brisbane - SDN Security
David Jorm
 
PDF
SDN Security Talk - (ISC)2_3
Wen-Pai Lu
 
PDF
Sdn&security
Cristiano Monteiro
 
PPT
Security of software defined networking (sdn) and cognitive radio network (crn)
Ameer Sameer
 
PPTX
SDN - a new security paradigm?
Sophos Benelux
 
The Potential Impact of Software Defined Networking SDN on Security
Brent Salisbury
 
SDN Security: Two Sides of the Same Coin
Zivaro Inc
 
OWASP Brisbane - SDN Security
David Jorm
 
SDN Security Talk - (ISC)2_3
Wen-Pai Lu
 
Sdn&security
Cristiano Monteiro
 
Security of software defined networking (sdn) and cognitive radio network (crn)
Ameer Sameer
 
SDN - a new security paradigm?
Sophos Benelux
 

What's hot (20)

PDF
Attacking SDN infrastructure: Are we ready for the next gen networking
Priyanka Aash
 
PDF
Security Advantages of Software-Defined Networking
Priyanka Aash
 
PDF
44CON & Ruxcon: SDN security
David Jorm
 
PPTX
Software defined networking players
Ameer Sameer
 
PPTX
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware
 
PPTX
SDN: is it a solution for network security?
ARCCN
 
PDF
SDN-ppt-new
Gifty Susan Mani
 
PDF
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Siyabonga Masuku
 
PPTX
BsidesSP: Pentesting in SDN - Owning the Controllers
Roberto Soares
 
PPTX
Software Defined Network (SDN)
Ahmed Ayman
 
PPTX
Software defined security-framework_final
Lan & Wan Solutions
 
PPTX
SDN_and_NFV_technologies_in_IoT_Networks
Srinivasa Addepalli
 
PDF
Software Defined Networking (SDN) Technology Brief
Zivaro Inc
 
PDF
IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networ...
Open Networking Perú (Opennetsoft)
 
PDF
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET Journal
 
PPTX
SDN Abstractions
martin_casado
 
PPTX
Sdn ppt
Pallavi Chhikara
 
PPTX
Software defined networking(sdn) vahid sadri
Vahid Sadri
 
PPTX
Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...
University of Technology - Iraq
 
PPTX
Software Defined Networks
Shreeya Shah
 
Attacking SDN infrastructure: Are we ready for the next gen networking
Priyanka Aash
 
Security Advantages of Software-Defined Networking
Priyanka Aash
 
44CON & Ruxcon: SDN security
David Jorm
 
Software defined networking players
Ameer Sameer
 
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware
 
SDN: is it a solution for network security?
ARCCN
 
SDN-ppt-new
Gifty Susan Mani
 
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Siyabonga Masuku
 
BsidesSP: Pentesting in SDN - Owning the Controllers
Roberto Soares
 
Software Defined Network (SDN)
Ahmed Ayman
 
Software defined security-framework_final
Lan & Wan Solutions
 
SDN_and_NFV_technologies_in_IoT_Networks
Srinivasa Addepalli
 
Software Defined Networking (SDN) Technology Brief
Zivaro Inc
 
IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networ...
Open Networking Perú (Opennetsoft)
 
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET Journal
 
SDN Abstractions
martin_casado
 
Software defined networking(sdn) vahid sadri
Vahid Sadri
 
Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...
University of Technology - Iraq
 
Software Defined Networks
Shreeya Shah
 
Ad

Viewers also liked (7)

PDF
Mininet: Moving Forward
ON.Lab
 
PDF
How to use miniedit
Takuji IIMURA
 
PDF
Lab 5: Interconnecting a Datacenter using Mininet
Zubair Nabi
 
PDF
SDN and Mininet: Some Basic Concepts
Eswar Publications
 
DOCX
SDN Training - Open daylight installation + example with mininet
SAMeh Zaghloul
 
PPTX
Opendaylight SDN Controller
Sumit Arora
 
PPTX
OpenDaylight app development tutorial
SDN Hub
 
Mininet: Moving Forward
ON.Lab
 
How to use miniedit
Takuji IIMURA
 
Lab 5: Interconnecting a Datacenter using Mininet
Zubair Nabi
 
SDN and Mininet: Some Basic Concepts
Eswar Publications
 
SDN Training - Open daylight installation + example with mininet
SAMeh Zaghloul
 
Opendaylight SDN Controller
Sumit Arora
 
OpenDaylight app development tutorial
SDN Hub
 
Ad

Similar to Sdn pres v2-Software-defined networks (20)

PDF
Security of software defined networks: evolution and challenges
International Journal of Reconfigurable and Embedded Systems
 
PDF
Final_Report
Tlhologelo Mphahlele
 
PDF
Protecting location privacy in sensor networks against a global eavesdropper
Shakas Technologies
 
PDF
Protecting location privacy in sensor networks against a global eavesdropper
Shakas Technologies
 
PDF
Enhancing Security in OpenFlow
Niketa Chellani
 
PDF
Open Programmable Architecture for Java-enabled Network Devices
Tal Lavian Ph.D.
 
DOC
Unified Security Plugin for Opendaylight Controller
Saikat Chaudhuri
 
PPTX
Firewall
trilokchandra prakash
 
PDF
A review on software defined network security risks and challenges
TELKOMNIKA JOURNAL
 
DOC
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
DMV SAI
 
DOC
Agent based intrusion detection, response and blocking using signature method...
Mumbai Academisc
 
DOCX
Software Defined Networking Attacks and Countermeasures .docx
rosemariebrayshaw
 
PDF
Security sdn
Priya Singh
 
DOCX
Detecting_and_Mitigating_Botnet_Attacks_in_Software-Defined_Networks_Using_De...
Shakas Technologies
 
PPTX
Software_Defined_Networking.pptx
AsfawGedamu
 
PDF
A Novel SDN Architecture for IoT Security
ijtsrd
 
DOCX
Infrastructure SecurityChapter 10Principles of Compute.docx
annettsparrow
 
PPTX
Lqsqsssssssssssssssssssssssssssssssssssq18.pptx
pfeprojet
 
PDF
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET Journal
 
PDF
Provide a diagram and description of the flow table entries that can.pdf
arihantelehyb
 
Security of software defined networks: evolution and challenges
International Journal of Reconfigurable and Embedded Systems
 
Final_Report
Tlhologelo Mphahlele
 
Protecting location privacy in sensor networks against a global eavesdropper
Shakas Technologies
 
Protecting location privacy in sensor networks against a global eavesdropper
Shakas Technologies
 
Enhancing Security in OpenFlow
Niketa Chellani
 
Open Programmable Architecture for Java-enabled Network Devices
Tal Lavian Ph.D.
 
Unified Security Plugin for Opendaylight Controller
Saikat Chaudhuri
 
A review on software defined network security risks and challenges
TELKOMNIKA JOURNAL
 
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
DMV SAI
 
Agent based intrusion detection, response and blocking using signature method...
Mumbai Academisc
 
Software Defined Networking Attacks and Countermeasures .docx
rosemariebrayshaw
 
Security sdn
Priya Singh
 
Detecting_and_Mitigating_Botnet_Attacks_in_Software-Defined_Networks_Using_De...
Shakas Technologies
 
Software_Defined_Networking.pptx
AsfawGedamu
 
A Novel SDN Architecture for IoT Security
ijtsrd
 
Infrastructure SecurityChapter 10Principles of Compute.docx
annettsparrow
 
Lqsqsssssssssssssssssssssssssssssssssssq18.pptx
pfeprojet
 
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET Journal
 
Provide a diagram and description of the flow table entries that can.pdf
arihantelehyb
 

More from ahmad abdelhafeez (20)

PPTX
Surveying cross layer protocols in ws ns
ahmad abdelhafeez
 
PDF
Service level management
ahmad abdelhafeez
 
PDF
Energy harvesting sensor nodes
ahmad abdelhafeez
 
PDF
V5I3_IJERTV5IS031157
ahmad abdelhafeez
 
DOC
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
ahmad abdelhafeez
 
PDF
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
ahmad abdelhafeez
 
PPTX
Energy conservation in wireless sensor networks
ahmad abdelhafeez
 
PPT
Localization in wsn
ahmad abdelhafeez
 
PPTX
Routing
ahmad abdelhafeez
 
PPTX
Wsn security issues
ahmad abdelhafeez
 
PPTX
Trusted systems
ahmad abdelhafeez
 
PPTX
Wsn security issues
ahmad abdelhafeez
 
PPSX
Intrusion prevension
ahmad abdelhafeez
 
PPTX
Digital forensics ahmed emam
ahmad abdelhafeez
 
PDF
Digital forensics.abdallah
ahmad abdelhafeez
 
PPT
Cloud computing final show
ahmad abdelhafeez
 
PPT
Incident handling.final
ahmad abdelhafeez
 
PPTX
Malewareanalysis presentation
ahmad abdelhafeez
 
PPTX
pentration testing
ahmad abdelhafeez
 
Surveying cross layer protocols in ws ns
ahmad abdelhafeez
 
Service level management
ahmad abdelhafeez
 
Energy harvesting sensor nodes
ahmad abdelhafeez
 
V5I3_IJERTV5IS031157
ahmad abdelhafeez
 
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
ahmad abdelhafeez
 
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
ahmad abdelhafeez
 
Energy conservation in wireless sensor networks
ahmad abdelhafeez
 
Localization in wsn
ahmad abdelhafeez
 
Wsn security issues
ahmad abdelhafeez
 
Trusted systems
ahmad abdelhafeez
 
Wsn security issues
ahmad abdelhafeez
 
Intrusion prevension
ahmad abdelhafeez
 
Digital forensics ahmed emam
ahmad abdelhafeez
 
Digital forensics.abdallah
ahmad abdelhafeez
 
Cloud computing final show
ahmad abdelhafeez
 
Incident handling.final
ahmad abdelhafeez
 
Malewareanalysis presentation
ahmad abdelhafeez
 
pentration testing
ahmad abdelhafeez
 

Recently uploaded (20)

PPTX
quantum computing transition from classical mechanics.pptx
gvlbcy
 
PPTX
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
PDF
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 
PDF
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
PPTX
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PDF
The Effect of Artifact Removal from EEG Signals on the Detection of Epileptic...
Partho Prosad
 
PDF
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
PDF
20ME702-Mechatronics-UNIT-1,UNIT-2,UNIT-3,UNIT-4,UNIT-5, 2025-2026
Mohanumar S
 
PDF
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
DOCX
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
PDF
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
PDF
Chad Ayach - A Versatile Aerospace Professional
Chad Ayach
 
PPTX
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
PDF
STUDY OF NOVEL CHANNEL MATERIALS USING III-V COMPOUNDS WITH VARIOUS GATE DIEL...
ijoejnl
 
PPT
Understanding the Key Components and Parts of a Drone System.ppt
Siva Reddy
 
PPTX
sunil mishra pptmmmmmmmmmmmmmmmmmmmmmmmmm
singhamit111
 
PPTX
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
PPTX
Information Retrieval and Extraction - Module 7
premSankar19
 
PDF
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
ijcncjournal019
 
quantum computing transition from classical mechanics.pptx
gvlbcy
 
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
The Effect of Artifact Removal from EEG Signals on the Detection of Epileptic...
Partho Prosad
 
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
20ME702-Mechatronics-UNIT-1,UNIT-2,UNIT-3,UNIT-4,UNIT-5, 2025-2026
Mohanumar S
 
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
Chad Ayach - A Versatile Aerospace Professional
Chad Ayach
 
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
STUDY OF NOVEL CHANNEL MATERIALS USING III-V COMPOUNDS WITH VARIOUS GATE DIEL...
ijoejnl
 
Understanding the Key Components and Parts of a Drone System.ppt
Siva Reddy
 
sunil mishra pptmmmmmmmmmmmmmmmmmmmmmmmmm
singhamit111
 
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
Information Retrieval and Extraction - Module 7
premSankar19
 
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
ijcncjournal019
 

Sdn pres v2-Software-defined networks

  • 1. SDN security Supervised by Dr Ashraf Tammam prepared by Mahmoud Fathy
  • 4. Software-defined networks Network operators need to configure each individual network device separately using vendor specific commands. Networks are dynamic, and operators have little or no mechanisms to automatically respond to network events. With an SDN, network flows are controlled at the level of the global network abstraction, rather than at the level of the individual devices, usually, but not necessarily, with the aid of the OpenFlow protocol. Network devices become simple forwarding devices. The control logic is implemented in a logical controller. Introduction
  • 5. Software-defined networks Separation of the control plane from the data plane that lays the ground to the Software Defined Networking paradigm. Data plane is responsible for packet forwarding and it is widely known by its OSI seven layers. Control plane serves the Data plane, it shapes the traffic that the network exists to carry. Introduction
  • 6. Software-defined networks Traditional networks Operating system Specialised packet forwarding hardware Operating system Specialised packet forwarding hardware Operating system Specialised packet forwarding hardware Operating system Specialised packet forwarding hardware Operating system Specialised packet forwarding hardware SSH/CLI
  • 7. Software-defined networks packet forwarding hardware packet forwarding hardware packet forwarding hardware packet forwarding hardware packet forwarding hardware Network Operating System runs Controller App App App southbound API northbound API
  • 8. Slide by Nick McKeown
  • 10. Software-defined networks Open Networking Foundation (ONF) is a user-driven organization dedicated to the promotion and adoption of Software-Defined Networking (SDN) through open standards development. Working groups continue to analyze SDN requirements, evolve the OpenFlow Standard to address the needs of commercial deployments, and research new standards to expand SDN benefits. website: opennetworking.org Open networking foundation
  • 11. Software-defined networks Open networking foundation Open Networking Foundation (ONF) is a user-driven organization dedicated to the promotion and adoption of Software-Defined Networking (SDN) through open standards development. Working groups continue to analyze SDN requirements, evolve the OpenFlow Standard to address the needs of commercial deployments, and research new standards to expand SDN benefits. website: opennetworking.org
  • 12. Software-defined networks An open interface to packet forwarding, not the standard but it is the most widespread used. The origins of OpenFlow, when a PhD student at Stanford University developed something called Ethane, intended as a way of centrally managing global policy. That idea eventually led to what become known as OpenFlow, thanks to more research conducted jointly by teams at Stanford and the University of California, Berkeley. This is how the controller configures the switches’ Flow tables. OpenFlow
  • 13. Software-defined networks Network Operating System App features Operating System (Windows, Linux or Mac) CPU (Intel, AMD) OpenFlow Instruction set OpenFlow analogy
  • 14. Software-defined networks OpenFlow Header Payload Match Match on any header, or new header Action Forward to port(s), drop, send to controller. Overwrite header. Forward at specific bit-rate.
  • 16. Software-defined networks Network Operating System Control Program OpenFlow IF header = x, forward to port 4 IF header = y, overwrite header with q then forward to port 5 IF header = other, forward to me Flow Tabl e
  • 17. Software-defined networks Advantages Greater agility resulting from reduced reliance on switch installation and configuration, and centralised management and control.
  • 18. Software-defined networks Advantages An OpenFlow-only switch would be extremely simple and inexpensive to build 10 Gigabit Ethernet OpenFlow switch from IBM
  • 19. Software-defined networks Advantages Reduced dependence on vendors’ equipment product cycles.
  • 20. Software-defined networks Advantages The centralization of the control logic in a controller with global knowledge of the network state simplifies the development of more sophisticated network functions. http://sourceforge.net/projects/itransformer/
  • 21. Software-defined networks Advantages Enabling the introduction of sophisticated network policies simultaneously with the operation (e.g., security, resource control, prioritization). Connect Load balance Secure …
  • 22. Software-defined networks Other advantages A control program can automatically react to spurious changes of the network state. Easier to test and deploy newly researched protocols. Facilitates troubleshooting. One advantage of this capability is that it enables the network to dynamically respond to application requirements.
  • 26. Software-defined networks Empower network owners/operators. Increase the pace of innovation. Diversify the supply chain. Build a robust foundation. How SDN will shape networking
  • 28. Security via SDN In SDN, we have the flexibility to program the security set of APIs Network OS Network Features OpenFlow
  • 29. Security via SDN This reduces security expenses by limiting the need to purchase new hardware.
  • 30. Security via SDN The controller has a full view of the network which gives it an advantage implementing security policies.
  • 32. Security via SDN Control of multiple simultaneous security policies thro Authentication IPS Firewall … Controller
  • 33. Security via SDN No need to have dedicated tap devices as it can be replaced by openflow instructions. Match any, forward to A A
  • 34. Security via SDN It allows us to build vague boundaries make it impossible to determine where security devices, such as firewalls, are deployed. Attacker
  • 35. Security via SDN It allows us to build vague boundaries make it impossible to determine where security devices, such as firewalls, are deployed. Attacker Where ?! Firewall functionality is distributed on switches
  • 36. Security via SDN A scheme proposed by ONF, Automated Malware Quarantine (AMQ). AMQ detects and isolates insecure network devices. It identifies the problem and automatically downloads the necessary patches to resolve it. After the threat has been contained, AMQ software automatically allows the device to rejoin the network. It has the potential to reduce operating expenses.
  • 38. Threats Traditional networks have inherited protections, proprietary nature of network devices, the heterogeneity of software, and the decentralized structure of the control plane represent defences against common threats. A common standard (e.g., OpenFlow) among vendors and clients can also increase the risk. Softwares are always subject to bugs and a score of other vulnerabilities. Centralization of the “network intelligence” in implies that anyone with access to the servers that host the control software can potentially control the entire network. Concerns
  • 39. Diego Kreutz, Fernando M. V. Ramos and Paulo Verissimo, “Towards Secure and Dependable Software-Defined Networks”, ACM August 16, 2013
  • 40. Can be used to target switches and controllers This threat can be triggered by faulty (non-malicious) devices or by a malicious user. An attacker can use network elements to launch a DoS attack against OpenFlow switches by exhausting TCAMs or controller resources Faked traffic flows Threats 1 The use of intrusion detection systems could help identify abnormal flows, or enforce a policy to bound the rate for control plane requests.
  • 41. One single switch could be used to drop or slow down packets in the network, clone or deviate network traffic. This is mostly performed for data theft purposes. Attacker has the ability inject traffic or forged requests to overload the controller or neighbouring switches. Threats Vulnerabilities in switches2 Mechanisms to monitor and detect abnormal behaviour of network devices can be a useful to defeat this kind of threats.
  • 42. Diego Kreutz, Fernando M. V. Ramos and Paulo Verissimo, “Towards Secure and Dependable Software-Defined Networks”, ACM August 16, 2013
  • 43. Can be used to generate DoS attacks or for data theft. Control plane communications rely on using TLS/SSL which is considered a non-guarantee for secure communication. Once an attacker gains access to the control plane, it may be capable of aggregating enough power force (in terms of the number of switches under its control) to launch DDoS attacks. Threats Attacks on control plane communications3 The use of automated device association mechanisms may be considered, dedicated to guarantee trust between the control plane and data plane devices.
  • 44. The most severe threats to SDNs as a malicious controller could compromise the entire network Use of a common intrusion detection system isn’t a solution, as it is practically hard to find the exact combination of events that trigger a particular behavior to label a controller as malicious Similarly, a malicious application can potentially do anything it pleases in the network. Threats Vulnerabilities in controllers4 Security policies enforcing correct behavior might be mapped onto those techniques, restricting which interfaces an application can use and what kind of rules it can generate to program the network.
  • 45. Diego Kreutz, Fernando M. V. Ramos and Paulo Verissimo, “Towards Secure and Dependable Software-Defined Networks”, ACM August 16, 2013
  • 46. There is a lack of mechanisms to ensure trust between the controller and management applications. The techniques used to certify network devices are different from those used for applications. . Threats Management applications5 Mechanisms for autonomic trust management could be used to guarantee that the application is trusted during its lifetime.
  • 47. Used in SDNs to access the network controller These machines are already an exploitable target in traditional networks, what makes it worse being that the threat surface as seen from a single compromised machine increases dramatically in SDNs. Threats Vulnerabilities in administrative stations6 The use of protocols requiring more than one credential verification.
  • 48. Diego Kreutz, Fernando M. V. Ramos and Paulo Verissimo, “Towards Secure and Dependable Software-Defined Networks”, ACM August 16, 2013
  • 49. Forensics and remediation would allow to understand the cause of a detected problem and proceed to a fast and secure mode recovery. There is a lack of trusted resources for forensics and remediation in SDN. In order to investigate and establish facts about an incident, we need reliable information from all components of the network This data will only be useful if its trustworthiness (integrity, authenticity, etc.) can be assured. Remediation requires safe and reliable system snapshots to guarantee a fast and correct recovery of network elements to a known working state. Threats Forensics and remediation7 In order to be effective, logging and tracing should be indelible. Furthermore, logs should be stored in remote and secure environments.
  • 50. Slide by Nick McKeown
  • 51. Future Work Controllers are designed in order that they can be easily replicated, are capable of interoperating and providing support to execute applications across controllers. The switches will also need to be able to dynamically associate with more than one controller. Diversity helps improve the robustness of the system. In summary, replication, diversity, dynamic switch association Security and Dependability
  • 52. Conclusion We have been introduced to SDN which is a new paradigm in networking that is needed for today’s applications. OpenFlow made SDN possible but it haven’t been designed with security in mind. SDN is vulnerable to several threats but enough work can be done to mitigate this. A handy tool to emulate SDN and examine new schemes in networks before deployment. There is research trend to design security schemes for SDN before widely deploying it.
  • 53. References https://www.opennetworking.org/ An attempt to motivate and clarify Software-Defined Networking (SDN), video by Professor Scott Shenker Diego Kreutz, Fernando M. V. Ramos and Paulo Verissimo, “Towards Secure and Dependable Software-Defined Networks”, ACM August 16, 2013