Sunteți pe pagina 1din 10

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/282183741

Securing Software Defined Networks

Data · September 2015

CITATIONS READS

0 1,401

1 author:

Adnan Akhunzada
University of Malaya
55 PUBLICATIONS   278 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Secure design and modelling Software Defined Networks. View project

Optimizing SIEM throughput View project

All content following this page was uploaded by Adnan Akhunzada on 26 September 2015.

The user has requested enhancement of the downloaded file.


AKHUNZADA_LAYOUT_Author Layout 4/1/15 1:57 PM Page 36

SECURITY AND PRIVACY IN EMERGING NETWORKS

Securing Software Defined Networks:


Taxonomy, Requirements, and
Open Issues
Adnan Akhunzada, Ejaz Ahmed, Abdullah Gani, Muhammad Khurram Khan, Muhammad Imran,
and Sghaier Guizani

ABSTRACT forwarding the traffic; however, the control


functionality is simply shifted to a centralized
The emergence of SDNs promises to dramat- logical controller. Moving the control logic to an
ically simplify network management and enable external entity known as an SDN controller pro-
innovation through network programmability. vides an abstract view of the underlying network
Despite all the hype surrounding SDNs, exploit- resources to achieve smooth facilitation of the
ing its full potential is demanding. Security is programming of forwarding hardware. More-
still the key concern and is an equally striking over, the abstraction of flow broadly unifies the
challenge that reduces the growth of SDNs. behavior of different SDN agents. Obviously,
Moreover, the deployment of novel entities and these remarkable features of SDN provide a
the introduction of several architectural compo- more flexible, programmable, vendor-agnostic,
nents of SDNs pose new security threats and vul- cost-effective, and innovative network architec-
nerabilities. Besides, the landscape of digital ture. In spite of all these exciting features of
threats and cyber-attacks is evolving tremen- SDN, industry observers are apprehensive about
dously, considering SDNs as a potential target to the security of SDNs. The security of SDNs is
have even more devastating effects than using still considered the topmost priority, and a key
simple networks. Security is not considered as concern and an equally arresting challenge have
part of the initial SDN design; therefore, it must recently begun to receive the attention they
be raised on the agenda. This article discusses deserve. Industry experts strongly believe that
the state-of-the-art security solutions proposed security issues surrounded by SDNs must be
to secure SDNs. We classify the security solu- thoroughly addressed.
tions in the literature by presenting a thematic Besides, the architecture of SDNs poses new
taxonomy based on SDN layers/interfaces, secu- external and internal threats and vulnerabilities
rity measures, simulation environments, and [1]. Predominantly, the integrity and security of
security objectives. Moreover, the article points SDNss remain unproven when it comes to the
out the possible attacks and threat vectors tar- placement of management functionality in a
geting different layers/interfaces of SDNs. The single centralized virtual server. Subsequently,
potential requirements and their key enablers compromising the whole network through a sin-
Adnan Akhunzada, Ejaz for securing SDNs are also identified and pre- gle point of failure is much easier. Moreover, it
Ahmed, and Abdullah sented. Also, the article gives great guidance for becomes the primary potential attack target.
Gani are with the secure and dependable SDNs. Finally, we discuss The programmability aspect of SDNs also
University of Malay. open issues and challenges of SDN security that makes them more vulnerable to a number of
may be deemed appropriate to be tackled by malicious code exploits and attacks. Further-
Muhammad Khurram researchers and professionals in the future. more, the abstraction of different available
Khan and Muhammad flows and underlying hardware resources at the
Imran are with King Saud INTRODUCTION SDN controller significantly supports harvesting
University. intelligence from the existing resources. After-
The emergence of the software defined net- ward, it can be effortlessly used for further
Sghaier Guizani is with working (SDN) paradigm has created great attacks, exploitations, and particularly repro-
Alfaisal University. potential and hope to overcome the need for gramming the entire network. Likewise, the
flexible, secure, reliable, and well managed next- southbound interface of an SDN can also easily
The authors extend their generation networks. The revolutionary concept be targeted with diverse denial of service and
sincere appreciations to of SDN has brought radical change to the tradi- side channel attacks. Equally important, config-
the Deanship of Scientif- tional vertical integration of the network by uration errors of SDNs can have more serious
ic Research at King Saud decoupling the forwarding hardware (data consequences than in traditional networks.
University for its funding plane) from the control logic of the network Besides, SDN agents can also potentially be tar-
this Prolific Research (control plane) [1]. Subsequently, just the geted for injecting false flows. Keeping in view
Group (PRG-1436-16). switches and routers are held responsible for the SDN features and architecture, cyber-

36 0163-6804/15/$25.00 © 2015 IEEE IEEE Communications Magazine • April 2015


AKHUNZADA_LAYOUT_Author Layout 3/31/15 2:05 PM Page 37

attacks launched through SDNs can have even


more devastating and larger effects than using Application plane SDN services and applications
simple networks.
Since security is not considered initially as Northbound SDN APIs
part of SDN design, each layer of an SDN has Control plane SDN control plane
its own security implications and requirements.
Moreover, establishing trust throughout an SDN Southbound SDN APIs
is even more critical. Likewise, the network Data forwarding elements,
essentially needs a dynamic forensic remediation e.g. OpenFlow switches SDN data plane
and robust policy frameworks ensuring the right
direction of the controller. Although security
SDN-enabled switches
should be built in as part of SDN architecture, it
must also be delivered as a service to ensure the Data plane
privacy and integrity of all the connected
resources. Some researchers claim that we are Network
still far away from secure and dependable SDN infrastructure
architecture. On the contrary, it is also comple-
mentary to say that SDN can be better used to WiFi access Cellular access
enhance and implement security; meanwhile,
security of the SDN itself becomes a priority.
SDN certainly necessitates a simple, cost-effec- Figure 1. A simplified view of SDN architecture.
tive, scalable, and efficient secure environment.
The contributions of this survey are manifold:
• A critical discussion on the state-of-the-art The application plane is also known as the
SDN security solutions is given. These solu- application layer, which provides a set of services
tions depict the current state of SDNs in and applications such as an intrusion detection
terms of security. system (IDS), intrusion prevention system (IPS),
• The distinguishing aspect of our work is the deep packet inspection (DPI), load balancers,
classification of surveyed security solutions security monitoring, and access controls. The
by devising a thematic taxonomy based on second most important component of the net-
SDN layers/ interfaces, security measures, work is the control plane, which is also known as
simulation or testbed environment, and the control layer of SDN. The control layer is
security objectives. the central layer and comprises the controller.
• The possible attacks and threat vectors tar- The controller is a software platform and is con-
geting various layers/ interfaces of the SDNs sidered the brain of an SDN. This is the central
are identified and highlighted. decision point and is responsible for establishing
• The potential security implications and and terminating flows and paths in SDNs. The
requirements with their key enablers for management functionality of SDN is simply
secure and dependable SDNs are also iden- placed in the central logical controller, which
tified and presented. also facilitates the network’s programmability.
• Finally, we present open security issues This layer also provides an abstraction of the
raised in SDNs for security researchers and underlying resources.
practitioners around the globe. Moreover, the data plane comprises the
The remainder of this article is organized as underlying network infrastructures and is known
follows. We introduce a simplified overview of as the infrastructure layer of SDN. This layer
SDN architecture to provide the fundamental comprises the forwarding hardware such as
background to the reader. We then present the switches and routers. Since the control function-
state-of-the-art security solutions. Next, thematic ality is placed in the controller, the underlying
taxonomy of SDN security solutions is devised. hardware is only held responsible for forwarding.
We discuss the security threats and possible The infrastructure layer implements the manage-
attacks on SDNs. We also discuss the require- ment functionality of the controller through
ments and key enablers for SDN security. We SDN-enabled switches to forward the data, col-
highlight open issues in securing SDNs, and the lect the network information, and send it to the
article is concluded. control layer. The southbound interface is an
application programming interface (API) that
provides a link between the control layer and the
A SIMPLIFIED VIEW OF infrastructure layer. However, the northbound
interface enables communication between the
SDN ARCHITECTURE control layer and application layer.
This section provides a brief fundamental discus-
sion of SDN architecture so that readers can
better comprehend the security concerns with STATE-OF-THE-ART
respect to SDN architecture. SDN is an emerg-
ing networking paradigm that separates the con-
SDN SECURITY SOLUTIONS
trol plane from the data plane and provides In this section, we present state-of-the-art securi-
programming ability on the control plane [1] . ty solutions for securing SDNs. Although SDNs
The most simplified view of the SDN architec- are not mature enough and security is not con-
ture mainly comprises three planes with their sidered as part of the initial design, the literature
corresponding connected interfaces, as shown in clearly shows that two opinions exist in the
Fig. 1. research community. One trend in research is

IEEE Communications Magazine • April 2015 37


AKHUNZADA_LAYOUT_Author Layout 3/31/15 2:05 PM Page 38

SDN layer/interface
SDN is an emerging Security
Security
solution
networking solutions Application Northbound Control Southbound Data
classification
paradigm that layer interface layer interface layer

separates the control FRESCO    


plane from the data Secure design
plane and provides FortNox   

programming ability Verificare    


on the control plane. Security audit
The most simplified
SDN Debugger  

view of the SDN FLOVER    


architecture mainly Security
enforcement PermOF    
comprises of three policy
planes with their cor- VeriFlow    
responding connect-
FleXam    
ed interfaces.
Security
enhancement
CloudWatcher    

L-IDS    

OpenWatch    

Security AVANT-GUARD   
analysis
Header Space
   
Analysis

Table 1. Comparison of state-of-the-art SDN security solutions.

more curious about securing SDNs. On the con- IMPLEMENTATION OF SATISFACTORY AUDIT
trary, the other school of thought believes the
use of SDNs improve and enhance security. R. Skowyra et al. developed a model that satis-
Table 1 presents a comparative summary of the fies all requirements of a system design [4]. They
state-of-the-art SDN security solutions. discuss an infrastructure tool to specify and ana-
Some of the state-of-the-art solutions for lyze a real environment without relying on previ-
securing SDNs are discussed below. ous knowledge of formal languages or logic. The
authors further give an example of using an
SECURE DESIGN OF SDN OpenFlow-based network of learning switches to
The efforts put forward for a secure design of enable communication between mobile nodes.
SDN are extremely limited. Shin et al. propose This proposal considers the verification of net-
FRESCO, a security-specific application devel- work correctness and specification modeling
opment framework for OpenFlow networks [2]. while considering the scalability issues of Open-
FRESCO facilitates exporting the application Flow networks. Another contribution is present-
programming interface (API) scripts, which ed in [5], which allows the software developers
enables security experts to develop threat detec- of the SDN to trace the root cause of bugs by
tion logic and security monitoring as program- reconstructing the series of events causing that
ming libraries. However, the framework uses particular bug. The packet back-trace assists
FortNox, a security enforcement kernel [3]. It is SDN programmers in resolving logical errors,
an enforcement engine responsible for avoiding helps switch implementers to resolve the proto-
rule conflicts arising from different security col compatibility errors, and facilitates network
authorizations. The research work in this catego- operators in submitting complete bug reports to
ry is entirely based on the above two proposals vendors.
(FRESCO, FortNox) for secure design of SDNs.
The first proposal is a major contribution toward ENFORCEMENT OF SECURITY POLICY
secure programming, and has a direct impact on Enforcement of security policy is a serious issue
the application layer, control layer, and the in the dynamic environment of SDNs, and the
interfaces between the two layers except the data research community has given considerable
layer. The second proposal is more toward rule attention to this area. Son et al. [6] propose
conflicts and authorization having more of an FLOVER, a model checking system that verifies
effect on the control layer, and south and north- the flow policies against the network’s security
bound interfaces. It does not, however, improve policies. D. Kreutzer et al. [1] discuss other
the security of the application and infrastructure major contributions in this particular area. The
layers. VeriFlow scheme is used for verification of real-

38 IEEE Communications Magazine • April 2015


AKHUNZADA_LAYOUT_Author Layout 3/31/15 2:05 PM Page 39

SDNs security taxonomy The major security


objectives are
Security
auditing and
SDN layers/ Security Simulation Security
solutions accountability.
interfaces measures environments objectives
categories
The other security
Secure design Application layer Access controls NOX Accountability
objectives include
Secure rapid designing and
Mininet application
Security audit Control layer Availability development development of
OpenFlow Security secure applications,
Security enabled switches monitoring
Infrastructure Integrity
enforcement monitoring for
layer
policy
Malware
Floodlight protection security purposes,
Security South-bound Confidentiality and malware protec-
enhancement interface
Secure
Open nebula architecture tion to avoid stealthy
North-bound Intrusion detection
Security analysis interface and prevention Securing scanning and
OpenVSwitch denial of service
propagation.
OpenFlow Firewall and IPS
Forensics support security
standards
enhancement

Non-repudiation Fault tolerance

Figure 2. Taxonomy of SDN security solutions.

time invariants. The paper also presents flow- and L-IDS [1]. CloudWatcher is a framework for
based policy enforcement using language-based monitoring clouds, whereas L-IDS, a learning
security. Moreover, the authors also discuss the intrusion detection system, is a security service
verification of the isolation of program traffic. embedded to protect mobile devices in a particu-
They also present use of binary decision dia- lar location.
grams for handling the misconfiguration of intra-
switch for a single flow. SECURITY ANALYSIS
Another major security contribution is of Per- J. Wang et al. [10] propose a systematic approach
mOF [7], a fine-grained permission system that to detect and resolve conflicts in an SDN fire-
comprises a set of OF-specific permissions and a wall by checking firewall authorization space and
runtime isolation mechanism for applying the flow space. The approach searches the flow
permissions. The set of OF-specific permissions paths in the whole network and checks the paths
are designed considering four different aspects: against all firewall deny rules to determine the
• Threat model conflicts with the firewall deny rules. The con-
• Controller implementation API set flict resolution strategies vary with the opera-
• Application functional requirements tions involved in the flow entries and flow rules.
• Control messages in OpenFlow The effectiveness and efficiency of the proposed
The proposed isolation mechanism isolates the approach is investigated using header space
controller and applications in a thread container. analysis.
The applications cannot call controller proce- S. Shin et al. [11] proposed two significant
dures or directly refer to the memory of the ker- changes in SDN. One extension is to the data
nel. The application and operating system are plane, called connection migration, which signifi-
also isolated by introducing a shim layer called cantly minimizes data-to-control-plane interac-
an access control layer between them. The shim tions, which increase during denial-of-service
layer is controlled by the kernel of the con- (DoS) attacks on the southbound interface.
troller. Another extension, called an actuating trigger, is
to expedite the responsiveness to the changing
SECURITY ENHANCEMENT flow dynamics within the SDN data plane. Actu-
Sajad et al. propose FleXam [8], a sampling ating triggers are introduced over the statistics
extension for OpenFlow that provides access to collection services of the data plane. Another
the controller of OpenFlow to get packet-level credible solutions is OpenWatch [12], an adap-
information. FleXam enables the controller to tive method for flow counting to detect anoma-
sample the packets stochastically or deterministi- lies in SDN.
cally considering the application requirements.
Consequently, such applications can directly run
on a small network’s controller. Moreover, FleX-
TAXONOMY OF SDN SECURITY
am eliminates flow setup time and reduces the The taxonomy is based on the literature of SDN
control plane load. Other prominent solutions security as shown in Fig. 2. The existing solu-
for security enhancement are CloudWatcher [9] tions can be categorized based on the following

IEEE Communications Magazine • April 2015 39


AKHUNZADA_LAYOUT_Author Layout 3/31/15 2:05 PM Page 40

Protection Affected
Security threats Security requirements Targeted layers/interfaces
techniques functionalities

Operating system System integrity Application


Trusted computing All layers
alteration protection management

Software framework System integrity Application


Trusted computing All layers
alteration protection management

Robustness, system
Software failure High assurance All functionalities All layers
integrity protection

Robustness, system
Hardware failure High assurance All functionalities Control layer, data layer
integrity protection

Data integrity Resource management,


Configuration data Data integrity Control layer, control-data
functionality in SDN application
alteration protection interface, and data layer
middleware management

Configuration data Data integrity Confidentiality Control layer, control-data


Data management
extraction functionality in SDN protection interface, and data layer

Unauthorized access Deploying secure Identities verification,


All functionalities All layers and interfaces
to SDN services administration module ensuring system integrity

Data integrity
User data alteration Ensuring data integrity Data management Data layer
functionality in SDN

Masquerading as Use of digital Ensuring system integrity,


Application Control layer, control-data
authorized SDN signatures for SDN Identities verification,
management interface, and data layer
controller software modules accountability

Table 2. Security threats in SDNs.

parameters: solution categories, SDN layers/ monitoring for security purposes, and malware
interfaces, security measures, simulation envi- protection to avoid stealthy scanning and propa-
ronment, and security objectives. Secure design gation. Besides, securing the architecture of OF
is the primary issue of SDN, although it is not networks and defense against different DoS
considered as part of the initial design. There attacks are considered objectives.
are very few proposals on secure design of the
SDN. The contributions in this area are still lim-
ited, and it deserves more comprehensive SECURITY THREATS AND
research attention. Researchers have also con-
tributed toward auditing of SDN environment
POSSIBLE ATTACKS IN SDN
for security and accountability purposes. More- In this section, we present some of the possible
over, major contributions of the researcher are threats and attacks in SDN that are presented in
based on security enforcement policy, and this Tables 2 and 3, respectively. Operating system
particular area really incurs attention in the alteration represents the destruction or alteration
dynamic SDN environment. Besides, much of of components or the complete operating system
the work is done on security enhancement using of SDN elements such as a controller or for-
SDN, and very few contributions are on security warder nodes. The operating system can be made
analysis. The security solutions also address secure by ensuring system integrity, which can be
issues of different layers/interfaces of SDN. Dif- achieved by implementing trusted computing. The
ferent layers/interfaces are targeted for defense threat can target all layers of SDN and can affect
against various possible attacks and exploita- the management of running services and applica-
tions. However, these security research contribu- tions in SDNs. Software framework alteration
tions defending each layer/interface are mainly identifies the destruction or alteration of middle-
based on the broad mechanisms of security. The ware and components of the software framework.
security mechanisms are given as access control, Similar to the operating system alteration threat,
authentication, authorization, encryption, intru- the software framework alteration can also be
sion detection, intrusion prevention, and recov- made secure by protecting system integrity
ery. The taxonomy also presents classification through trusted computing. Software framework
based on the simulation/emulation environment. alteration also affects all layers of SDN.
The majority of the networks are designed fol- The software failure threat represents a gen-
lowing the OpenFlow (OF) standards to conduct eral software failure in any of the software com-
their corresponding experiments. The major ponents comprising the software framework,
security objectives are auditing and accountabili- applications, and operating system. The threat
ty. The other security objectives include rapid can be mitigated by employing high assurance
design and development of secure applications, techniques and ensuring the robustness of a sys-

40 IEEE Communications Magazine • April 2015


AKHUNZADA_LAYOUT_Author Layout 3/31/15 2:05 PM Page 41

Application Northbound Control Southbound Data


SDN layers/interfaces The threat can be
layer interface layer interface layer
mitigated by deploy-
Policy enforcement related attacks    ing a secure adminis-
Availability related attacks    tration module and
ensuring system
Authorization related attacks   
integrity. The security
Authentication related attacks    requirement for miti-
gating the threat is
Data alteration related attacks   
identification verifica-
Fake rule insertion    tion. The threat can
Nasty affect all functionali-
applications Hijacking the
   ties, and can target
controller
all layers and inter-
Side-channel attacks  faces of SDN.
Table 3. Possible security attacks in SDNs.

tem. The entire set of functionalities is affected can be mitigated by use of digital signatures of
by the software failure threat, and the threat can SDN software modules. The threat mitigation
target all layers of SDN architecture. The hard- requires the assurance of system integrity, identi-
ware failure threat represents the generic failure ties verification, and accountability. Application
of hardware in any of the components. Similar management is affected by the threat activation,
to the software failure threat, the hardware fail- which can target the control layer, control-data
ure threat can be reduced by employing high interface, and data layer of SDN.
assurance techniques and ensuring the robust- Apart from security threats, there are a num-
ness of a system. The entire set of functionalities ber of possible attacks in SDN. The checks in
is affected by the hardware failure threat, which Table 3 show these security attacks affecting the
can target control and data layers. corresponding layers/interfaces in the following
The configuration data alteration threat repre- example scenarios. Even so, these security issues
sents the destruction or alteration of configuration may potentially affect each layer/interface of the
data that is required by SDN to perform different SDN. Availability-related attacks refer to various
functions. Configuration data can be removed or DoS attacks. For example, the communication
modified from the SDN platform. The threat can flooding attack is possible between the switch and
be mitigated by ensuring data integrity in SDN the controller, and will affect all the correspond-
middleware. The threat can target the control ing three layers. However, this flooding attack can
layer, control-data interface, and data layer, and also be generated through switch flow tables,
can affect resource and application management. which will ultimately affect the data layer only.
The configuration data extraction threat is an Moreover, due to the dynamic SDN environ-
eavesdropping threat, where an attacker gathers ment, security policy enforcement related attacks
configuration data that can be used in subsequent will affect the upper three layers, if the underlying
attacks. Configuration data extraction requires two layers are not protected by Transport Layer
confidentiality protection and ensuring data Security (TLS) security or other authentication
integrity functionality in SDN. The threat targets techniques. However; the existing higher ver-
the control layer, control-data interface, and data sion of OpenFlow protocol uses TLS between
layer. Unauthorized access to SDN services identi- the data and control layer. Furthermore, autho-
fies a security breach, where an authorized SDN rization related attacks can lead to illegal access
entity can access services of SDN for which the to the controller, which will certainly affect the
entity does not have the proper access level. The lower three layers. Unauthentic applications can
threat can be mitigated by deploying a secure cause damage to the corresponding three higher
administration module and ensuring system layers. Data alteration can be done through the
integrity. The security requirement for mitigating modification of flow rules and will cause damage
the threat is identification verification. The threat to the data layer only. However, a malicious
can affect all functionalities and can target all lay- application can target all the corresponding lay-
ers and interfaces of SDN. ers, and this will remain a challenge for SDNs.
User data alteration is a threat that represents Malicious applications can be used to insert fake
the destruction or alteration of user data such as rules affecting the upper three layers/interfaces
customized profiles of user traffic. The user data and can also be used to hijack the controller,
alteration threat can be mitigated by ensuring which will affect the layers down the stream.
data integrity. The threat can affect the data man- There is also a possibility of side channel attacks.
agement and target the data layer. Masquerading For instance, an input buffer can be used for the
as an authorized SDN controller identifies the discovery of flow rules, and analyzing the time of
activation of malicious software on an SDN plat- packet processing may lead to discover the for-
form such as the controller platform. The threat warding policy.

IEEE Communications Magazine • April 2015 41


AKHUNZADA_LAYOUT_Author Layout 3/31/15 2:05 PM Page 42

controller may easily lead to harvesting the intel-


Control and ligence of the connected resources, which can be
Admin station used in further attacks and exploitations. An up-
4 management plane
to-date access control mechanism should be
deployed in the network. Moreover, flows should
be encrypted to avoid injecting malicious flows.
2 Proper authentication and authorizations should
1
be implemented to avoid side channel attacks.
SDN controller FORTIFYING SDN AGENTS
An SDN agent’s security is essential as it consti-
tutes the environment. To compromise a strong
entity such as an SDN controller, an attacker, as
Data plane
Attacker part of an attack strategy, may start to reach the
3 target by compromising any vulnerable agent of
SDN. Moreover, the consequences of the attack
SDN device SDN device SDN device must be serious, particularly when the attacker is
a “man at the end” [13]. For instance, Link
Layer Discovery Protocol packets with forged
SDN device source addresses can lead the SDN controller to
install flow rules grounded on bogus informa-
tion. Moreover, many existing switches, as part
Figure 3. An attacker searching for potential targets. of the SDN infrastructure layer, are by default in
listener mode, which may easily lead to launch-
ing malicious connections. Besides, injecting a
REQUIREMENTS AND false flow at any SDN agent can lead to its dis-
KEY ENABLERS FOR SDN SECURITY tribution to numerous agents that ultimately
cause serious disturbance. The security of SDN
To build a secure SDN environment, it is essen- agents requires deploying the latest identity
tial to ensure the security of each and every management, threat isolation, and mitigation
component of SDN. Following are some of the techniques. Moreover, an SDN agent also
essential security requirements for securing the requires physical security. Also, IPS, IDS, and
SDN key components. Figure 3 depicts the firewalls should be actively deployed.
attacker searching for the potential components
of SDNs to be compromised. HARDENING APPLICATION PROGRAMMING
INTERFACES AND
SECURING THE SDN CONTROLLER
COMMUNICATION CHANNELS
Securing the SDN controller is the top priority.
The SDN controller is responsible for the overall Application programming interfaces (APIs) can
management of the network. Moreover, the con- also be a potential target for attackers. Most
troller is a central decision point. The compro- importantly, southbound APIs can easily be tar-
mise of a centralized SDN controller can simply geted for different DoS attacks to make the
lead to the disaster of the entire network. whole network unavailable. Building malicious
Besides, being a single point of failure, it serves APIs by skilled programmers is more critical,
as a potential target for attackers. The availabili- and the trend is already in the security research
ty of the SDN controller is of serious concern community. The communication channel
for the whole network. The SDN controller, as a between each layer must be well protected; for
software platform, essentially supports a hacker example, in the OpenFlow protocol, it is protect-
in reconfiguring the complete network. By spoof- ed by TLS. However, OpenFlow must not be the
ing the address of an SDN controller, an attack- only protocol considered for SDN; there can be
er can simply take over the entire network by other options. The security measures include
means of a fake controller. This key component secure coding, deployment of integrity checks,
deeply needs defense in depth, which may and, most important, digital signing of the code.
include the protection of the system containing Moreover, the communication channels can be
the SDN controller from physical and external hardened using TLS security.
threats. While ensuring the availability of the
controller, it must be protected from different
DoS and distributed DoS (DDoS) attacks. The
OPEN ISSUES FOR SECURING SDNS
operating system must be secure, having no Security plays a vital role in tremendously
patches and back-door accounts and open doors deploying SDNs across different networks. The
at the same time, such as vulnerable open ports, use of SDNs in network virtualization has
services, and protocols. brought many security issues, and as soon as it
proliferates, it becomes increasingly important
PROTECTING THE FLOW PARADIGM OF THE SDN and more vibrant [14, 15]. This is in spite of the
SDN is grounded on flow-based forwarding and fact that the level of security of virtual networks
can certainly ensure end-to-end communication compared to traditional networks is not shown
security. The flow paradigm acts as the soul of by the research community; also, there are not
an SDN, and it must be protected. A successful adequate measures to secure them. This section
injection of bogus flow may lead to a total net- discusses the unaddressed open issues surround-
work disaster. The flow abstraction shown by the ing SDNs when deployed for network virtualiza-

42 IEEE Communications Magazine • April 2015


AKHUNZADA_LAYOUT_Author Layout 3/31/15 2:05 PM Page 43

tion. However, to prove this relevant open issue,


we consider discussing these issues by illustrating Network operating
a real experience of OpenFlow already used for Floodlight POX BEACON
system layer
network virtualization.
OpenVirtex Virtualization layer
SDN CONTROLLER-SPECIFIC
SECURITY ISSUES IN VIRTUAL ENVIRONMENTS
A controller will always remain a potential target
for the attacker and most probably the first line
of attack. Following are some of the unaddressed
scenarios in targeting a logical controller in a Physical layer
virtual environment as the most significant part
of an SDN, as demonstrated in Fig. 4. Consider
the particular scenario of using OpenVirtex, a
special controller used for creating virtual net- Switch
works. In the case of using OpenVirtex, some Host
controllers in Fig. 4, such as floodlight and oth-
ers, are placed on the end user side. The virtual-
Figure 4. Attack scenario of creating virtual environment using OpenVirtex.
ization layer of OpenVirtex demonsterates the
concept of programmable virtual networks.
Moreover, the physical layers simply show the
physical hardware that can be specified with the stand the recent efforts in securing the SDNs.
user’s topology and addressed using OpenVirtex. We provide a tutorial on research efforts made
Although it has many advantages, at the same it in this direction. In this article, we also classify
is exploitable. The diagram is used to clearly the state-of-the-art security solutions by devising
depict the following issues related to SDN while a thematic taxonomy considering SDN layers/
creating a virtual network. interfaces, security mechanisms, simulation envi-
ronments, and security objectives. The article
Denial of Service Attack — Take an example discusses the possible attacks and threats target-
of a POX controller, a special controller placed ing different layers/interfaces of SDNs. More-
on the end user side for creating a particular vir- over, the requirements for securing the SDNs
tual network using OpenVirteX. A POX con- are also identified and presented. Finally, we dis-
troller possesses critical knowledge of the cuss the open research issues to give researchers
network and is prone to many attacks, more directions for future research.
specifically DoS attacks. An adversary can simply
generate a huge number of flows, rendering net- ACKNOWLEDGMENTS
work breakdown or improper functioning. This work is fully funded by Bright Spark Unit, the
University of Malaya, Malaysia, and partially fund-
Spoofing Attack — We keep in view the same ed by the Malaysian Ministry of Higher Education
scenario. Since the floodlight is already aware of under the University of Malaya High Impact
the IP address of the OpenVirteX, the floodlight Research Grant UM.C/625/1/HIR/MOE/FCSIT/03.
controller can simply forge the IP address of the
main virtual controller (OpenVirteX) to launch REFERENCES
a simple and easy spoofing attack. [1] D. Kreutz et al., “Software-Defined Networking: A Compre-
hensive Survey,” Proc. IEEE, vol. 103, vol. 1, pp. 14–76.
Malicious Injection — Malicious injections can [2] S. Shin et al., “Fresco: Modular Composable Security
Services for Software-Defined Networks,” Internet Soci-
be made by simply following the existing Field ety NDSS, 2013.
Rewrite problem, which allows the end user to [3] P. Porras et al., “A Security Enforcement Kernel for
change their VLAN ID tag subject in particular OpenFlow Networks,” Proc. 1st Wksp. Hot Topics in
circumstances. This situation simply creates an Software Defined Networks, ACM, 2012, pp. 121–26.
[4] R.W. Skowyra et al., “Verifiably-Safe Software-Defined Net-
opportunity for a nasty controller to inject pack- works for CPS,” Proc. 2nd ACM Int’l. Conf. High Confi-
ets into another slice. Moreover, using OpenVir- dence Networked Systems, ACM, 2013, pp. 101–10.
tex instead of FlowVisor does a good job of [5] N. Handigol et al., “Where is the Debugger for My Soft-
addressing space isolation, but at the same time, ware-Defined Network?,” Proc. 1st Wksp, Hot Topics in
Software Defined Networks, ACM, 2012, pp. 55–60.
it does not implement action isolation. Subse- [6] S. Son et al., “Model Checking Invariant Security Properties
quently, a controller can set any type of action in in OpenFlow,” Proc. IEEE ICC, 2013, 2013, pp. 1974–79.
the flow entry without any control of the con- [7] X. Wen et al., “Towards a Secure Controller Platform
troller in this particular case. for Openflow Applications,” Proc. 2nd ACM SIGCOMM
Wksp. Hot topics in Software Defined Networking,
2013, pp. 171–72.
CONCLUSIONS [8] S. Shirali-Shahreza and Y. Ganjali, “FleXam: Flexible Sam-
pling Extension for Monitoring and Security Applications in
The emergence of SDN is imposing new require- Openflow,” Proc. 2nd ACM SIGCOMM Wksp. Hot Topics
in Software Defined Networking, 2013, pp. 167–68.
ments for network security due to newly [9] S. Shin and G. Gu, “CloudWatcher: Network Security
deployed infrastructural entities and architec- Monitoring Using OpenFlow in Dynamic Cloud Net-
tural components. In order to meet the newly works (or: How to Provide Security Monitoring as a Ser-
imposed network security requirements, several vice in Clouds?),” 2012 20th IEEE Int’l. Conf. Proc.
Network Protocols, 2012, pp. 1–6.
solutions for securing SDNs have been pro- [10] J. Wang et al., “Towards a Security-Enhanced Firewall
posed. A discussion of state-of-the-art security Application for OpenFlow Networks,” Cyberspace Safe-
solutions is presented to help the reader under- ty and Security, Springer, 2013, pp. 92–103.

IEEE Communications Magazine • April 2015 43


AKHUNZADA_LAYOUT_Author Layout 3/31/15 2:05 PM Page 44

[11] S. Shin et al., “AVANT-GUARD: Scalable and Vigilant A BDULLAH G ANI (abdullahgani@ieee.org) is an associate
Switch Flow Management in Software-Defined Net- professor at the Department of Computer System and
OpenFlow must not works,” Proc.2013 ACM SIGSAC Conf. Computer & Technology, University of Malaya. His academic qualifica-
Communications Security, 2013, pp. 413–24. tions were obtained from UK’s universities: Bachelor’s
be the only protocol [12] Y. Zhang, “An adaptive Flow Counting Method for and Master’s degrees from the University of Hull, and a
considered for SDN; Anomaly Detection in SDN,” Proc. 9th ACM Conf. Ph.D. from the University of Sheffield. He has published
Emerging Networking Experiments and Technologies more than 100 academic papers in conferences and
there can be other 2013, pp. 25–30. respected journals. His research interests include self-
[13] A. Akhunzada et al., “Man-At-The-End Attacks: Analysis, organized systems, reinforcement learning, and wireless-
options. The security Taxonomy, Human Aspects, Motivation and Future Direc- related networks.
tions,” J. Network and Computer Applications, 2014.
measures include [14] L. Wei et al., “Security and Privacy for Storage and MUHAMMAD KHURRAM KHAN (mkhurram@ksu.edu.sa) is work-
secure coding, Computation in Cloud Computing,” Info. Sciences, vol. ing at the Center of Excellence in Information Assurance,
258, 2014, pp. 371–86. King Saud University, Saudi Arabia. He has edited seven
deployment of [15] Q. Duan, Y. Yan, and A. V. Vasilakos, “A Survey on books and proceedings published by Springer-Verlag and
Service-Oriented Network Virtualization Toward Conver- IEEE. He has published more than 200 papers in interna-
integrity checks, and, gence of Networking and cloud Computing,” IEEE tional journals and conferences. He is an inventor of 10
Trans. Network and Service Management, vol. 9, no. 4, U.S./PCT patents. He is Editor-in-Chief of a well-reputed
most importantly, 2012, pp. 373–92. journal, Telecommunication Systems (Springer), and a
digital signing of the member of several editorial boards. His research interests

code. Moreover, the


BIOGRAPHIES include cybersecurity, biometrics, multimedia security, and
digital authentication.
ADNAN AKHUNZADA (a.adnan@siswa.um.edu.my) is currently
communication a Ph.D. fellow and an active senior researcher in the Centre MUHAMMAD IMRAN (cimran@ksu.edu.sa) has worked as an
for Mobile Cloud Computing, University of Malaya, assistant professor in the Deanship of e-Transactions and
channels can be Malaysia. He had a great experience teaching international Communication at King Saud University since 2011. His
hardened using modules of the University of Bradford, United Kingdom. He research interests include mobile ad hoc and sensor net-
is a senior lecturer at CIIT, Islamabad. He has published works, cognitive radio ad hoc networks, WBANs, multihop
TLS security. several high impact research journal papers. His current wireless networks, and fault-tolerant computing. He has
research interests include secure design and modeling of published more than 45 research papers in reputable inter-
software defined networks, man-at-the-end national journals, conferences, and workshops. He current-
attacks, lightweight cryptography, human attacker attribu- ly serves as an Editor for the International Journal of
tion and profiling, and remote data auditing. Information Technology and Electrical Engineering.

EJAZ AHMED (ejazahmed@ieee.org) is a Ph.D. candidate at SGHAIER GUIZANI (sguizani@alfaisal.edu) is an assistant pro-
the University of Malaya. Before that, he worked as a fessor at the Electrical Engineering Department, Alfaisal
research associate at CogNet (Cognitive Radio Research University, Riyadh, Saudi Arabia. He received his B.S. from
Lab) SEECS, NUST Pakistan, and CoReNet (Center of the State University of New York at Binghamton in 1990,
Research in Networks and Telecom), Maju, Islamabad, Pak- his M.S. from North Carolina State University in 1992, and
istan. Currently, he is an active researcher at the Centre for his Ph.D. from the University of Quebec, Trois Rivieres,
Mobile Cloud Computing Research (C4MCCR), University of Canada, in 2006, all in electrical and computer engineer-
Malaya, Kuala Lumpur, Malaysia. His areas of interest ing. His research interests are in the areas of wireless com-
include software-defined networks, cognitive radio set- munication, computer networks, computer security, RFID,
works, and mobile cloud computing. and optical fiber communication systems.

44 IEEE Communications Magazine • April 2015

View publication stats

S-ar putea să vă placă și