Fingerprinting software-defined networks

Roberto Bifulco, Heng Cui, Ghassan O. Karame, Felix Klaedtke

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Abstract

    In this paper, we study the feasibility of fingerprinting of controller-switch interactions in SDN networks by a remote adversary whose aim is to acquire knowledge about specific flow rules that are installed at the switches. This knowledge empowers the adversary with a better understanding of the network's packet-forwarding logic and exposes the network to a number of threats. In our study, we collect measurements from hosts located across the globe using a realistic SDN network comprising of OpenFlow hardware switches. We show that, by leveraging information from the RTT and packet-pair dispersion of the exchanged packets, fingerprinting attacks on SDN networks succeed with overwhelming probability. We also show that these attacks are not restricted to active adversaries, but can be equally mounted by passive adversaries that only monitor traffic exchanged with the SDN network. Finally, we sketch an efficient countermeasure to strengthen SDN networks against fingerprinting.

    Original languageEnglish
    Title of host publicationProceedings - 2015 IEEE 23rd International Conference on Network Protocols, ICNP 2015
    PublisherIEEE Computer Society
    Pages453-459
    Number of pages7
    Volume2016-March
    ISBN (Electronic)9781467382953
    DOIs
    Publication statusPublished - 18 Mar 2016
    Event23rd IEEE International Conference on Network Protocols, ICNP 2015 - San Francisco, United States
    Duration: 10 Nov 201513 Nov 2015

    Other

    Other23rd IEEE International Conference on Network Protocols, ICNP 2015
    Country/TerritoryUnited States
    CitySan Francisco
    Period10/11/1513/11/15

    Keywords

    • Fingerprinting attacks
    • Packet-pair dispersion
    • SDN security

    Fingerprint

    Dive into the research topics of 'Fingerprinting software-defined networks'. Together they form a unique fingerprint.

    Cite this