About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in Communication Networks. 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part I

Research Article

Misreporting Attacks in Software-Defined Networking

Download(Requires a free EAI acccount)
3 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-63086-7_16,
        author={Quinn Burke and Patrick McDaniel and Thomas La Porta and Mingli Yu and Ting He},
        title={Misreporting Attacks in Software-Defined Networking},
        proceedings={Security and Privacy in Communication Networks. 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part I},
        proceedings_a={SECURECOMM},
        year={2020},
        month={12},
        keywords={Network security SDN Load balancing},
        doi={10.1007/978-3-030-63086-7_16}
    }
    
  • Quinn Burke
    Patrick McDaniel
    Thomas La Porta
    Mingli Yu
    Ting He
    Year: 2020
    Misreporting Attacks in Software-Defined Networking
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-030-63086-7_16
Quinn Burke1,*, Patrick McDaniel1, Thomas La Porta1, Mingli Yu1, Ting He1
  • 1: The Pennsylvania State University, State College
*Contact email: qkb5007@psu.edu

Abstract

Load balancers enable efficient use of network resources by distributing traffic fairly across them. In software-defined networking (SDN), load balancing is most often realized by a controller application that solicits traffic load reports from network switches and enforces load balancing decisions through flow rules. This separation between the control and data planes in SDNs creates an opportunity for an adversary at a compromised switch tomisreporttraffic loads to influence load balancing. In this paper, we evaluate the ability of such an adversary to control the volume of traffic flowing through a compromised switch by misreporting traffic loads. We use a queuing theoretic approach to model the attack and develop algorithms for misreporting that allow an adversary to tune attack parameters toward specific adversarial goals. We validate the algorithms with a virtual network testbed, finding that through misreporting the adversary can draw nearly all of the load in the subnetwork (+750%, or 85% of the load in the system), or an adversary-desired amount of load (a target load, e.g., +200%) to within 12% error of that target. This is yet another example of how depending on untrustworthy reporting in making control decisions can lead to fundamental security failures.

Keywords
Network security SDN Load balancing
Published
2020-12-12
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-63086-7_16
Copyright © 2020–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL