Paper 9
Paper 9
Paper 9
C. Mas Machuca, P. Vizarreta and R. Durner are with the Chair of – Connectivity loss between forwarding devices and
Communication Networks, Technical University of Munich, TUM, Germany controller(s)
e-mail: (see http://lkn.ei.tum.de).
J. Rak is with the Telecommunications and Informatics Department of
– State consistency between the controller replicas
Computer Communications, Gdansk University of Technology, Poland • Threats affecting the controller
2
and encryption of the secure channel is crucial. Unfortunately [9] L. F. Müller, R. R. Oliveira, M. C. Luizelli, L. P. Gaspary, and M. P.
authentication is not always supported in the current SDN Barcellos, “Survivor: an enhanced controller placement strategy for
improving sdn survivability,” in 2014 IEEE Global Communications
ecosystem [22]. Conference. IEEE, 2014, pp. 1909–1915.
[10] P. Vizarreta, C. M. Machuca, and W. Kellerer, “Controller placement
strategies for a resilient sdn control plane,” in Resilient Networks Design
C. Attacks from the Application Plane and Modeling (RNDM), 2016 8th International Workshop on. IEEE,
2016, pp. 253–259.
Additional risks can turn up from the usage of malicious [11] E. Sakic, F. Sardis, J. W. Guck, and W. Kellerer, “Towards adaptive
or malfunctioning SDN applications. This can be relieved state consistency in distributed sdn control plane,” in Conference on
using formal verification methods in the controller [23]. These Communications (ICC), 2017 IEEE International. IEEE, 2017.
[12] Linux Foundation, “Opendaylight.” [Online]. Available:
methods can be used to enforce security rules, like for example https://www.opendaylight.org/
the isolation of different network zones. [13] M. Casado, M. J. Freedman, J. Pettit, J. Luo, N. McKeown, and
One issue for a secure operation of an SDN that remains S. Shenker, “Ethane: Taking control of the enterprise,” in Proceedings
of the 2007 Conference on Applications, Technologies, Architectures,
open is the verification of the security of all components and a and Protocols for Computer Communications, ser. SIGCOMM ’07.
full bottom up trust relationship between all components and New York, NY, USA: ACM, 2007, pp. 1–12. [Online]. Available:
layers. http://doi.acm.org/10.1145/1282380.1282382
[14] P. Kazemian, M. Chan, H. Zeng, G. Varghese, N. McKeown, and
S. Whyte, “Real time network policy checking using header space
V. C ONCLUSION analysis.” in NSDI, 2013, pp. 99–111.
[15] S. Shin and G. Gu, “Attacking software-defined networks: A first feasi-
This paper has given an overview of the most important bility study,” in Proceedings of the second ACM SIGCOMM workshop
on Hot topics in software defined networking. ACM, 2013, pp. 165–
issues and some proposed solutions in order to increase the 166.
reliability and security in Software Defined Networking. As [16] L. Schehlmann, S. Abt, and H. Baier, “Blessing or curse? revisiting se-
it has been mentioned, the flexibility and efficiency offered curity aspects of software-defined networking,” in Network and Service
Management (CNSM), 2014 10th International Conference on. IEEE,
by SDN comes with some challenges (e.g., higher software 2014, pp. 382–387.
failures). [17] R. Klöti, V. Kotronis, and P. Smith, “OpenFlow: A security analysis,”
Proceedings - International Conference on Network Protocols, ICNP,
2013.
ACKNOWLEDGMENT [18] S. M. Mousavi and M. St-Hilaire, “Early detection of DDoS attacks
against SDN controllers,” 2015 International Conference on Computing,
This article is based upon work from COST Action CA Networking and Communications, ICNC 2015, pp. 77–81, 2015.
15127 (Resilient communication services protecting end-user [19] R. Durner, C. Lorenz, M. Wiedemann, and W. Kellerer, “Detecting and
applications from disaster-based failures RECODIS) sup- mitigating denial of service attacks against the data plane in software
defined networks,” in IEEE Conference on Network Softwarization -
ported by COST (European Cooperation in Science and Tech- Workshop on Security in NFV-SDN, 2017.
nology. [20] K. Benton, L. J. Camp, and C. Small, “OpenFlow Vulnerability Assess-
ment Categories and Subject Descriptors,” Proceedings of the second
ACM SIGCOMM workshop on Hot topics in software defined networking
R EFERENCES - HotSDN ’13, pp. 151–152, 2013.
[21] A. Shalimov, D. Zuikov, D. Zimarina, V. Pashkov, and R. Smeliansky,
[1] P. Vizarreta, P. Heegaard, B. Helvik, W. Kellerer, and M. M. Carmen, “Advanced study of SDN/OpenFlow controllers,” Proceedings of the
“Characterization of failure dynamics in sdn controllers,” in Resilient 9th Central & Eastern European Software Engineering Conference
Networks Design and Modeling (RNDM), 2017 9th International Work- in Russia on - CEE-SECR ’13, pp. 1–6, 2013. [Online]. Available:
shop on. IEEE, 2017. http://dl.acm.org/citation.cfm?doid=2556610.2556621
[2] M. Furdek, N. Skorin-Kapov, and L. Wosinska, “Attack-aware dedicated [22] R. Durner and W. Kellerer, “The cost of security in the sdn control
path protection in optical networks,” Journal of Lightwave Technology, plane,” CoNEXT Student Workhop, 2015.
vol. 34, no. 4, pp. 1050–1061, Feb 2016. [23] H. Hu, W. Han, G.-j. Ahn, and Z. Zhao, “FLOWGUARD,”
[3] J. Yallouz and A. Orda, “Tunable qos-aware network survivability,” in Proceedings of the third workshop on Hot topics in
IEEE/ACM Transactions on Networking, vol. 25, no. 1, pp. 139–149, software defined networking - HotSDN ’14. New York, New
Feb 2017. York, USA: ACM Press, 2014, pp. 97–102. [Online]. Available:
[4] A. Xie, X. Wang, W. Wang, and S. Lu, “Designing a disaster-resilient http://dl.acm.org/citation.cfm?doid=2620728.2620749
network with software defined networking,” in 2014 IEEE 22nd Inter-
national Symposium of Quality of Service (IWQoS), May 2014, pp. 135–
140.
[5] R. Vaghani and C.-H. Lung, “A comparison of data forwarding schemes
for network resiliency in software defined networking,” Procedia
Computer Science, vol. 34, pp. 680 – 685, 2014, the 9th International
Conference on Future Networks and Communications (FNC’14)/The
11th International Conference on Mobile Systems and Pervasive
Computing (MobiSPC’14)/Affiliated Workshops. [Online]. Available:
http://www.sciencedirect.com/science/article/pii/S1877050914009521
[6] P. E. Heegaard, B. E. Helvik, and V. B. Mendiratta, “Achieving depend-
ability in software-defined networkinga perspective,” in Reliable Net-
works Design and Modeling (RNDM), 2015 7th International Workshop
on. IEEE, 2015, pp. 63–70.
[7] D. Levin, A. Wundsam, B. Heller, N. Handigol, and A. Feldmann,
“Logically centralized?: state distribution trade-offs in software defined
networks,” in Proceedings of the first workshop on Hot topics in software
defined networks. ACM, 2012, pp. 1–6.
[8] F. J. Ros and P. M. Ruiz, “Five nines of southbound reliability in
software-defined networks,” in Proceedings of the third workshop on
Hot topics in software defined networking. ACM, 2014, pp. 31–36.