Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
144 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
46 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

I DPID It My Way! A Covert Timing Channel in Software-Defined Networks (2403.01878v1)

Published 4 Mar 2024 in cs.CR and cs.NI

Abstract: Software-defined networking is considered a promising new paradigm, enabling more reliable and formally verifiable communication networks. However, this paper shows that the separation of the control plane from the data plane, which lies at the heart of Software-Defined Networks (SDNs), can be exploited for covert channels based on SDN Teleportation, even when the data planes are physically disconnected. This paper describes the theoretical model and design of our covert timing channel based on SDN Teleportation. We implement our covert channel using a popular SDN switch, Open vSwitch, and a popular SDN controller, ONOS. Our evaluation of the prototype shows that even under load at the controller, throughput rates of 20 bits per second are possible, with a communication accuracy of approximately 90\%. We also discuss techniques to increase the throughput further.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (24)
  1. T. Anderson, L. Peterson, S. Shenker, and J. Turner, “Overcoming the internet impasse through virtualization,” IEEE Computer, vol. 38, no. 4, pp. 34–41, April 2005.
  2. N. Feamster, J. Rexford, and E. Zegura, “The road to sdn,” Queue, vol. 11, no. 12, December 2013.
  3. D. Firestone, “Vfp: A virtual switch platform for host sdn in the public cloud.” in Proc. NSDI, 2017, pp. 315–328.
  4. B. Mitchell, “Pentagon considering push to software-defined networking,” https://www.fedscoop.com/pentagon-considering-push-software-defined-networking/, 2017, accessed: 02-01-2018.
  5. Netronome, “Agilio CX 2x10GbE SmartNIC SMARTNIC FOR HIGH-PERFORMANCE CLOUD, SDN AND NFV NETWORKING,” Netronome, Tech. Rep., 2017.
  6. S. Hong, L. Xu, H. Wang, and G. Gu, “Poisoning network visibility in software-defined networks: New attacks and countermeasures,” in Proc. NDSS, 2015.
  7. M. Dhawan, R. Poddar, K. Mahajan, and V. Mann, “Sphinx: Detecting security attacks in software-defined networks.” in Proc. NDSS, 2015.
  8. S. Jero et al., “Identifier binding attacks and defenses in software-defined networks,” in Proc. Usenix Security Symp., 2017.
  9. K. Thimmaraju et al., “Taking control of sdn-based cloud systems via the data plane,” in Proc. ACM Symposium on Software Defined Networking Research (SOSR), 2018.
  10. K. Thimmaraju, L. Schiff, and S. Schmid, “Outsmarting network security with sdn teleportation,” in Proc. IEEE European Security & Privacy (S&P), 2017.
  11. Y. Hu, X. Li, and X. Mountrouidou, “Improving covert storage channel analysis with sdn and experimentation on geni,” National Cyber Summit, vol. 16, pp. 7–9, 2016.
  12. G. J. Simmons, “A secure subliminal channel (?),” in Advances in Cryptology, 1986, pp. 33–41.
  13. C. G. Girling, “Covert channels in lan’s,” IEEE Trans. Software Engineering, vol. 13, no. 2, p. 292, 1987.
  14. T. G. Handel and M. T. Sandford, “Hiding data in the osi network model,” in Proc. Intl. Workshop on Information Hiding.   Springer, 1996, pp. 23–38.
  15. S. Cabuk, C. E. Brodley, and C. Shields, “Ip covert timing channels: design and detection,” in Proc. ACM Conference on Computer and Communications Security (CCS), 2004, pp. 178–187.
  16. R. Tahir et al., “Sneak-peek: High speed covert channels in data center networks,” in Proc. IEEE INFOCOM, 2016, pp. 1–9.
  17. “Snowden: The NSA planted backdoors in Cisco products,” 2014, accessed: 02-01-2018. [Online]. Available: http://www.infoworld.com/article/2608141/internet-privacy/snowden--the-nsa-planted\\-backdoors-in-cisco-products.html
  18. B. W. Lampson, “A note on the confinement problem,” Communications of the ACM, vol. 16, no. 10, pp. 613–615, 1973.
  19. D. L. Mills, “On the accuracy and stablility of clocks synchronized by the network time protocol in the internet system,” ACM Computer Communication Review (CCR), vol. 20, no. 1, pp. 65–75, 1989.
  20. Open vSwitch, “Open vswitch,” http://openvswitch.org, 2018, accessed: 02-01-2018.
  21. “ONOS wiki home,” https://wiki.onosproject.org/display/ONOS/Wiki+Home, 2017, accessed: 02-01-2018.
  22. M. Gilleland and Merriam Park Software, “Levenshtein Distance, in Three Flavors,” https://people.cs.pitt.edu/~kirk/cs1501/Pruhs/Spring2006/assignments/editdistance/Levenshtein%20Distance.htm, 2017, accessed: 02-01-2018.
  23. M. Jarschel et al., “Ofcprobe: A platform-independent tool for openflow controller analysis,” in Proc. IEEE International Conference on Communications and Electronics.   IEEE, 2014, pp. 182–187.
  24. N. Gray, T. Zinner, and P. Tran-Gia, “Enhancing sdn security by device fingerprinting,” in In Proc. IFIP/IEEE International Symposium on Integrated Network Management (IM), May 2017.
Citations (13)

Summary

We haven't generated a summary for this paper yet.