I DPID It My Way! A Covert Timing Channel in Software-Defined Networks (2403.01878v1)
Abstract: Software-defined networking is considered a promising new paradigm, enabling more reliable and formally verifiable communication networks. However, this paper shows that the separation of the control plane from the data plane, which lies at the heart of Software-Defined Networks (SDNs), can be exploited for covert channels based on SDN Teleportation, even when the data planes are physically disconnected. This paper describes the theoretical model and design of our covert timing channel based on SDN Teleportation. We implement our covert channel using a popular SDN switch, Open vSwitch, and a popular SDN controller, ONOS. Our evaluation of the prototype shows that even under load at the controller, throughput rates of 20 bits per second are possible, with a communication accuracy of approximately 90\%. We also discuss techniques to increase the throughput further.
- T. Anderson, L. Peterson, S. Shenker, and J. Turner, “Overcoming the internet impasse through virtualization,” IEEE Computer, vol. 38, no. 4, pp. 34–41, April 2005.
- N. Feamster, J. Rexford, and E. Zegura, “The road to sdn,” Queue, vol. 11, no. 12, December 2013.
- D. Firestone, “Vfp: A virtual switch platform for host sdn in the public cloud.” in Proc. NSDI, 2017, pp. 315–328.
- B. Mitchell, “Pentagon considering push to software-defined networking,” https://www.fedscoop.com/pentagon-considering-push-software-defined-networking/, 2017, accessed: 02-01-2018.
- Netronome, “Agilio CX 2x10GbE SmartNIC SMARTNIC FOR HIGH-PERFORMANCE CLOUD, SDN AND NFV NETWORKING,” Netronome, Tech. Rep., 2017.
- S. Hong, L. Xu, H. Wang, and G. Gu, “Poisoning network visibility in software-defined networks: New attacks and countermeasures,” in Proc. NDSS, 2015.
- M. Dhawan, R. Poddar, K. Mahajan, and V. Mann, “Sphinx: Detecting security attacks in software-defined networks.” in Proc. NDSS, 2015.
- S. Jero et al., “Identifier binding attacks and defenses in software-defined networks,” in Proc. Usenix Security Symp., 2017.
- K. Thimmaraju et al., “Taking control of sdn-based cloud systems via the data plane,” in Proc. ACM Symposium on Software Defined Networking Research (SOSR), 2018.
- K. Thimmaraju, L. Schiff, and S. Schmid, “Outsmarting network security with sdn teleportation,” in Proc. IEEE European Security & Privacy (S&P), 2017.
- Y. Hu, X. Li, and X. Mountrouidou, “Improving covert storage channel analysis with sdn and experimentation on geni,” National Cyber Summit, vol. 16, pp. 7–9, 2016.
- G. J. Simmons, “A secure subliminal channel (?),” in Advances in Cryptology, 1986, pp. 33–41.
- C. G. Girling, “Covert channels in lan’s,” IEEE Trans. Software Engineering, vol. 13, no. 2, p. 292, 1987.
- T. G. Handel and M. T. Sandford, “Hiding data in the osi network model,” in Proc. Intl. Workshop on Information Hiding. Springer, 1996, pp. 23–38.
- S. Cabuk, C. E. Brodley, and C. Shields, “Ip covert timing channels: design and detection,” in Proc. ACM Conference on Computer and Communications Security (CCS), 2004, pp. 178–187.
- R. Tahir et al., “Sneak-peek: High speed covert channels in data center networks,” in Proc. IEEE INFOCOM, 2016, pp. 1–9.
- “Snowden: The NSA planted backdoors in Cisco products,” 2014, accessed: 02-01-2018. [Online]. Available: http://www.infoworld.com/article/2608141/internet-privacy/snowden--the-nsa-planted\\-backdoors-in-cisco-products.html
- B. W. Lampson, “A note on the confinement problem,” Communications of the ACM, vol. 16, no. 10, pp. 613–615, 1973.
- D. L. Mills, “On the accuracy and stablility of clocks synchronized by the network time protocol in the internet system,” ACM Computer Communication Review (CCR), vol. 20, no. 1, pp. 65–75, 1989.
- Open vSwitch, “Open vswitch,” http://openvswitch.org, 2018, accessed: 02-01-2018.
- “ONOS wiki home,” https://wiki.onosproject.org/display/ONOS/Wiki+Home, 2017, accessed: 02-01-2018.
- M. Gilleland and Merriam Park Software, “Levenshtein Distance, in Three Flavors,” https://people.cs.pitt.edu/~kirk/cs1501/Pruhs/Spring2006/assignments/editdistance/Levenshtein%20Distance.htm, 2017, accessed: 02-01-2018.
- M. Jarschel et al., “Ofcprobe: A platform-independent tool for openflow controller analysis,” in Proc. IEEE International Conference on Communications and Electronics. IEEE, 2014, pp. 182–187.
- N. Gray, T. Zinner, and P. Tran-Gia, “Enhancing sdn security by device fingerprinting,” in In Proc. IFIP/IEEE International Symposium on Integrated Network Management (IM), May 2017.