SlideShare a Scribd company logo
1 of 12
Download to read offline
WHAT DOES SDN EXPOSE? ✱
AUGUST 31, 2015 ✱ ERICSSON TECHNOLOGY REVIEW 1
C H A R T I N G T H E F U T U R E O F I N N O V A T I O N V O L U M E 9 2 | # 7 . 2 0 1 5
Review
IDENTIFYINGAND
ADDRESSINGTHE
VULNERABILITIES
ANDSECURITYISSUES
OFSDN
ERICSSON
TECHNOLOGY
Tenants
Network elements
C
Applic
Managementmodules
Management
plane
SDN applications
SDN controllers
D-CPI
A-CPI
MM
MM
MM SDN
app
SDNc
NE NE
✱ WHAT DOES SDN EXPOSE?
2 ERICSSON TECHNOLOGY REVIEW ✱ AUGUST 31, 2015
vulnerabilities
IDENTIFYING AND ADDRESSING THE
KRISTIAN SLAVOV
DANIEL MIGAULT
MAKAN POURZANDI
The promises of agility, simplified control, and real-time programmability
offered by software-defined networking (sdn) are attractive incentives for
operators to keep network evolution apace with advances in virtualization
technologies. But do these capabilities undermine security? To answer
this question, we have investigated the potential vulnerabilities of sdn.
The aim is for this architecture to serve as a secure complement to cloud
computing, and to ensure that networks are protected from attack by
malicious intruders.
Tr a d i t i o n a l n e t w o r k architecture
has reached the point where its ability to
adapt to dynamic environments, like those
enabled by virtualization technologies, has
become a hindrance. By separating the
control plane from the data plane, sdn raises
the level of system abstraction, which in turn
opens the door for network programmability,
increased speed of operations, and
simplification: in short, the key to delivering
on its promises, and enabling telecom
networks and it to develop in parallel.
Attheheartofsdn architectureliesthesdn
controller(sdnc).Logicallypositionedbetween
networkelements(nes)andsdn applications(sdn
apps),thesdnc providesaninterfacebetweenthe
two.Itscentralizedpositionenablesittoprovide
othersdn componentswithaglobaloverviewof
whatishappeninginthenetwork;itcanconfigure
nesontheflyanddeterminethebestpathfortraffic.
Thesdnc andtheshifttocentralizedcontrolset
sdn architectureapartfromtraditionalnetworks
–inwhichcontrolisdistributed.Unfortunately,the
centralizedpositionofthesdnc makesitaprimary
surfaceforattack.
SECURITY ISSUES OF SDN
&
WHAT DOES SDN EXPOSE? ✱
AUGUST 31, 2015 ✱ ERICSSON TECHNOLOGY REVIEW 3
Forthepurposesofthisarticle,welimited
thescopeofourstudyintothevulnerabilitiesof
sdn tothesinglecontrollerusecase(withone
controllergoverningthedataplane),eventhough
sdn architectureallowsforseveral.Ourdiscussion
coversthesdn elementsandtheirinteractionsin
thesinglecontrollercase,aswellastheinteractions
betweenthesdnc andthemanagementplane.
Whycentralize?
Asdefinedbyonf1
,alogicallycentralizedcontrol
planemakesitpossibletomaintainanetwork-
wideviewofresources,whichcanthenbe
exposedtotheapplicationlayer.Toprovidesuch
acentralizedarchitecture,sdn usesoneormore
nesthatinterfacewiththesdnc.Thebenefitof
buildingnetworksinthiswayissimplifiednetwork
management,andimprovedagility.
Centralizationequipsnetworksfor
programmability,whichinturnincreasesautonomy.
Onepossibilityenabledbyprogrammabilityis
theautomaticdetectionandmitigationofddos
attacks,whichresultsinrapidresolutionofany
problemsthatmayarise.Programmabilityalso
allowsnetworkresourcestobesharedautomatically,
which–togetherwiththecapabilitytocreate
virtualnetworkscreatedontopofexistingnetwork
infrastructure–enablesautomaticsharingby
multipletenants.
Benefitsandvulnerabilities
sdn facilitatestheintegrationofsecurityappliances
intonetworks,whichcanbeimplementeddirectlyon
topofthecontrolplane,ratherthanbeingaddedas
separateappliancesorinstantiatedwithinmultiple
nes.sdn’scentralizedmanagementapproach
enableseventswithintheentirenetworktobe
collectedandaggregated,Theresultingbroader,
morecoherentandmoreaccurateimageofthe
network’sstatus,makessecuritystrategiesboth
easiertoenforceandtomonitor.
Theabilitytoimplementsecuritymechanisms
directlyontopofthecontrolleroronsteeringtraffic
atruntime(usinglegacyapplianceswhennecessary)
makesitpossibletodynamicallyaddtapsand
sensorsatvariousplacesinthenetwork–which
makesformoreeffectivenetworkmonitoring.With
anaccuratepictureofitsstatus,thenetworkcan
morereadilydetectattacks,andthenumberoffalse
positivesreportedcanbereduced.Inpractice,ifa
tapindicatestothesdnc thatadeviceisshowing
signsofbeinghijackedbyabotnet,thesdnc can
steerthepotentiallyoffendingtraffictoanids for
analysisandmonitoring.Ifthetrafficisdeemed
maliciousbytheids,thesdnc canfilteritand
instructthefirst-hopne accordingly.
Itsabilitytofacilitatethecollectionofnetwork-
statusinformationaswellasenablingautomatic
detectionandresolutionofanybreachinsecurity,
makessdn idealforintegrationintonetworkthreat
intelligencecentersandServiceOperationCenters
(socs).Unfortunately,therichfeaturesetofsdn
alsoprovidesalargerattacksurfacecomparedwith
traditionalnetworks–anissuedocumentedina
numberofrecentlypublishedresearchpapers2
.
Referencemodel
Theoverallsdn architecturecomprisesthe
followingelements:
〉〉	nes–whichareresponsibleforforwardingpacketsto
thenextappropriatene orendhost;
〉〉	sdnc –whichsendsforwardingrulesontothenes
accordingtoinstructionsitreceivesfromsdn apps;
Termsand abbreviations
ddos–Distributed DoS | dos–Denial of Service | gre–Generic Routing Encapsulation | ids–intrusion detection system |
ipsec–Internet Protocol Security | mm– management module | mpls–multi-protocol label switching |
ne–network element | onf–Open Networking Foundation | rbac role-based access control | sdnsoftware-defined
networking | sdnc–sdn controller | sla–Service Level Agreement | tls–Transport Layer Security domain-specific
modeling language
✱ WHAT DOES SDN EXPOSE?
4 ERICSSON TECHNOLOGY REVIEW ✱ AUGUST 31, 2015
Tenants
Network elements
Data plane
Control plane
Application plane
Managementmodules
Management
plane
SDN applications
SDN controllers
D-CPI
A-CPI
MM
MM
MM SDN
app
SDNc
NE NE
Figure 1 
sdn architecture
AUGUST 31, 2015 ✱ ERICSSON TECHNOLOGY REVIEW 5
〉〉	sdn apps–whichissuecommandstodynamically
configurethenetwork;
〉〉	tenants–thelogicalownersofthevirtualnetwork,who
provideconfigurationandpolicyinformationthrough
networkapps;and
〉〉	managementmodules(mms)–whichareresponsible
fordeviceadministration.
AsillustratedinFigure1,thesdn architecture
comprisesfourplanes:thedataplane,thecontrol
plane,theapplicationandthemanagementplane.
Thedataplanecarriesusertrafficthroughthe
differentnes,whicharedynamicallyprogrammed
torespondtothepoliciesofthedifferenttenants.
Forwardingpoliciesareelaborated,andsenton
bythecontrolplanetoeachne.Themanagement
planeisdedicatedtoinfrastructuremanagement,
physicaldevicemanagementaswellasplatform
managementissuessuchasfirmwareandsoftware
upgrades3,4
.Theapplicationplaneisconstitutedby
allapplicationsthatprogramthenetworkthrough
interactionswiththesdnc.Theseapplicationsmay
beindependentandownedbydifferenttenants.
Networksthatarebuiltaccordingtosdn
architectureprinciplesneedtoprotectanumberof
keysecurityassets:
〉〉	availability–thenetworkshouldremainoperational
evenunderattack;
〉〉	performance–thenetworkshouldbeabletoguarantee
abaselinebandwidthandlatencyintheeventofan
attack;
〉〉	integrityandconfidentiality–controlplaneanddata
planeintegrityandisolationshouldbeupheldbetween
tenants.
Toassureprotectionoftheseassets,anumberof
processesneedtobeinplace:
Authenticationandauthorization
Onlyauthenticatedandauthorizedactorsshould
beabletoaccesssdn components.Thegranularity
ofauthenticationandauthorizationmustbe
detailedenoughtolimittheconsequencesofstolen
credentialsoridentityhijacking.
Resiliency
Networksmustbeabletorecoverasautonomously
aspossiblefromanattack,orasoftwareorhardware
failure.Alternatively,networksmustbeableto
dynamicallyworkaroundanyaffectedfunctionality.
Contractualcompliance
Tofulfillslas,mitigationtechniquesmustbe
implemented,andproofthatsuchtechniqueshave
beenactivatedeffectivelymustbeprovided.
Multi-domainisolation
Systemsmustbeabletoisolatetenantsinmultiple
domains,suchastheresourceandtrafficdomains.
Thefollowingformsofisolationapply:
〉〉	resourceisolation–preventstenantsfromstealing
resources,likebandwidth,fromeachother,andis
requiredforsla fulfillment;and
〉〉	trafficisolation–requiredbymulti-tenant
deployments,soatenantcanseeitsowntrafficonly
(thisrequirementappliestobothdataplaneandcontrol
planetraffic).
Repudiation
Allactionscarriedoutbyallsystemactors–both
internalandexternal–mustbelogged,andtheall
logsneedtobesecured.
Transparency
Systemsshouldprovidevisibilityintooperations
andnetworkstatussotheycandeterminethemost
appropriateactionwhenissuesarise.Anactive
approachtosecurityrequirescorrectidentification
andclassificationofanissuesothemostappropriate
actiontomitigateitmaybechosen.Anyaction
shouldbeverifiedtoensurethatithasbeenenforced
effectively.
Thepotentialvulnerabilitiesofsdn architecture
areillustratedinFigure2,whichforthesakeof
simplicityshowsonlyasubsetofthepossiblemajor
attacks.
What’sdifferentaboutsdn security?
Manyofthesecurityissuesrelatedtosdn networks
aresimilartothosethatappearintraditional
✱ WHAT DOES SDN EXPOSE?
6 ERICSSON TECHNOLOGY REVIEW ✱ AUGUST 31, 2015
Configuration Log
Control logic
Hardware Software
LogConfiguration
Net topologyControl logic
Hardware Software
Configuration Flow rules
Hardware Software
Tenant impersonation
Communication hijacking
API abuse
App manipulation
Communication
hijacking
Network
manipulation
Information leakage
Compromised
network
Compromised
system
Communication
hijacking
DoSattack
Admin
impersonation
Tenants
Network elements
Data plane
Control plane
Application plane
Management
module
Management
plane
SDN applications
SDN controllers
D-CPI
A-CPI
MM
MM
MM SDN
app
SDNc
NE NE
DoS attack
Network manipulation
Figure 2 
Potential vulnerabilities of
sdn architecture
AUGUST 31, 2015 ✱ ERICSSON TECHNOLOGY REVIEW 7
networks.What’sinteresting,however,iswhatsets
sdn apartfromtraditionalnetworks.
Comparedwithtraditionalnetworks,the
separationofthecontrolanddataplanesenables
multi-tenancyandprogrammability,andintroduces
centralizedmanagementintothenetwork
architecture.Inthisnewmodel,tenantsrunsdn
appsthatinterfacewiththesdnc,whichsends
instructionstones.Fromasecurityperspective,
theabilitytoshareanddynamicallyoperatethe
samephysicalnetworkisoneofthekeysecurity-
relateddifferencesbetweensdn andtraditional
architectures.Assuch,sdn securityissuesrelateto
thenewcontrolplanemodel,andmorespecifically
tosecuringinter-componentcommunication,and
controllingthescopeofapplicationsandtenants
throughspecificapisandaccesspolicies.
Whileitmaysoundlikethereareanumberof
obstaclestoovercome,theprogrammabilityand
centralizedmanagementbroughtaboutbysdn
enablesamuchgreateralevelofautonomyto
mitigateanysecuritybreaches–outweighingthe
needforadditionaltechnology.
Centralizednetworkmanagement
Intraditionalnetworks,nestendtobemonitored
andmanagedindividually.However,without
theexistenceofstandardprotocolscapableof
interactingwithallnesirrespectiveoftheir
vendororgeneration,networkmanagement
hasbecomecumbersome.Thesdn approach
enablescoordinatedmonitoringandmanagement
offorwardingpoliciesamongdistributednes,
resultinginamoreflexiblemanagementprocess.
Whilethereisariskofthesdn controlplane
becomingabottleneck,thefactthatithasan
overviewoftheentirenetwork,makesitcapableof
mitigatinganyreportedincidentdynamically.For
example,addos attackcanbedetectedandquickly
mitigatedbyisolatingthesuspecttraffic,networksor
hosts.Unliketraditionalddos appliances–which
generallycarryonlyalocalviewofthenetwork–
centralizedelementspossessamuchbroaderviewof
networktopologyandperformance,makingthesdn
anidealcandidateforthedynamicenforcementofa
coherentsecurityposture.
However,whileitisclearthatcentralization
providessignificantbenefits,italsopresentsa
numberofchallenges,likethefactthatthesdnc
isahighlyattractiveattacksurface.Thankfully,
resiliency,authentication,andauthorizationaddress
thisrisk,reducingtheimpactofattack.
	
Resilientcontrolplane
Thethreemainelementsofsdn are:sdn apps,the
sdnc,andnes.Giventhatcontrolofthenetworkis
centralized,allcommunicationwithinthecontrol
planeneedstobetreatedascritical,asanoutage
resultingfromasuccessfulattackmayleadtoan
undesiredimpactonbusinesscontinuity.If,for
example,thesdnc ispreventedfromtakingcritical
actiontomitigateados attack,theentirenetwork
andallofitstenantsmaybeaffected.Toavoidthis,
thecontrolplaneneedsagreaterlevelofresiliency
builtintoit.
Tocommunicatewithtenantapplicationsand
nes,thesdnc exposesasetofinterfaces.Allthese
interfacesmayexperienceheavytrafficloads,
dependingonthetypeandnumberofrunning
applications.Trafficontheinterfacescanbefurther
impactedbynes,forexample,forwardingpackets
forwhichtheyhavenoforwardingrules.So,interms
ofdependenceonthesdnc,traditionalnetworks
appeartobemorerobust.
Aneffectivewaytoimprovetheresilienceofthe
centralizedcontrolplaneandpreventthespread
ofddos control-planeattackstotherestofthe
networkistorate-limitnesintermsofbandwidth
andresourceconsumption–suchascpu load,
memoryusage,andapi calls.
Resiliencecanbefurtherenhancedthrough
properresourcededication–wherethesdnc
authenticateseachresourcerequest,and
subsequentlychecksrequestsagainststrong
authorizationcontrolpolicies.
Strongauthenticationandauthorization
Authenticationandauthorizationaretheprocesses
usedtoidentifyanunknownsourceandthen
determineitsaccessprivileges.Implemented
correctly,theseprocessescanprotectnetworksfrom
certaintypesofattack,suchas:
✱ WHAT DOES SDN EXPOSE?
8 ERICSSON TECHNOLOGY REVIEW ✱ AUGUST 31, 2015
〉〉	provisionoffalse(statistical)feedbacktothesystem
–forexample,foolingthesystemintobelievingitis
underattack,resultinginunnecessarydeployment
ofcountermeasures,whichconsumesresourcesand
inevitablyleadstosuboptimalusage;
〉〉	modificationofavalidon-pathrequest–whichresults
inadirectattackthataltersnetworkbehavior;
〉〉	forwardingtrafficthatisnotmeanttobeforwarded,
ornotforwardingtrafficthatshouldbe–subverting
networkisolation;and
〉〉	gainingcontrolaccesstoanycomponent–rendering
theentirenetworkuntrustworthy.
Thecriticalnatureofthesdnc dictatesthat
additionalsecuritymeasuresneedtobetakento
protectit.Attheveryleast,trafficmustbeintegrity
protectedtopreventtamperingofon-pathtraffic,
buteventhislevelofprotectiondoesnotsecure
controldata.
Encryptionisonewayofpreventingcontrol
datafrombeingleaked.But,eventogetherwith
integrityprotection,encryptionisnotsufficientto
protectagainstman-in-the-middle-typeattacks.
Andso,allcommunicationwithinthecontrolplane
mustbemutuallyauthenticated.Securityprotocols
liketls andipsec provideameansformutual
authenticationaswellasforreplayattackprotection,
confidentiality,andintegrityprotection.
Mutualauthenticationdoes,however,present
somedifficulties,suchashowtobootstrapsecurity
intothesystem.Onewaytosolvethisisbyusing
securitycertificates.Howthenthesecertificatesare
issued,installed,stored,andrevokedthenbecomes
thesignificantsecuritydifficulty.Encryptionand
integrityprotectionwithoutmutualauthentication
arelessusefulfromasecuritypointofview.
Theproblemwithmutualauthenticationis
thatitrequirespreviousknowledgeoftheremote
communicatingendpoint–unlessacommonly
trustedthirdpartyexists.
Onasmallscale,mutualauthenticationcanbe
implementedmanually–requiringadministrators
toinstallpropercertificatesorsharedsecretson
allendpoints.However,forcomplexandphysically
separatedsystems–andespeciallyinnetworks
wheremanysdn componentscanbecreated
dynamicallyandadministeredbymultipleparties–
manualimplementationmaynotbefeasible.
Thesdnc providesnetworkconfiguration
informationthroughAPI callstoitsservices,which
enablestenantstousesdn applicationstocontrol
networkbehavior.Thissituationissomewhat
alarming,giventhatphysicalhardwareresources
maybesharedamongrivaltenants.Whileordinary
securitymeasures–suchasargumentsanitization
andvalidation–mustbeinplace,thesdnc also
needsasolidauthentication,authorizationand
accountabilityinfrastructuretoprotectthenetwork
fromunauthorizedchanges.Strongauthentication
andauthorizationprovidesadditionalprotection,as
itpreventsanattackerfromimpersonatingansdn
component,especiallythesdnc.
Byenforcingstrictauthorizationand
accountabilityprocesses,damagescanbelimited,
andreliabletracesforforensicsprovided.Role-
basedaccesscontrol(rbac)isacommonlyused
approachforrestrictingtheactionspermittedby
anapplicationbyassigningaroletoit.Rolescanbe
definedonahost,userorapplicationbasis.
Ineffect,rbac isasecuritypolicyenforcing
system.Thefewerthenumberofpermittedactions,
themorelimitedtheexploitablefunctionality.When
implementedcorrectly,rbac canbeinvaluable.
Unfortunately,thisapproachisrathercumbersome
insystemswithverynarrowlydefinedroles
wherefrequentchangestakeplace.Attheother
endofthescale,rbac losesitsedgeifrolesaretoo
looselydefined.
Forthepurposesofsystemintegrityassurance,
everyeventthatoccursinthesystemshouldbe
recordedinalog.Howtheselogsarestoredand
securedagainstimproperaccessalsoneedstobe
considered,andanexternalhostisrecommended.
Multi-tenancy
Wherenetworksarebuiltusingsdn techniques,itis
possibleforthesamephysicalnetworktobeshared
amongseveraltenants,whichcaninturnmanage
theirownvirtualnetworks.Multi-tenancyallowsfor
betterutilizationofnetworkresources,loweringthe
totalcostofownership.Fortenants,sdn shortens
thetimetakentoreacttochangingsituations
WHAT DOES SDN EXPOSE? ✱
AUGUST 31, 2015 ✱ ERICSSON TECHNOLOGY REVIEW 9
through,forexample,automaticscalingofresources.
Tomaintainanacceptablelevelofsecurity,tenants
shouldnotbeabletointerferewitheachother’s
networks,andneednotevenbeawarethattheyare
sharingnetworkresourceswithothers.
Tenantisolation(theseparationofonetenant’s
resourcesandactionsfromanother)isanimportant
featureofsdn frameworksecurity.
Controlplaneisolation
Isolationisonewaytopreventtheactionsofone
tenantfromimpactingothers.Thisisacritical
businessaspectthatmustbestronglyenforced.
Tenantisolationisorchestratedbythesdnc,
andimplementedinsdn nesthroughspecific
forwardingrules.Whiletheburdenofproviding
secureisolationlieswiththesdnc,tenantsalsoplay
animportantroleinsharingthatburden.
Thenetworkprovidesisolationprimarilyonthe
linklayer.Ifatenanthasweaknetworksecurity
procedures,informationdisclosuremayoccur,
resultinginabreachofisolationathigherlayers.
Forexample,aroguesdn appwithprivilegesthat
spanbeyondisolationbordersmayimpactoverall
networksecuritybysteeringtraffictoathirdparty
(informationdisclosure)byover-orunder-billing
(theftofservice)orbydroppingtraffic(dos).
Thecentralizednatureofthesdn controlplane
furtheraccentuatestheimpactofsuchattacks.
Consequently,thetaskofprovidingisolationcannot
beentirelyoffloadedontothesdn network.
Dataplaneisolation
Tenantsrunningabusinessonvirtualnetworks
builtusingsdn maybesubjecttothesame
kindofnetwork-basedattacksasintraditional
networks.However,duetothesharednetworking
infrastructure,theimpactofsuchanattackmaybe
dividedamongsomeorevenallofthesetenants.
Thisisanewrisk,whichmayhaveacommercial
impact;nobodywantstoopenabusinessnexttoa
known(orperceived)troublemakeroronethatis
pronetoattack.
So,forthedataplane,flowsassociatedwith
eachparticulartenantmustremainisolatedatall
times.Isolationmaybeperformedlogicallythrough
overlaynetworks
andenforced
withinthenes.For
example,bytagging
theownershipof
trafficgenerated
byeachtenant,
thetrafficcanbe
carriedoverasharedinfrastructure–onceithas
beenencapsulated(tagged).Tunnelstaggedfor
agiventenantarethenforwardedtothevirtual
networkforthattenant.Manyalternative(and
complementary)techniquesareavailableforthis
typeofencapsulation,includinggre,mpls and
ipsec.
Taggingisonewaytoperformlogicalisolation,
butIP addressescanalsobeused,removingthe
needforspecifictaggingtechniques.Bearingin
mindthatseparatenetworkfunctioninstances
arenotrequiredtoservicedifferenttenants,some
networkfunctionalitycanbesharedbytenantsas
longasisolationispreservedandenforced.
Inadditiontologicalisolation,trafficmaybe
encryptedwithspecifictenantkeys.Thisguarantees
thatinthecaseoflogicalencapsulationviolation,the
datatrafficremainsisolatedandinformationcannot
beleaked.
Isolationissuesneedtoberesolvedwhilebearing
resourceconsumptioninmind.Whiletraffic
isolationcanhelpwithdataleakage,sharedresource
usagealsorequiresresourceisolation.Forexample,
theexistenceofaforwardingloopwithinonetenant
maypotentiallyimpactalltenants,astheproblem
overloadstheunderlyingnetworkequipment.To
counteractthisproblem,thesdnc mustenforce
resourceisolation,andusemeasureslikerate
limitingtominimizetheimpactthatatenantcan
haveonthenetwork.
Programmability
Oneofthesignificantbenefitsbroughtabout
throughsdn isprogrammability:theabilityto
configureanetworkefficiently,securely,andin
atimelymanner.sdn programmabilityexistsin
varyingdegreesofcomplexityandabstraction.At
oneendofthescale,programmabilityenablesnes
AS THE SDNC IS SO
CRITICAL,ADDITIONAL
SECURITY MEASURES ARE
NEEDED TO PROTECT IT
✱ WHAT DOES SDN EXPOSE?
10 ERICSSON TECHNOLOGY REVIEW ✱ AUGUST 31, 2015
tobedynamicallyreprogrammedtoforwarddata
flowsaccordingtotheircapabilitiesandhigher-
levelpoliciesinthenetwork.Attheotherend,sdn
appsenabletenantstoprogrammaticallyissuerun-
timerequirementstothenetwork.Allrequestsare
consolidatedbythesdnc,whichfulfillshigher-level
requestsfromthecapabilitiesavailableatthelower
levels.Tomakethistasktrickier,sdn appsmay
issueorthogonal(mutuallyexclusive/contradicting)
requests.Theautomatedsolutionmaythenneedto
dynamicallyreconfigureachunkofthesdn network
–andallofthismusthappenwithinsecondsorless.
Theprimarybenefitthatprogrammabilitybrings
fornetworksbuiltusingthesdn architecture
approachisflexiblecontrol.Theabilitytocontrol
anetworkandapplychangesinatimelymanner
increasesthenetwork’slevelofagility.Suchflexibility
canmakethenetworkmoresecure,asitisconstantly
monitoredanddesignedtomitigatemalicious
behaviorinmoreorlessrealtime.Thedownsideof
theflexibilityprovidedbyprogrammabilityisthe
significantimpactithasonsecurity.
Configurationcoherency
Allowingtenantstoissueprogrammaticchangesto
thenetworkenablesnetworkstoadapttochanging
conditions–increasingnetworkagility.Inpractical
terms,programmabilitycan,forexample,reduce
thetimeittakestosetupacustomercollaboration
networkfromdaysormonthstominutesorhours.
Programmabilitymayalsoremovetheneedfor
manualconfiguration,whichispronetoerror.The
result:theautomaticreconfigurationofnetworksis
feasible,providingthesdnc withaglobalviewof
thenetwork,enablingittoperformsanitychecking
andregressiontestingsothatnewnetworkscanbe
rapidlydeployed.
Unfortunately,theflexibilityprovidedby
programmabilityallowstenantstomakechanges
tothesharedenvironment,whichcancripplethe
operationoftheentirenetwork–eitherintentionally
orunintentionallyasaresultofmisinformation.
Ensuringcoherencyamongtheactionsofthe
varioussdn appsonthenetworkalsoneedsto
beconsideredfromasecuritypointofview(as
describedin5
).Considerthecasewheresecurity
andload-balancingapplicationsareinstantiated
foragiventenant.Acoherencyconflictarises,for
example,whenthesecurityapplicationdecides
toquarantineaserver,whiletheload-balancing
applicationsimultaneouslydecidestoroutetraffic
tothequarantinedserver–becauseitappearsto
havelowload.Toavoidcoherencyissues,thesdnc
mustbeabletoassessandeliminatethepossibleside
effectsoftheacceptablenetworkchangesby
eachtenant,andtofeatureeffectiveconflict
resolutionheuristics.
Anothertypeofconflictarisesduetothe
complexityofvirtualnetworktopologies,andthe
difficultyofmaintainingacoherentsecuritypolicy
acrossanetwork.Specialcareisrequiredfortraffic
thatneedstobeforwardedtosecurityappliances
formonitoringpurposes.Asthetrafficorpartsofit
canberoutedoverdifferentpaths,methodsneed
tobeputinplacetoensurethatallthetrafficis
covered.Consequently,monitoringisnecessaryon
allpaths.Similarissuesariseintraditionalnetworks,
buttheincreasedservicevelocityofferedbysdn
architecturemayfuelthistypeofconflict.
Dynamicity
Thedynamicandreactivenatureofnetworksbuilt
usingthesdn approachopensupnewpossibilities
forfightingnetworkattacks.Automatednetwork
reconfigurations,forwardingtohoneypots,and
blackholeroutingarejustsomeofthetechniques
thatcanbeemployed.Servicechainingisyet
anothertechniquethatutilizessdn propertiesand
canbeusedtoscreenformaliciouspayloadand
triggermitigatingactions.
Anetworkbuiltusingsdn techniquescando
lower-layeranalysisbasedonparameterssuchas
datarate,source,andpacketsize,whilethetenant
canprovidehigher-layeranalysisbasedonprotocols,
transportports,andpayloadfingerprints.Once
suspiciousbehaviorhasbeendetected,thenetwork
canuseitsprogrammabilityfeaturestoanalyzethe
situationinmoredetailortriggermitigatingactions.
However,whilethefeedbacksystemprovides
someadvantagesintermsofsecurity,italsopresents
someissues.Theinteractionbetweenthedata
planeandthecontrolplanebreaksthefundamental
WHAT DOES SDN EXPOSE? ✱
AUGUST 31, 2015 ✱ ERICSSON TECHNOLOGY REVIEW 11
sdn concept:theseparationofthesetwoplanes.
Thisinturnmakesthedataplaneasteppingstone
forattackingthecontrolplane.Aswithother
feedbackloops,thisinteraction,unlessmanaged
appropriately,mayleadtoanoscillatingsituation
thatwilleventuallymakethenetworkunstable.
Conclusion
Thebeautyofsdn liesinitsabilityasatechnology
tomakenetworksflexible,ensureefficientuse
ofresources,andfacilitateamuchhigherlevelof
systemautonomy.Likeanynascenttechnology,sdn
shouldbehandledcautiouslytoavoiditbecoming
anattackvector.However,sdn opensupnew
possibilitiesfortheimplementationofimproved
securitymechanismsinthenetwork,offering
broadervisibility,programmability,aswellasa
centralizedapproachtonetworkmanagement.
Kristian Slavov
◆ Works at Ericsson
Security Research in
Jorvas, Finland. He
has a background in
programming and a keen
interest in security, with
more than 10 years of
experience in this field.
He holds an M.Sc. in
telecommunications
software from Helsinki
University of Technology.
He is also an avid canoe
polo player.
Daniel Migault
◆ Works at Ericsson
Security Research in
Montreal, Canada. He
works on standardization
at IETF and serves as a
liaison between IAB and
ICANN/RSSAC. He used
to work in the Security
Department at Orange
Labs for France Telecom
RD and holds a Ph.D.
in Telecom and Security
from Pierre and Marie
Curie University (UPMC)
and Institut National des
Telecommunications (INT),
France.
Makan Pourzandi
◆ Works at Ericsson
Security Research in
Montreal, Canada. He
has more than 15 years’
experience in security
for telecom systems,
cloud, and distributed
security and software
security. He holds a Ph.D.
in parallel computing and
distributed systems from
the Université Claude
Bernard Lyon 1, France,
and an M.Sc. in parallel
processing from École
Normale Supérieure (ENS)
de Lyon, France.
THEAUTHORS
References
1.	 Open Networking Foundation, 2014, sdn
Architecture Overview, available at:
http://www.opennetworking.org/images/stories/
downloads/sdn-resources/technical-reports/TR_
SDN-ARCH-Overview-1.1-11112014.02.pdf
2.	 ACM, 2013, Proceedings,Towards secure
and dependable software-defined networks,
abstract available at:
http://dl.acm.org/citation.cfm?id=2491199
3.	 Ericsson, 2013, Ericsson Review, Software-
defined networking: the service provider
perspective, available at:
http://www.ericsson.com/news/130221-software-
defined-networking-the-service-provider-
perspective_244129229_c
4.	 OpenDaylight project, available at:
http://www.opendaylight.org/
5.	 CSL, SRI International, 2015, Proceedings,
Securing the Software-Defined Network,
available at:
http://www.csl.sri.com/users/porras/SE-
Floodlight.pdf
✱ WHAT DOES SDN EXPOSE?
12 ERICSSON TECHNOLOGY REVIEW ✱ AUGUST 31, 2015
ISSN 0014-0171
284 23-3259 | Uen
© Ericsson AB 2015
Ericsson
SE-164 83 Stockholm, Sweden
Phone: + 46 10 719 0000

More Related Content

What's hot

Attacking SDN infrastructure: Are we ready for the next gen networking
Attacking SDN infrastructure: Are we ready for the next gen networkingAttacking SDN infrastructure: Are we ready for the next gen networking
Attacking SDN infrastructure: Are we ready for the next gen networkingPriyanka Aash
 
“Visual AI at the Edge: From Surveillance Cameras to People Counters,” a Pres...
“Visual AI at the Edge: From Surveillance Cameras to People Counters,” a Pres...“Visual AI at the Edge: From Surveillance Cameras to People Counters,” a Pres...
“Visual AI at the Edge: From Surveillance Cameras to People Counters,” a Pres...Edge AI and Vision Alliance
 
VERIZON Network Infraestructure Planning
VERIZON Network Infraestructure PlanningVERIZON Network Infraestructure Planning
VERIZON Network Infraestructure PlanningBootcamp SCL
 
Cloud: Session 3 - Defining the True Cloud
Cloud: Session 3 - Defining the True CloudCloud: Session 3 - Defining the True Cloud
Cloud: Session 3 - Defining the True CloudSugarCRM
 
SDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same CoinSDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same CoinZivaro Inc
 
A sentient network - How High-velocity Data and Machine Learning will Shape t...
A sentient network - How High-velocity Data and Machine Learning will Shape t...A sentient network - How High-velocity Data and Machine Learning will Shape t...
A sentient network - How High-velocity Data and Machine Learning will Shape t...Wenjing Chu
 
BsidesSP: Pentesting in SDN - Owning the Controllers
BsidesSP: Pentesting in SDN - Owning the ControllersBsidesSP: Pentesting in SDN - Owning the Controllers
BsidesSP: Pentesting in SDN - Owning the ControllersRoberto Soares
 
Pulverisation in Cyber-Physical Systems: Engineering the Self-Organising Logi...
Pulverisation in Cyber-Physical Systems: Engineering the Self-Organising Logi...Pulverisation in Cyber-Physical Systems: Engineering the Self-Organising Logi...
Pulverisation in Cyber-Physical Systems: Engineering the Self-Organising Logi...Roberto Casadei
 
Vortex 2.0 -- The Industrial Internet of Things Platform
Vortex 2.0 -- The Industrial Internet of Things PlatformVortex 2.0 -- The Industrial Internet of Things Platform
Vortex 2.0 -- The Industrial Internet of Things PlatformAngelo Corsaro
 
Infrastructure Attacks - The Next generation, ESET LLC
Infrastructure Attacks - The Next generation, ESET LLCInfrastructure Attacks - The Next generation, ESET LLC
Infrastructure Attacks - The Next generation, ESET LLCInfosec Europe
 

What's hot (12)

Attacking SDN infrastructure: Are we ready for the next gen networking
Attacking SDN infrastructure: Are we ready for the next gen networkingAttacking SDN infrastructure: Are we ready for the next gen networking
Attacking SDN infrastructure: Are we ready for the next gen networking
 
“Visual AI at the Edge: From Surveillance Cameras to People Counters,” a Pres...
“Visual AI at the Edge: From Surveillance Cameras to People Counters,” a Pres...“Visual AI at the Edge: From Surveillance Cameras to People Counters,” a Pres...
“Visual AI at the Edge: From Surveillance Cameras to People Counters,” a Pres...
 
VERIZON Network Infraestructure Planning
VERIZON Network Infraestructure PlanningVERIZON Network Infraestructure Planning
VERIZON Network Infraestructure Planning
 
Cloud: Session 3 - Defining the True Cloud
Cloud: Session 3 - Defining the True CloudCloud: Session 3 - Defining the True Cloud
Cloud: Session 3 - Defining the True Cloud
 
SCADA White Paper March2012
SCADA White Paper March2012SCADA White Paper March2012
SCADA White Paper March2012
 
SDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same CoinSDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same Coin
 
A sentient network - How High-velocity Data and Machine Learning will Shape t...
A sentient network - How High-velocity Data and Machine Learning will Shape t...A sentient network - How High-velocity Data and Machine Learning will Shape t...
A sentient network - How High-velocity Data and Machine Learning will Shape t...
 
BsidesSP: Pentesting in SDN - Owning the Controllers
BsidesSP: Pentesting in SDN - Owning the ControllersBsidesSP: Pentesting in SDN - Owning the Controllers
BsidesSP: Pentesting in SDN - Owning the Controllers
 
Cast vs sonar
Cast vs sonarCast vs sonar
Cast vs sonar
 
Pulverisation in Cyber-Physical Systems: Engineering the Self-Organising Logi...
Pulverisation in Cyber-Physical Systems: Engineering the Self-Organising Logi...Pulverisation in Cyber-Physical Systems: Engineering the Self-Organising Logi...
Pulverisation in Cyber-Physical Systems: Engineering the Self-Organising Logi...
 
Vortex 2.0 -- The Industrial Internet of Things Platform
Vortex 2.0 -- The Industrial Internet of Things PlatformVortex 2.0 -- The Industrial Internet of Things Platform
Vortex 2.0 -- The Industrial Internet of Things Platform
 
Infrastructure Attacks - The Next generation, ESET LLC
Infrastructure Attacks - The Next generation, ESET LLCInfrastructure Attacks - The Next generation, ESET LLC
Infrastructure Attacks - The Next generation, ESET LLC
 

Similar to Ericsson Technology Review: Identifying and addressing the vulnerabilities and security issues of SDN

Software Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for ShopfloorSoftware Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for ShopfloorIRJET Journal
 
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...
IRJET-  	  Survey on SDN based Network Intrusion Detection System using Machi...IRJET-  	  Survey on SDN based Network Intrusion Detection System using Machi...
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...IRJET Journal
 
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdfTheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdfFernando Velez Varela
 
A Novel SDN Architecture for IoT Security
A Novel SDN Architecture for IoT SecurityA Novel SDN Architecture for IoT Security
A Novel SDN Architecture for IoT Securityijtsrd
 
Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...IRJET Journal
 
Controller Placement Problem resiliency evaluation in SDN-based architectures
Controller Placement Problem resiliency evaluation in SDN-based architecturesController Placement Problem resiliency evaluation in SDN-based architectures
Controller Placement Problem resiliency evaluation in SDN-based architecturesIJCNCJournal
 
Controller Placement Problem Resiliency Evaluation in SDN-based Architectures
Controller Placement Problem Resiliency Evaluation in SDN-based ArchitecturesController Placement Problem Resiliency Evaluation in SDN-based Architectures
Controller Placement Problem Resiliency Evaluation in SDN-based ArchitecturesIJCNCJournal
 
A Survey On Software-Defined Wireless Sensor Networks Challenges And Design ...
A Survey On Software-Defined Wireless Sensor Networks  Challenges And Design ...A Survey On Software-Defined Wireless Sensor Networks  Challenges And Design ...
A Survey On Software-Defined Wireless Sensor Networks Challenges And Design ...Angela Tyger
 
Software Defined Networking Attacks and Countermeasures .docx
Software Defined Networking Attacks and Countermeasures .docxSoftware Defined Networking Attacks and Countermeasures .docx
Software Defined Networking Attacks and Countermeasures .docxrosemariebrayshaw
 
Software Defined Networking (SDN): A Revolution in Computer Network
Software Defined Networking (SDN): A Revolution in Computer NetworkSoftware Defined Networking (SDN): A Revolution in Computer Network
Software Defined Networking (SDN): A Revolution in Computer NetworkIOSR Journals
 
Whitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco IndustryWhitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco Industryaap3 IT Recruitment
 
Security of software defined networking (sdn) and cognitive radio network (crn)
Security of software defined networking (sdn) and  cognitive radio network (crn)Security of software defined networking (sdn) and  cognitive radio network (crn)
Security of software defined networking (sdn) and cognitive radio network (crn)Ameer Sameer
 
Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...IJECEIAES
 
We Believe It's Time for Some Straight Talk.
We Believe It's Time for Some Straight Talk.We Believe It's Time for Some Straight Talk.
We Believe It's Time for Some Straight Talk.Juniper Networks
 
An Analysis on Software Defined Wireless Network using Stride Model
An Analysis on Software Defined Wireless Network using Stride ModelAn Analysis on Software Defined Wireless Network using Stride Model
An Analysis on Software Defined Wireless Network using Stride ModelIRJET Journal
 
A review on software defined network security risks and challenges
A review on software defined network security risks and challengesA review on software defined network security risks and challenges
A review on software defined network security risks and challengesTELKOMNIKA JOURNAL
 
SDN and Security: A Marriage Made in Heaven. Or Not.
SDN and Security: A Marriage Made in Heaven. Or Not.SDN and Security: A Marriage Made in Heaven. Or Not.
SDN and Security: A Marriage Made in Heaven. Or Not.Priyanka Aash
 

Similar to Ericsson Technology Review: Identifying and addressing the vulnerabilities and security issues of SDN (20)

Software Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for ShopfloorSoftware Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for Shopfloor
 
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...
IRJET-  	  Survey on SDN based Network Intrusion Detection System using Machi...IRJET-  	  Survey on SDN based Network Intrusion Detection System using Machi...
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...
 
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdfTheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
 
A Novel SDN Architecture for IoT Security
A Novel SDN Architecture for IoT SecurityA Novel SDN Architecture for IoT Security
A Novel SDN Architecture for IoT Security
 
Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...
 
Controller Placement Problem resiliency evaluation in SDN-based architectures
Controller Placement Problem resiliency evaluation in SDN-based architecturesController Placement Problem resiliency evaluation in SDN-based architectures
Controller Placement Problem resiliency evaluation in SDN-based architectures
 
Controller Placement Problem Resiliency Evaluation in SDN-based Architectures
Controller Placement Problem Resiliency Evaluation in SDN-based ArchitecturesController Placement Problem Resiliency Evaluation in SDN-based Architectures
Controller Placement Problem Resiliency Evaluation in SDN-based Architectures
 
A Survey On Software-Defined Wireless Sensor Networks Challenges And Design ...
A Survey On Software-Defined Wireless Sensor Networks  Challenges And Design ...A Survey On Software-Defined Wireless Sensor Networks  Challenges And Design ...
A Survey On Software-Defined Wireless Sensor Networks Challenges And Design ...
 
Software Defined Networking Attacks and Countermeasures .docx
Software Defined Networking Attacks and Countermeasures .docxSoftware Defined Networking Attacks and Countermeasures .docx
Software Defined Networking Attacks and Countermeasures .docx
 
Software Defined Networking (SDN): A Revolution in Computer Network
Software Defined Networking (SDN): A Revolution in Computer NetworkSoftware Defined Networking (SDN): A Revolution in Computer Network
Software Defined Networking (SDN): A Revolution in Computer Network
 
Sdnhpkorea
SdnhpkoreaSdnhpkorea
Sdnhpkorea
 
Whitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco IndustryWhitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco Industry
 
Security of software defined networking (sdn) and cognitive radio network (crn)
Security of software defined networking (sdn) and  cognitive radio network (crn)Security of software defined networking (sdn) and  cognitive radio network (crn)
Security of software defined networking (sdn) and cognitive radio network (crn)
 
Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...
 
What is SDN.pdf
What is SDN.pdfWhat is SDN.pdf
What is SDN.pdf
 
We Believe It's Time for Some Straight Talk.
We Believe It's Time for Some Straight Talk.We Believe It's Time for Some Straight Talk.
We Believe It's Time for Some Straight Talk.
 
An Analysis on Software Defined Wireless Network using Stride Model
An Analysis on Software Defined Wireless Network using Stride ModelAn Analysis on Software Defined Wireless Network using Stride Model
An Analysis on Software Defined Wireless Network using Stride Model
 
A review on software defined network security risks and challenges
A review on software defined network security risks and challengesA review on software defined network security risks and challenges
A review on software defined network security risks and challenges
 
SDN and Security: A Marriage Made in Heaven. Or Not.
SDN and Security: A Marriage Made in Heaven. Or Not.SDN and Security: A Marriage Made in Heaven. Or Not.
SDN and Security: A Marriage Made in Heaven. Or Not.
 
TFI2014 Session I - State of SDN - John Giacomoni
TFI2014 Session I - State of SDN - John GiacomoniTFI2014 Session I - State of SDN - John Giacomoni
TFI2014 Session I - State of SDN - John Giacomoni
 

More from Ericsson

Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...Ericsson
 
Ericsson Technology Review: issue 2, 2020
 Ericsson Technology Review: issue 2, 2020 Ericsson Technology Review: issue 2, 2020
Ericsson Technology Review: issue 2, 2020Ericsson
 
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...Ericsson
 
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...Ericsson
 
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...Ericsson
 
Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...Ericsson
 
Ericsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applicationsEricsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applicationsEricsson
 
Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020Ericsson
 
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson
 
Ericsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G systemEricsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G systemEricsson
 
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystemEricsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystemEricsson
 
Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019Ericsson
 
Ericsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of ThingsEricsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of ThingsEricsson
 
Ericsson Technology Review - Technology Trends 2019
Ericsson Technology Review - Technology Trends 2019Ericsson Technology Review - Technology Trends 2019
Ericsson Technology Review - Technology Trends 2019Ericsson
 
Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...Ericsson
 
SD-WAN Orchestration
SD-WAN OrchestrationSD-WAN Orchestration
SD-WAN OrchestrationEricsson
 
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...Ericsson
 
Ericsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive stateEricsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive stateEricsson
 
Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...Ericsson
 
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...Ericsson
 

More from Ericsson (20)

Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...
 
Ericsson Technology Review: issue 2, 2020
 Ericsson Technology Review: issue 2, 2020 Ericsson Technology Review: issue 2, 2020
Ericsson Technology Review: issue 2, 2020
 
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
 
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
 
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
 
Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...
 
Ericsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applicationsEricsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applications
 
Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020
 
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
 
Ericsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G systemEricsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G system
 
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystemEricsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystem
 
Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019
 
Ericsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of ThingsEricsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of Things
 
Ericsson Technology Review - Technology Trends 2019
Ericsson Technology Review - Technology Trends 2019Ericsson Technology Review - Technology Trends 2019
Ericsson Technology Review - Technology Trends 2019
 
Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...
 
SD-WAN Orchestration
SD-WAN OrchestrationSD-WAN Orchestration
SD-WAN Orchestration
 
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
 
Ericsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive stateEricsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive state
 
Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...
 
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
 

Recently uploaded

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Recently uploaded (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Ericsson Technology Review: Identifying and addressing the vulnerabilities and security issues of SDN

  • 1. WHAT DOES SDN EXPOSE? ✱ AUGUST 31, 2015 ✱ ERICSSON TECHNOLOGY REVIEW 1 C H A R T I N G T H E F U T U R E O F I N N O V A T I O N V O L U M E 9 2 | # 7 . 2 0 1 5 Review IDENTIFYINGAND ADDRESSINGTHE VULNERABILITIES ANDSECURITYISSUES OFSDN ERICSSON TECHNOLOGY Tenants Network elements C Applic Managementmodules Management plane SDN applications SDN controllers D-CPI A-CPI MM MM MM SDN app SDNc NE NE
  • 2. ✱ WHAT DOES SDN EXPOSE? 2 ERICSSON TECHNOLOGY REVIEW ✱ AUGUST 31, 2015 vulnerabilities IDENTIFYING AND ADDRESSING THE KRISTIAN SLAVOV DANIEL MIGAULT MAKAN POURZANDI The promises of agility, simplified control, and real-time programmability offered by software-defined networking (sdn) are attractive incentives for operators to keep network evolution apace with advances in virtualization technologies. But do these capabilities undermine security? To answer this question, we have investigated the potential vulnerabilities of sdn. The aim is for this architecture to serve as a secure complement to cloud computing, and to ensure that networks are protected from attack by malicious intruders. Tr a d i t i o n a l n e t w o r k architecture has reached the point where its ability to adapt to dynamic environments, like those enabled by virtualization technologies, has become a hindrance. By separating the control plane from the data plane, sdn raises the level of system abstraction, which in turn opens the door for network programmability, increased speed of operations, and simplification: in short, the key to delivering on its promises, and enabling telecom networks and it to develop in parallel. Attheheartofsdn architectureliesthesdn controller(sdnc).Logicallypositionedbetween networkelements(nes)andsdn applications(sdn apps),thesdnc providesaninterfacebetweenthe two.Itscentralizedpositionenablesittoprovide othersdn componentswithaglobaloverviewof whatishappeninginthenetwork;itcanconfigure nesontheflyanddeterminethebestpathfortraffic. Thesdnc andtheshifttocentralizedcontrolset sdn architectureapartfromtraditionalnetworks –inwhichcontrolisdistributed.Unfortunately,the centralizedpositionofthesdnc makesitaprimary surfaceforattack. SECURITY ISSUES OF SDN &
  • 3. WHAT DOES SDN EXPOSE? ✱ AUGUST 31, 2015 ✱ ERICSSON TECHNOLOGY REVIEW 3 Forthepurposesofthisarticle,welimited thescopeofourstudyintothevulnerabilitiesof sdn tothesinglecontrollerusecase(withone controllergoverningthedataplane),eventhough sdn architectureallowsforseveral.Ourdiscussion coversthesdn elementsandtheirinteractionsin thesinglecontrollercase,aswellastheinteractions betweenthesdnc andthemanagementplane. Whycentralize? Asdefinedbyonf1 ,alogicallycentralizedcontrol planemakesitpossibletomaintainanetwork- wideviewofresources,whichcanthenbe exposedtotheapplicationlayer.Toprovidesuch acentralizedarchitecture,sdn usesoneormore nesthatinterfacewiththesdnc.Thebenefitof buildingnetworksinthiswayissimplifiednetwork management,andimprovedagility. Centralizationequipsnetworksfor programmability,whichinturnincreasesautonomy. Onepossibilityenabledbyprogrammabilityis theautomaticdetectionandmitigationofddos attacks,whichresultsinrapidresolutionofany problemsthatmayarise.Programmabilityalso allowsnetworkresourcestobesharedautomatically, which–togetherwiththecapabilitytocreate virtualnetworkscreatedontopofexistingnetwork infrastructure–enablesautomaticsharingby multipletenants. Benefitsandvulnerabilities sdn facilitatestheintegrationofsecurityappliances intonetworks,whichcanbeimplementeddirectlyon topofthecontrolplane,ratherthanbeingaddedas separateappliancesorinstantiatedwithinmultiple nes.sdn’scentralizedmanagementapproach enableseventswithintheentirenetworktobe collectedandaggregated,Theresultingbroader, morecoherentandmoreaccurateimageofthe network’sstatus,makessecuritystrategiesboth easiertoenforceandtomonitor. Theabilitytoimplementsecuritymechanisms directlyontopofthecontrolleroronsteeringtraffic atruntime(usinglegacyapplianceswhennecessary) makesitpossibletodynamicallyaddtapsand sensorsatvariousplacesinthenetwork–which makesformoreeffectivenetworkmonitoring.With anaccuratepictureofitsstatus,thenetworkcan morereadilydetectattacks,andthenumberoffalse positivesreportedcanbereduced.Inpractice,ifa tapindicatestothesdnc thatadeviceisshowing signsofbeinghijackedbyabotnet,thesdnc can steerthepotentiallyoffendingtraffictoanids for analysisandmonitoring.Ifthetrafficisdeemed maliciousbytheids,thesdnc canfilteritand instructthefirst-hopne accordingly. Itsabilitytofacilitatethecollectionofnetwork- statusinformationaswellasenablingautomatic detectionandresolutionofanybreachinsecurity, makessdn idealforintegrationintonetworkthreat intelligencecentersandServiceOperationCenters (socs).Unfortunately,therichfeaturesetofsdn alsoprovidesalargerattacksurfacecomparedwith traditionalnetworks–anissuedocumentedina numberofrecentlypublishedresearchpapers2 . Referencemodel Theoverallsdn architecturecomprisesthe followingelements: 〉〉 nes–whichareresponsibleforforwardingpacketsto thenextappropriatene orendhost; 〉〉 sdnc –whichsendsforwardingrulesontothenes accordingtoinstructionsitreceivesfromsdn apps; Termsand abbreviations ddos–Distributed DoS | dos–Denial of Service | gre–Generic Routing Encapsulation | ids–intrusion detection system | ipsec–Internet Protocol Security | mm– management module | mpls–multi-protocol label switching | ne–network element | onf–Open Networking Foundation | rbac role-based access control | sdnsoftware-defined networking | sdnc–sdn controller | sla–Service Level Agreement | tls–Transport Layer Security domain-specific modeling language
  • 4. ✱ WHAT DOES SDN EXPOSE? 4 ERICSSON TECHNOLOGY REVIEW ✱ AUGUST 31, 2015 Tenants Network elements Data plane Control plane Application plane Managementmodules Management plane SDN applications SDN controllers D-CPI A-CPI MM MM MM SDN app SDNc NE NE Figure 1 sdn architecture
  • 5. AUGUST 31, 2015 ✱ ERICSSON TECHNOLOGY REVIEW 5 〉〉 sdn apps–whichissuecommandstodynamically configurethenetwork; 〉〉 tenants–thelogicalownersofthevirtualnetwork,who provideconfigurationandpolicyinformationthrough networkapps;and 〉〉 managementmodules(mms)–whichareresponsible fordeviceadministration. AsillustratedinFigure1,thesdn architecture comprisesfourplanes:thedataplane,thecontrol plane,theapplicationandthemanagementplane. Thedataplanecarriesusertrafficthroughthe differentnes,whicharedynamicallyprogrammed torespondtothepoliciesofthedifferenttenants. Forwardingpoliciesareelaborated,andsenton bythecontrolplanetoeachne.Themanagement planeisdedicatedtoinfrastructuremanagement, physicaldevicemanagementaswellasplatform managementissuessuchasfirmwareandsoftware upgrades3,4 .Theapplicationplaneisconstitutedby allapplicationsthatprogramthenetworkthrough interactionswiththesdnc.Theseapplicationsmay beindependentandownedbydifferenttenants. Networksthatarebuiltaccordingtosdn architectureprinciplesneedtoprotectanumberof keysecurityassets: 〉〉 availability–thenetworkshouldremainoperational evenunderattack; 〉〉 performance–thenetworkshouldbeabletoguarantee abaselinebandwidthandlatencyintheeventofan attack; 〉〉 integrityandconfidentiality–controlplaneanddata planeintegrityandisolationshouldbeupheldbetween tenants. Toassureprotectionoftheseassets,anumberof processesneedtobeinplace: Authenticationandauthorization Onlyauthenticatedandauthorizedactorsshould beabletoaccesssdn components.Thegranularity ofauthenticationandauthorizationmustbe detailedenoughtolimittheconsequencesofstolen credentialsoridentityhijacking. Resiliency Networksmustbeabletorecoverasautonomously aspossiblefromanattack,orasoftwareorhardware failure.Alternatively,networksmustbeableto dynamicallyworkaroundanyaffectedfunctionality. Contractualcompliance Tofulfillslas,mitigationtechniquesmustbe implemented,andproofthatsuchtechniqueshave beenactivatedeffectivelymustbeprovided. Multi-domainisolation Systemsmustbeabletoisolatetenantsinmultiple domains,suchastheresourceandtrafficdomains. Thefollowingformsofisolationapply: 〉〉 resourceisolation–preventstenantsfromstealing resources,likebandwidth,fromeachother,andis requiredforsla fulfillment;and 〉〉 trafficisolation–requiredbymulti-tenant deployments,soatenantcanseeitsowntrafficonly (thisrequirementappliestobothdataplaneandcontrol planetraffic). Repudiation Allactionscarriedoutbyallsystemactors–both internalandexternal–mustbelogged,andtheall logsneedtobesecured. Transparency Systemsshouldprovidevisibilityintooperations andnetworkstatussotheycandeterminethemost appropriateactionwhenissuesarise.Anactive approachtosecurityrequirescorrectidentification andclassificationofanissuesothemostappropriate actiontomitigateitmaybechosen.Anyaction shouldbeverifiedtoensurethatithasbeenenforced effectively. Thepotentialvulnerabilitiesofsdn architecture areillustratedinFigure2,whichforthesakeof simplicityshowsonlyasubsetofthepossiblemajor attacks. What’sdifferentaboutsdn security? Manyofthesecurityissuesrelatedtosdn networks aresimilartothosethatappearintraditional
  • 6. ✱ WHAT DOES SDN EXPOSE? 6 ERICSSON TECHNOLOGY REVIEW ✱ AUGUST 31, 2015 Configuration Log Control logic Hardware Software LogConfiguration Net topologyControl logic Hardware Software Configuration Flow rules Hardware Software Tenant impersonation Communication hijacking API abuse App manipulation Communication hijacking Network manipulation Information leakage Compromised network Compromised system Communication hijacking DoSattack Admin impersonation Tenants Network elements Data plane Control plane Application plane Management module Management plane SDN applications SDN controllers D-CPI A-CPI MM MM MM SDN app SDNc NE NE DoS attack Network manipulation Figure 2 Potential vulnerabilities of sdn architecture
  • 7. AUGUST 31, 2015 ✱ ERICSSON TECHNOLOGY REVIEW 7 networks.What’sinteresting,however,iswhatsets sdn apartfromtraditionalnetworks. Comparedwithtraditionalnetworks,the separationofthecontrolanddataplanesenables multi-tenancyandprogrammability,andintroduces centralizedmanagementintothenetwork architecture.Inthisnewmodel,tenantsrunsdn appsthatinterfacewiththesdnc,whichsends instructionstones.Fromasecurityperspective, theabilitytoshareanddynamicallyoperatethe samephysicalnetworkisoneofthekeysecurity- relateddifferencesbetweensdn andtraditional architectures.Assuch,sdn securityissuesrelateto thenewcontrolplanemodel,andmorespecifically tosecuringinter-componentcommunication,and controllingthescopeofapplicationsandtenants throughspecificapisandaccesspolicies. Whileitmaysoundlikethereareanumberof obstaclestoovercome,theprogrammabilityand centralizedmanagementbroughtaboutbysdn enablesamuchgreateralevelofautonomyto mitigateanysecuritybreaches–outweighingthe needforadditionaltechnology. Centralizednetworkmanagement Intraditionalnetworks,nestendtobemonitored andmanagedindividually.However,without theexistenceofstandardprotocolscapableof interactingwithallnesirrespectiveoftheir vendororgeneration,networkmanagement hasbecomecumbersome.Thesdn approach enablescoordinatedmonitoringandmanagement offorwardingpoliciesamongdistributednes, resultinginamoreflexiblemanagementprocess. Whilethereisariskofthesdn controlplane becomingabottleneck,thefactthatithasan overviewoftheentirenetwork,makesitcapableof mitigatinganyreportedincidentdynamically.For example,addos attackcanbedetectedandquickly mitigatedbyisolatingthesuspecttraffic,networksor hosts.Unliketraditionalddos appliances–which generallycarryonlyalocalviewofthenetwork– centralizedelementspossessamuchbroaderviewof networktopologyandperformance,makingthesdn anidealcandidateforthedynamicenforcementofa coherentsecurityposture. However,whileitisclearthatcentralization providessignificantbenefits,italsopresentsa numberofchallenges,likethefactthatthesdnc isahighlyattractiveattacksurface.Thankfully, resiliency,authentication,andauthorizationaddress thisrisk,reducingtheimpactofattack. Resilientcontrolplane Thethreemainelementsofsdn are:sdn apps,the sdnc,andnes.Giventhatcontrolofthenetworkis centralized,allcommunicationwithinthecontrol planeneedstobetreatedascritical,asanoutage resultingfromasuccessfulattackmayleadtoan undesiredimpactonbusinesscontinuity.If,for example,thesdnc ispreventedfromtakingcritical actiontomitigateados attack,theentirenetwork andallofitstenantsmaybeaffected.Toavoidthis, thecontrolplaneneedsagreaterlevelofresiliency builtintoit. Tocommunicatewithtenantapplicationsand nes,thesdnc exposesasetofinterfaces.Allthese interfacesmayexperienceheavytrafficloads, dependingonthetypeandnumberofrunning applications.Trafficontheinterfacescanbefurther impactedbynes,forexample,forwardingpackets forwhichtheyhavenoforwardingrules.So,interms ofdependenceonthesdnc,traditionalnetworks appeartobemorerobust. Aneffectivewaytoimprovetheresilienceofthe centralizedcontrolplaneandpreventthespread ofddos control-planeattackstotherestofthe networkistorate-limitnesintermsofbandwidth andresourceconsumption–suchascpu load, memoryusage,andapi calls. Resiliencecanbefurtherenhancedthrough properresourcededication–wherethesdnc authenticateseachresourcerequest,and subsequentlychecksrequestsagainststrong authorizationcontrolpolicies. Strongauthenticationandauthorization Authenticationandauthorizationaretheprocesses usedtoidentifyanunknownsourceandthen determineitsaccessprivileges.Implemented correctly,theseprocessescanprotectnetworksfrom certaintypesofattack,suchas:
  • 8. ✱ WHAT DOES SDN EXPOSE? 8 ERICSSON TECHNOLOGY REVIEW ✱ AUGUST 31, 2015 〉〉 provisionoffalse(statistical)feedbacktothesystem –forexample,foolingthesystemintobelievingitis underattack,resultinginunnecessarydeployment ofcountermeasures,whichconsumesresourcesand inevitablyleadstosuboptimalusage; 〉〉 modificationofavalidon-pathrequest–whichresults inadirectattackthataltersnetworkbehavior; 〉〉 forwardingtrafficthatisnotmeanttobeforwarded, ornotforwardingtrafficthatshouldbe–subverting networkisolation;and 〉〉 gainingcontrolaccesstoanycomponent–rendering theentirenetworkuntrustworthy. Thecriticalnatureofthesdnc dictatesthat additionalsecuritymeasuresneedtobetakento protectit.Attheveryleast,trafficmustbeintegrity protectedtopreventtamperingofon-pathtraffic, buteventhislevelofprotectiondoesnotsecure controldata. Encryptionisonewayofpreventingcontrol datafrombeingleaked.But,eventogetherwith integrityprotection,encryptionisnotsufficientto protectagainstman-in-the-middle-typeattacks. Andso,allcommunicationwithinthecontrolplane mustbemutuallyauthenticated.Securityprotocols liketls andipsec provideameansformutual authenticationaswellasforreplayattackprotection, confidentiality,andintegrityprotection. Mutualauthenticationdoes,however,present somedifficulties,suchashowtobootstrapsecurity intothesystem.Onewaytosolvethisisbyusing securitycertificates.Howthenthesecertificatesare issued,installed,stored,andrevokedthenbecomes thesignificantsecuritydifficulty.Encryptionand integrityprotectionwithoutmutualauthentication arelessusefulfromasecuritypointofview. Theproblemwithmutualauthenticationis thatitrequirespreviousknowledgeoftheremote communicatingendpoint–unlessacommonly trustedthirdpartyexists. Onasmallscale,mutualauthenticationcanbe implementedmanually–requiringadministrators toinstallpropercertificatesorsharedsecretson allendpoints.However,forcomplexandphysically separatedsystems–andespeciallyinnetworks wheremanysdn componentscanbecreated dynamicallyandadministeredbymultipleparties– manualimplementationmaynotbefeasible. Thesdnc providesnetworkconfiguration informationthroughAPI callstoitsservices,which enablestenantstousesdn applicationstocontrol networkbehavior.Thissituationissomewhat alarming,giventhatphysicalhardwareresources maybesharedamongrivaltenants.Whileordinary securitymeasures–suchasargumentsanitization andvalidation–mustbeinplace,thesdnc also needsasolidauthentication,authorizationand accountabilityinfrastructuretoprotectthenetwork fromunauthorizedchanges.Strongauthentication andauthorizationprovidesadditionalprotection,as itpreventsanattackerfromimpersonatingansdn component,especiallythesdnc. Byenforcingstrictauthorizationand accountabilityprocesses,damagescanbelimited, andreliabletracesforforensicsprovided.Role- basedaccesscontrol(rbac)isacommonlyused approachforrestrictingtheactionspermittedby anapplicationbyassigningaroletoit.Rolescanbe definedonahost,userorapplicationbasis. Ineffect,rbac isasecuritypolicyenforcing system.Thefewerthenumberofpermittedactions, themorelimitedtheexploitablefunctionality.When implementedcorrectly,rbac canbeinvaluable. Unfortunately,thisapproachisrathercumbersome insystemswithverynarrowlydefinedroles wherefrequentchangestakeplace.Attheother endofthescale,rbac losesitsedgeifrolesaretoo looselydefined. Forthepurposesofsystemintegrityassurance, everyeventthatoccursinthesystemshouldbe recordedinalog.Howtheselogsarestoredand securedagainstimproperaccessalsoneedstobe considered,andanexternalhostisrecommended. Multi-tenancy Wherenetworksarebuiltusingsdn techniques,itis possibleforthesamephysicalnetworktobeshared amongseveraltenants,whichcaninturnmanage theirownvirtualnetworks.Multi-tenancyallowsfor betterutilizationofnetworkresources,loweringthe totalcostofownership.Fortenants,sdn shortens thetimetakentoreacttochangingsituations
  • 9. WHAT DOES SDN EXPOSE? ✱ AUGUST 31, 2015 ✱ ERICSSON TECHNOLOGY REVIEW 9 through,forexample,automaticscalingofresources. Tomaintainanacceptablelevelofsecurity,tenants shouldnotbeabletointerferewitheachother’s networks,andneednotevenbeawarethattheyare sharingnetworkresourceswithothers. Tenantisolation(theseparationofonetenant’s resourcesandactionsfromanother)isanimportant featureofsdn frameworksecurity. Controlplaneisolation Isolationisonewaytopreventtheactionsofone tenantfromimpactingothers.Thisisacritical businessaspectthatmustbestronglyenforced. Tenantisolationisorchestratedbythesdnc, andimplementedinsdn nesthroughspecific forwardingrules.Whiletheburdenofproviding secureisolationlieswiththesdnc,tenantsalsoplay animportantroleinsharingthatburden. Thenetworkprovidesisolationprimarilyonthe linklayer.Ifatenanthasweaknetworksecurity procedures,informationdisclosuremayoccur, resultinginabreachofisolationathigherlayers. Forexample,aroguesdn appwithprivilegesthat spanbeyondisolationbordersmayimpactoverall networksecuritybysteeringtraffictoathirdparty (informationdisclosure)byover-orunder-billing (theftofservice)orbydroppingtraffic(dos). Thecentralizednatureofthesdn controlplane furtheraccentuatestheimpactofsuchattacks. Consequently,thetaskofprovidingisolationcannot beentirelyoffloadedontothesdn network. Dataplaneisolation Tenantsrunningabusinessonvirtualnetworks builtusingsdn maybesubjecttothesame kindofnetwork-basedattacksasintraditional networks.However,duetothesharednetworking infrastructure,theimpactofsuchanattackmaybe dividedamongsomeorevenallofthesetenants. Thisisanewrisk,whichmayhaveacommercial impact;nobodywantstoopenabusinessnexttoa known(orperceived)troublemakeroronethatis pronetoattack. So,forthedataplane,flowsassociatedwith eachparticulartenantmustremainisolatedatall times.Isolationmaybeperformedlogicallythrough overlaynetworks andenforced withinthenes.For example,bytagging theownershipof trafficgenerated byeachtenant, thetrafficcanbe carriedoverasharedinfrastructure–onceithas beenencapsulated(tagged).Tunnelstaggedfor agiventenantarethenforwardedtothevirtual networkforthattenant.Manyalternative(and complementary)techniquesareavailableforthis typeofencapsulation,includinggre,mpls and ipsec. Taggingisonewaytoperformlogicalisolation, butIP addressescanalsobeused,removingthe needforspecifictaggingtechniques.Bearingin mindthatseparatenetworkfunctioninstances arenotrequiredtoservicedifferenttenants,some networkfunctionalitycanbesharedbytenantsas longasisolationispreservedandenforced. Inadditiontologicalisolation,trafficmaybe encryptedwithspecifictenantkeys.Thisguarantees thatinthecaseoflogicalencapsulationviolation,the datatrafficremainsisolatedandinformationcannot beleaked. Isolationissuesneedtoberesolvedwhilebearing resourceconsumptioninmind.Whiletraffic isolationcanhelpwithdataleakage,sharedresource usagealsorequiresresourceisolation.Forexample, theexistenceofaforwardingloopwithinonetenant maypotentiallyimpactalltenants,astheproblem overloadstheunderlyingnetworkequipment.To counteractthisproblem,thesdnc mustenforce resourceisolation,andusemeasureslikerate limitingtominimizetheimpactthatatenantcan haveonthenetwork. Programmability Oneofthesignificantbenefitsbroughtabout throughsdn isprogrammability:theabilityto configureanetworkefficiently,securely,andin atimelymanner.sdn programmabilityexistsin varyingdegreesofcomplexityandabstraction.At oneendofthescale,programmabilityenablesnes AS THE SDNC IS SO CRITICAL,ADDITIONAL SECURITY MEASURES ARE NEEDED TO PROTECT IT
  • 10. ✱ WHAT DOES SDN EXPOSE? 10 ERICSSON TECHNOLOGY REVIEW ✱ AUGUST 31, 2015 tobedynamicallyreprogrammedtoforwarddata flowsaccordingtotheircapabilitiesandhigher- levelpoliciesinthenetwork.Attheotherend,sdn appsenabletenantstoprogrammaticallyissuerun- timerequirementstothenetwork.Allrequestsare consolidatedbythesdnc,whichfulfillshigher-level requestsfromthecapabilitiesavailableatthelower levels.Tomakethistasktrickier,sdn appsmay issueorthogonal(mutuallyexclusive/contradicting) requests.Theautomatedsolutionmaythenneedto dynamicallyreconfigureachunkofthesdn network –andallofthismusthappenwithinsecondsorless. Theprimarybenefitthatprogrammabilitybrings fornetworksbuiltusingthesdn architecture approachisflexiblecontrol.Theabilitytocontrol anetworkandapplychangesinatimelymanner increasesthenetwork’slevelofagility.Suchflexibility canmakethenetworkmoresecure,asitisconstantly monitoredanddesignedtomitigatemalicious behaviorinmoreorlessrealtime.Thedownsideof theflexibilityprovidedbyprogrammabilityisthe significantimpactithasonsecurity. Configurationcoherency Allowingtenantstoissueprogrammaticchangesto thenetworkenablesnetworkstoadapttochanging conditions–increasingnetworkagility.Inpractical terms,programmabilitycan,forexample,reduce thetimeittakestosetupacustomercollaboration networkfromdaysormonthstominutesorhours. Programmabilitymayalsoremovetheneedfor manualconfiguration,whichispronetoerror.The result:theautomaticreconfigurationofnetworksis feasible,providingthesdnc withaglobalviewof thenetwork,enablingittoperformsanitychecking andregressiontestingsothatnewnetworkscanbe rapidlydeployed. Unfortunately,theflexibilityprovidedby programmabilityallowstenantstomakechanges tothesharedenvironment,whichcancripplethe operationoftheentirenetwork–eitherintentionally orunintentionallyasaresultofmisinformation. Ensuringcoherencyamongtheactionsofthe varioussdn appsonthenetworkalsoneedsto beconsideredfromasecuritypointofview(as describedin5 ).Considerthecasewheresecurity andload-balancingapplicationsareinstantiated foragiventenant.Acoherencyconflictarises,for example,whenthesecurityapplicationdecides toquarantineaserver,whiletheload-balancing applicationsimultaneouslydecidestoroutetraffic tothequarantinedserver–becauseitappearsto havelowload.Toavoidcoherencyissues,thesdnc mustbeabletoassessandeliminatethepossibleside effectsoftheacceptablenetworkchangesby eachtenant,andtofeatureeffectiveconflict resolutionheuristics. Anothertypeofconflictarisesduetothe complexityofvirtualnetworktopologies,andthe difficultyofmaintainingacoherentsecuritypolicy acrossanetwork.Specialcareisrequiredfortraffic thatneedstobeforwardedtosecurityappliances formonitoringpurposes.Asthetrafficorpartsofit canberoutedoverdifferentpaths,methodsneed tobeputinplacetoensurethatallthetrafficis covered.Consequently,monitoringisnecessaryon allpaths.Similarissuesariseintraditionalnetworks, buttheincreasedservicevelocityofferedbysdn architecturemayfuelthistypeofconflict. Dynamicity Thedynamicandreactivenatureofnetworksbuilt usingthesdn approachopensupnewpossibilities forfightingnetworkattacks.Automatednetwork reconfigurations,forwardingtohoneypots,and blackholeroutingarejustsomeofthetechniques thatcanbeemployed.Servicechainingisyet anothertechniquethatutilizessdn propertiesand canbeusedtoscreenformaliciouspayloadand triggermitigatingactions. Anetworkbuiltusingsdn techniquescando lower-layeranalysisbasedonparameterssuchas datarate,source,andpacketsize,whilethetenant canprovidehigher-layeranalysisbasedonprotocols, transportports,andpayloadfingerprints.Once suspiciousbehaviorhasbeendetected,thenetwork canuseitsprogrammabilityfeaturestoanalyzethe situationinmoredetailortriggermitigatingactions. However,whilethefeedbacksystemprovides someadvantagesintermsofsecurity,italsopresents someissues.Theinteractionbetweenthedata planeandthecontrolplanebreaksthefundamental
  • 11. WHAT DOES SDN EXPOSE? ✱ AUGUST 31, 2015 ✱ ERICSSON TECHNOLOGY REVIEW 11 sdn concept:theseparationofthesetwoplanes. Thisinturnmakesthedataplaneasteppingstone forattackingthecontrolplane.Aswithother feedbackloops,thisinteraction,unlessmanaged appropriately,mayleadtoanoscillatingsituation thatwilleventuallymakethenetworkunstable. Conclusion Thebeautyofsdn liesinitsabilityasatechnology tomakenetworksflexible,ensureefficientuse ofresources,andfacilitateamuchhigherlevelof systemautonomy.Likeanynascenttechnology,sdn shouldbehandledcautiouslytoavoiditbecoming anattackvector.However,sdn opensupnew possibilitiesfortheimplementationofimproved securitymechanismsinthenetwork,offering broadervisibility,programmability,aswellasa centralizedapproachtonetworkmanagement. Kristian Slavov ◆ Works at Ericsson Security Research in Jorvas, Finland. He has a background in programming and a keen interest in security, with more than 10 years of experience in this field. He holds an M.Sc. in telecommunications software from Helsinki University of Technology. He is also an avid canoe polo player. Daniel Migault ◆ Works at Ericsson Security Research in Montreal, Canada. He works on standardization at IETF and serves as a liaison between IAB and ICANN/RSSAC. He used to work in the Security Department at Orange Labs for France Telecom RD and holds a Ph.D. in Telecom and Security from Pierre and Marie Curie University (UPMC) and Institut National des Telecommunications (INT), France. Makan Pourzandi ◆ Works at Ericsson Security Research in Montreal, Canada. He has more than 15 years’ experience in security for telecom systems, cloud, and distributed security and software security. He holds a Ph.D. in parallel computing and distributed systems from the Université Claude Bernard Lyon 1, France, and an M.Sc. in parallel processing from École Normale Supérieure (ENS) de Lyon, France. THEAUTHORS References 1. Open Networking Foundation, 2014, sdn Architecture Overview, available at: http://www.opennetworking.org/images/stories/ downloads/sdn-resources/technical-reports/TR_ SDN-ARCH-Overview-1.1-11112014.02.pdf 2. ACM, 2013, Proceedings,Towards secure and dependable software-defined networks, abstract available at: http://dl.acm.org/citation.cfm?id=2491199 3. Ericsson, 2013, Ericsson Review, Software- defined networking: the service provider perspective, available at: http://www.ericsson.com/news/130221-software- defined-networking-the-service-provider- perspective_244129229_c 4. OpenDaylight project, available at: http://www.opendaylight.org/ 5. CSL, SRI International, 2015, Proceedings, Securing the Software-Defined Network, available at: http://www.csl.sri.com/users/porras/SE- Floodlight.pdf
  • 12. ✱ WHAT DOES SDN EXPOSE? 12 ERICSSON TECHNOLOGY REVIEW ✱ AUGUST 31, 2015 ISSN 0014-0171 284 23-3259 | Uen © Ericsson AB 2015 Ericsson SE-164 83 Stockholm, Sweden Phone: + 46 10 719 0000