Fingerprinting OpenFlow Controllers: The First Step to Attack an SDN Control Plane - Sorbonne Université Accéder directement au contenu
Communication Dans Un Congrès Année : 2016

Fingerprinting OpenFlow Controllers: The First Step to Attack an SDN Control Plane

Abdelhadi Azzouni
  • Fonction : Auteur
Othmen Braham
  • Fonction : Auteur
  • PersonId : 968023
Thi-Mai-Trang Nguyen
  • Fonction : Auteur
Guy Pujolle
Raouf Boutaba

Résumé

Software-Defined Networking (SDN) controllers are considered as Network Operating Systems (NOSs) and often viewed as a single point of failure. Detecting which SDN controller is managing a target network is a big step for an attacker to launch specific/effective attacks against it. In this paper, we demonstrate the feasibility of fingerpirinting SDN controllers. We propose techniques allowing an attacker placed in the data plane, which is supposed to be physically separate from the control plane, to detect which controller is managing the network. To the best of our knowledge, this is the first work on fingerprinting SDN controllers, with as primary goal to emphasize the necessity to highly secure the controller. We focus on OpenFlow-based SDN networks since OpenFlow is currently the most deployed SDN technology by hardware and software vendors.
Fichier principal
Vignette du fichier
fingerprintingsdn.pdf (284.29 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01538464 , version 1 (13-06-2017)

Identifiants

Citer

Abdelhadi Azzouni, Othmen Braham, Thi-Mai-Trang Nguyen, Guy Pujolle, Raouf Boutaba. Fingerprinting OpenFlow Controllers: The First Step to Attack an SDN Control Plane. 59th annual IEEE Global Communications Conference (GLOBECOM 2016), Dec 2016, Washington DC, United States. pp.1-6, ⟨10.1109/GLOCOM.2016.7841843⟩. ⟨hal-01538464⟩
251 Consultations
233 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More