SLIDE 14 Introduction Approach Results Recommendations Conclusion Security Analysis Empirical Testing
Denial of Service III
Denial of service Against switch Against controller Against Flow table Against OpenFlow Interface and data flow Asynchronous message Against OpenFlow Module Generate very high traffic load
Exploit security hole in controller (if present) Against Input buffer Attack controller OpenFlow Interface directly Perform regular denial of service attack against controller Attack OpenFlow Interface and Asynchronous message Generate very high rate of new flows on several interfaces Generate very high traffic load
interface Generate extremely high traffic load on interface Obtain access to multiple client interfaces Obtain access to multiple client interfaces Obtain access to management network Locate security hole in controller software Develop exploit Perform processor intensive tasks
connections Identify which flow rules are created without wildcards Identify which flow rules are created without wildcards Identify which flow rules are created without wildcards Against Decision process Identify exact form of flow table entries Identify hash function used for flow table Cause hash collisions on flow table
Figure : Denial of Service attack tree with attack path highlighted
14 / 36