Preacher: Network Policy Checker for Adversarial Environments
Kashyap Thimmaraju, Liron Schiff and Stefan Schmid
1
Preacher: Network Policy Checker for Adversarial Environments - - PowerPoint PPT Presentation
Preacher: Network Policy Checker for Adversarial Environments Kashyap Thimmaraju, Liron Schiff and Stefan Schmid 1 Backdoors and exploits Network devices are very effective attack vectors Provide access to internal networks
Kashyap Thimmaraju, Liron Schiff and Stefan Schmid
1
2
3
a) Denial of service b) Port-scan c) Mirroring d) MitM e) Covert channel f) Re-route
4
Admin Verifier
5
Lee&Kim DS DSN06]
Admin Verifier
6
Admin Verifier
7
8
✓ Analysis + evaluations ✓ Dynamic assignment ✓ SDN switch ✓ OpenFlow encryption ✓ Distributed design ✓ SDN controller ✓ Parallel design
9
configuration)
expected samples (using the policy)
Internet
Controller Topology Incoming Samples Switch config. Preacher Hash assignment Verification Routing app. (policy)
10
Internet
Controller Topology Incoming Samples Switch config. Preacher Hash assignment Verification Routing app. (policy)
Use redundancy to improve security and fault tolerance!
11
(or pairs)
is not fatal
hashes, and receives a subset of the samples.
Internet
Hash assignment Assigner Assigner Assigner Verification Verifier Verifier Verifier
Use redundancy to improve security and fault tolerance!
12
and after attack
𝑜).
13
𝑄𝑗𝑏 = 1 − 1 − 𝑞 𝑙1 ∙ 1 − 1 − 𝑞 𝑙2 ≈ 𝑞2𝑙1𝑙2
𝑄
𝑞𝑏 > 1 − 1 −
𝑞 𝑜 − 1
𝑙1𝑙2
≈ 𝑞𝑙1𝑙2 𝑜 − 1
geometric distribution.
expected detection time.
to derive expected total samples’ rate (pps).
𝑙1 𝑙2
14
15
be detected within minutes
cores) are needed.
hard to detect.
16
17
18