Securing the SDN Northbound Interface With the aid of Anomaly - - PowerPoint PPT Presentation

securing the sdn northbound interface
SMART_READER_LITE
LIVE PREVIEW

Securing the SDN Northbound Interface With the aid of Anomaly - - PowerPoint PPT Presentation

Securing the SDN Northbound Interface With the aid of Anomaly Detection Jan J. Laan July 2, 2015 Introduction Current status Anomaly detection Conclusion Introduction Traditional network Securing the SDN Northbound Interface 1 / 19


slide-1
SLIDE 1

Securing the SDN Northbound Interface

With the aid of Anomaly Detection Jan J. Laan July 2, 2015

slide-2
SLIDE 2

Introduction Current status Anomaly detection Conclusion

Introduction

Traditional network

1 / 19 Securing the SDN Northbound Interface

slide-3
SLIDE 3

Introduction Current status Anomaly detection Conclusion

Introduction

SDN network

Advantages Centralized view Dynamic, flexible

2 / 19 Securing the SDN Northbound Interface

slide-4
SLIDE 4

Introduction Current status Anomaly detection Conclusion

Introduction

SDN overview

3 / 19 Securing the SDN Northbound Interface

slide-5
SLIDE 5

Introduction Current status Anomaly detection Conclusion

Introduction

Research question

Main question How to perform a security assessment of the northbound inter- face of a SDN network? Supporting questions

What are the main threats, and associated security requirements, to the SDN northbound interface? What is the best approach to assess the security of a northbound interface? How secure are the northbound interfaces of current popular SDN controllers? How can best practices with regard to security be improved?

4 / 19 Securing the SDN Northbound Interface

slide-6
SLIDE 6

Introduction Current status Anomaly detection Conclusion

Introduction

Related work

OperationCheckpoint [1] Northbound Access control for the Floodlight controller SEFloodlight [2] Conflict resolution, authentication for the Floodlight controller NB API. Rosemary [3] A controller built with security by design, especially for the northbound interface.

5 / 19 Securing the SDN Northbound Interface

slide-7
SLIDE 7

Introduction Current status Anomaly detection Conclusion

Current status

Testbed

5 popular and/or interesting controllers for testing.

6 / 19 Securing the SDN Northbound Interface

slide-8
SLIDE 8

Introduction Current status Anomaly detection Conclusion

Current status

1: HTTPS support

Goal: Secure communication in the northbound interface Check for supported HTTPS versions

1Web interface stops working 2SSL3 enabled 7 / 19 Securing the SDN Northbound Interface

slide-9
SLIDE 9

Introduction Current status Anomaly detection Conclusion

Current status

1: HTTPS support

Goal: Secure communication in the northbound interface Check for supported HTTPS versions Floodlight Onos OpenDaylight Ryu Open Mul Yes Yes Yes1 No Partial2

1Web interface stops working 2SSL3 enabled 7 / 19 Securing the SDN Northbound Interface

slide-10
SLIDE 10

Introduction Current status Anomaly detection Conclusion

Current status

2: Authentication

Goal: Only allow access to authorized users/applications

8 / 19 Securing the SDN Northbound Interface

slide-11
SLIDE 11

Introduction Current status Anomaly detection Conclusion

Current status

2: Authentication

Goal: Only allow access to authorized users/applications Floodlight Onos OpenDaylight Ryu Open Mul Yes Yes Yes No No Floodlight, Onos and OpenDaylight: Client certificates OpenDaylight: HTTP Basic

8 / 19 Securing the SDN Northbound Interface

slide-12
SLIDE 12

Introduction Current status Anomaly detection Conclusion

Current status

3: Authorization

Goal: A user/application can only access the parts of the API he needs.

9 / 19 Securing the SDN Northbound Interface

slide-13
SLIDE 13

Introduction Current status Anomaly detection Conclusion

Current status

3: Authorization

Goal: A user/application can only access the parts of the API he needs. Floodlight Onos OpenDaylight Ryu Open Mul No No No No No Research project for Floodlight with access control.

9 / 19 Securing the SDN Northbound Interface

slide-14
SLIDE 14

Introduction Current status Anomaly detection Conclusion

Current status

4: Logging

Goal: non-repudiation, there is a trail of access to the northbound interface.

10 / 19 Securing the SDN Northbound Interface

slide-15
SLIDE 15

Introduction Current status Anomaly detection Conclusion

Current status

4: Logging

Goal: non-repudiation, there is a trail of access to the northbound interface. Floodlight Onos OpenDaylight Ryu Open Mul Yes Yes Yes No No

10 / 19 Securing the SDN Northbound Interface

slide-16
SLIDE 16

Introduction Current status Anomaly detection Conclusion

Current status

5: Documentation

Goal: Ease of configuration for security features

11 / 19 Securing the SDN Northbound Interface

slide-17
SLIDE 17

Introduction Current status Anomaly detection Conclusion

Current status

5: Documentation

Goal: Ease of configuration for security features Floodlight Onos OpenDaylight Ryu Open Mul Yes No No No No

11 / 19 Securing the SDN Northbound Interface

slide-18
SLIDE 18

Introduction Current status Anomaly detection Conclusion

Current status

Results summary

Floodlight Onos OpenDaylight Ryu Open Mul HTTPS Yes Yes Yes No Partial Authentication Yes Yes Yes No No Authorization No No No No No Logging Yes Yes Yes No No Documentation Yes No No No No

Insecure by default. Almost all security features are turned off initially.

12 / 19 Securing the SDN Northbound Interface

slide-19
SLIDE 19

Introduction Current status Anomaly detection Conclusion

Anomaly detection

Malicious applications

A scenario:

1

Application has access through the northbound interface

2

Application gets hacked

3

Hacker abuses access rights to disrupt the network

4

Security measures mentioned before will not prevent this

13 / 19 Securing the SDN Northbound Interface

slide-20
SLIDE 20

Introduction Current status Anomaly detection Conclusion

Anomaly detection

Malicious applications

A scenario:

1

Application has access through the northbound interface

2

Application gets hacked

3

Hacker abuses access rights to disrupt the network

4

Security measures mentioned before will not prevent this

Possible solution: Anomaly detection Premise: When an application becomes malicious, its behaviour changes.

13 / 19 Securing the SDN Northbound Interface

slide-21
SLIDE 21

Introduction Current status Anomaly detection Conclusion

Anomaly detection

Statistical Anomaly Detection

1

Log all access to northbound interface

2

Divide data into ”historical” (training) data and ”current” (testing) data.

3

Compare weighted chances per API call per application for these data sets.

4

Calculate an anomaly score.

# ¡of ¡API ¡calls ¡ Time ¡-­‑> ¡

14 / 19 Securing the SDN Northbound Interface

slide-22
SLIDE 22

Introduction Current status Anomaly detection Conclusion

Anomaly detection

Statistical Anomaly Detection

1

Log all access to northbound interface

2

Divide data into ”historical” (training) data and ”current” (testing) data.

3

Compare weighted chances per API call per application for these data sets.

4

Calculate an anomaly score.

# ¡of ¡API ¡calls ¡ Time ¡-­‑> ¡

# ¡of ¡API ¡calls ¡ Time ¡-­‑> ¡

14 / 19 Securing the SDN Northbound Interface

slide-23
SLIDE 23

Introduction Current status Anomaly detection Conclusion

Anomaly detection

Floodlight Proof of Concept

Performance impact: 7% (1.1ms extra latency) Needs further research for validation.

15 / 19 Securing the SDN Northbound Interface

slide-24
SLIDE 24

Introduction Current status Anomaly detection Conclusion

Anomaly detection

Limitations

Only works well for predictable applications. Can be ”trained” to accept malicious behaviour. Requires parameter tuning.

16 / 19 Securing the SDN Northbound Interface

slide-25
SLIDE 25

Introduction Current status Anomaly detection Conclusion

Conclusion

Conclusion

SDN northbound interface security is poor at this time. Adding access control and turning on other tested features will help. Insecure by default, lack of security features. Anomaly detection: interesting addition, needs further research.

17 / 19 Securing the SDN Northbound Interface

slide-26
SLIDE 26

Introduction Current status Anomaly detection Conclusion

Conclusion

Future work

Implement authorization on controllers. In-depth analysis of a single controller. Validate detection rate of statistical anomaly detection Explore other means of anomaly detection (machine learning, data mining)

18 / 19 Securing the SDN Northbound Interface

slide-27
SLIDE 27

Introduction Current status Anomaly detection Conclusion

References

  • S. Scott-Hayward, C. Kane, and S. Sezer, “Operationcheckpoint: SDN

application control,” in Network Protocols (ICNP), 2014 IEEE 22nd International Conference on, 10 2014, pp. 618–623.

  • P. Porras, S. Cheung, M. Fong, K. Skinner, and V. Yegneswaran, “Securing the

software-defined network control layer,” in Proceedings of the 2015 Network and Distributed System Security Symposium (NDSS), San Diego, California, 2015.

  • S. Shin, Y. Song, T. Lee, S. Lee, J. Chung, P. Porras, V. Yegneswaran, J. Noh,

and B. B. Kang, “Rosemary: A robust, secure, and high-performance network

  • perating system,” in Proceedings of the 2014 ACM SIGSAC Conference on

Computer and Communications Security, ser. CCS ’14, New York, NY, USA, 2014, pp. 78–89.

19 / 19 Securing the SDN Northbound Interface

slide-28
SLIDE 28

Introduction Current status Anomaly detection Conclusion

Anomaly types

The red line depicts the amount of API calls over time to an API

  • function. Three types of anomalous traffic are shown.

20 / 22 Securing the SDN Northbound Interface

slide-29
SLIDE 29

Introduction Current status Anomaly detection Conclusion

Security assessment (STRIDE)

Spoofing

(Lack of) user authentication Divert NB network traffic. (f.e. ARP spoofing)

Tampering

Capture and alter network traffic (MitM) take over (hack) SDN application

Repudiation

Log API access

21 / 22 Securing the SDN Northbound Interface

slide-30
SLIDE 30

Introduction Current status Anomaly detection Conclusion

Security assessment (STRIDE) cont.

Information disclosure

Listen in on network traffic

Denial of Service

Send many requests to the NBI. Request resource-intensive tasks from controller.

Elevation of Privilege

Access unauthorized parts of the API

22 / 22 Securing the SDN Northbound Interface