security assessment on a vxlan based network
play

Security assessment on a VXLAN-based network Guido Pineda Reyes - PowerPoint PPT Presentation

Introduction VXLAN prototype Security assessment Q&A Security assessment on a VXLAN-based network Guido Pineda Reyes MSc. Systems and Networking Engineering University of Amsterdam February 5, 2014 Guido Pineda Reyes Security


  1. Introduction VXLAN prototype Security assessment Q&A Security assessment on a VXLAN-based network Guido Pineda Reyes MSc. Systems and Networking Engineering University of Amsterdam February 5, 2014 Guido Pineda Reyes Security assessment on a VXLAN-based network

  2. Introduction VXLAN prototype Security assessment Q&A Outline 1 Introduction Virtual eXtensible LAN Research question Approach 2 VXLAN prototype 3 Security assessment MAC Flood Attack Double-Encapsulated 802.1Q/Nested VLAN Attack ARP Attack UDP Flood Attack Future research Conclusions 4 Q&A Guido Pineda Reyes Security assessment on a VXLAN-based network

  3. Introduction Virtual eXtensible LAN VXLAN prototype Research question Security assessment Approach Q&A Outline 1 Introduction Virtual eXtensible LAN Research question Approach 2 VXLAN prototype 3 Security assessment MAC Flood Attack Double-Encapsulated 802.1Q/Nested VLAN Attack ARP Attack UDP Flood Attack Future research Conclusions 4 Q&A Guido Pineda Reyes Security assessment on a VXLAN-based network

  4. Introduction Virtual eXtensible LAN VXLAN prototype Research question Security assessment Approach Q&A Virtual eXtensible LAN Introduction Still an Internet Draft, current revision: 7th Allows to extend logical networks Encapsulates layer MAC-based Layer 2 frames within a UDP packet Up to 16 million logical networks Security measurements have not been performed yet Guido Pineda Reyes Security assessment on a VXLAN-based network

  5. Introduction Virtual eXtensible LAN VXLAN prototype Research question Security assessment Approach Q&A Virtual eXtensible LAN Typical use case Guido Pineda Reyes Security assessment on a VXLAN-based network

  6. Introduction Virtual eXtensible LAN VXLAN prototype Research question Security assessment Approach Q&A Outline 1 Introduction Virtual eXtensible LAN Research question Approach 2 VXLAN prototype 3 Security assessment MAC Flood Attack Double-Encapsulated 802.1Q/Nested VLAN Attack ARP Attack UDP Flood Attack Future research Conclusions 4 Q&A Guido Pineda Reyes Security assessment on a VXLAN-based network

  7. Introduction Virtual eXtensible LAN VXLAN prototype Research question Security assessment Approach Q&A Research questions Main question: How feasible are the known VLAN attacks in a VXLAN environment? Subquestions: Which attacks were successful? What is the difference between these attacks in a VLAN and a VXLAN environment? Is there anyway to prevent them or mitigate them? Guido Pineda Reyes Security assessment on a VXLAN-based network

  8. Introduction Virtual eXtensible LAN VXLAN prototype Research question Security assessment Approach Q&A Outline 1 Introduction Virtual eXtensible LAN Research question Approach 2 VXLAN prototype 3 Security assessment MAC Flood Attack Double-Encapsulated 802.1Q/Nested VLAN Attack ARP Attack UDP Flood Attack Future research Conclusions 4 Q&A Guido Pineda Reyes Security assessment on a VXLAN-based network

  9. Introduction Virtual eXtensible LAN VXLAN prototype Research question Security assessment Approach Q&A Approach Build the VXLAN prototype. Deploy the security assessment on the prototype. Focus on successful attacks. Understand how this attacks work to give a solution on how to mitigate or prevent them. Guido Pineda Reyes Security assessment on a VXLAN-based network

  10. Introduction VXLAN prototype Security assessment Q&A VXLAN prototype Design Guido Pineda Reyes Security assessment on a VXLAN-based network

  11. Introduction VXLAN prototype Security assessment Q&A VXLAN prototype Options VMware vSphere products VMware vSphere + Cisco Nexus 1000v VXLAN Linux implementation (needs kernel modification) Guido Pineda Reyes Security assessment on a VXLAN-based network

  12. Introduction VXLAN prototype Security assessment Q&A VXLAN prototype Connectivity tests: UDP encapsulated traffic Guido Pineda Reyes Security assessment on a VXLAN-based network

  13. Introduction VXLAN prototype Security assessment Q&A VXLAN prototype Connectivity tests: VXLAN encapsulation Guido Pineda Reyes Security assessment on a VXLAN-based network

  14. MAC Flood Attack Introduction Double-Encapsulated 802.1Q/Nested VLAN Attack VXLAN prototype ARP Attack Security assessment UDP Flood Attack Q&A Future research Conclusions Security Assessment MAC Flood Attack Double-Encapsulated 802.1Q/Nested VLAN Attack ARP Attack UDP Flood Attack Evaluation Guido Pineda Reyes Security assessment on a VXLAN-based network

  15. MAC Flood Attack Introduction Double-Encapsulated 802.1Q/Nested VLAN Attack VXLAN prototype ARP Attack Security assessment UDP Flood Attack Q&A Future research Conclusions Outline 1 Introduction Virtual eXtensible LAN Research question Approach 2 VXLAN prototype 3 Security assessment MAC Flood Attack Double-Encapsulated 802.1Q/Nested VLAN Attack ARP Attack UDP Flood Attack Future research Conclusions 4 Q&A Guido Pineda Reyes Security assessment on a VXLAN-based network

  16. MAC Flood Attack Introduction Double-Encapsulated 802.1Q/Nested VLAN Attack VXLAN prototype ARP Attack Security assessment UDP Flood Attack Q&A Future research Conclusions MAC Flood Attack Scenarios Guido Pineda Reyes Security assessment on a VXLAN-based network

  17. MAC Flood Attack Introduction Double-Encapsulated 802.1Q/Nested VLAN Attack VXLAN prototype ARP Attack Security assessment UDP Flood Attack Q&A Future research Conclusions MAC Flood Attack Tool: macof Results: Attacker on physical net: Successful Attacker on logical net: Failed Mitigation/Prevention: Restrict the number of MAC addresses to one port Specify static MAC address association IDS Guido Pineda Reyes Security assessment on a VXLAN-based network

  18. MAC Flood Attack Introduction Double-Encapsulated 802.1Q/Nested VLAN Attack VXLAN prototype ARP Attack Security assessment UDP Flood Attack Q&A Future research Conclusions Outline 1 Introduction Virtual eXtensible LAN Research question Approach 2 VXLAN prototype 3 Security assessment MAC Flood Attack Double-Encapsulated 802.1Q/Nested VLAN Attack ARP Attack UDP Flood Attack Future research Conclusions 4 Q&A Guido Pineda Reyes Security assessment on a VXLAN-based network

  19. MAC Flood Attack Introduction Double-Encapsulated 802.1Q/Nested VLAN Attack VXLAN prototype ARP Attack Security assessment UDP Flood Attack Q&A Future research Conclusions Double-Encapsulated 802.1Q/Nested VLAN Attack Scenario Guido Pineda Reyes Security assessment on a VXLAN-based network

  20. MAC Flood Attack Introduction Double-Encapsulated 802.1Q/Nested VLAN Attack VXLAN prototype ARP Attack Security assessment UDP Flood Attack Q&A Future research Conclusions Double-Encapsulated 802.1Q/Nested VLAN Attack Concept Guido Pineda Reyes Security assessment on a VXLAN-based network

  21. MAC Flood Attack Introduction Double-Encapsulated 802.1Q/Nested VLAN Attack VXLAN prototype ARP Attack Security assessment UDP Flood Attack Q&A Future research Conclusions Double-Encapsulated 802.1Q/Nested VLAN Attack Tool: scapy Results: Attacker on logical net: Failed Guido Pineda Reyes Security assessment on a VXLAN-based network

  22. MAC Flood Attack Introduction Double-Encapsulated 802.1Q/Nested VLAN Attack VXLAN prototype ARP Attack Security assessment UDP Flood Attack Q&A Future research Conclusions Outline 1 Introduction Virtual eXtensible LAN Research question Approach 2 VXLAN prototype 3 Security assessment MAC Flood Attack Double-Encapsulated 802.1Q/Nested VLAN Attack ARP Attack UDP Flood Attack Future research Conclusions 4 Q&A Guido Pineda Reyes Security assessment on a VXLAN-based network

  23. MAC Flood Attack Introduction Double-Encapsulated 802.1Q/Nested VLAN Attack VXLAN prototype ARP Attack Security assessment UDP Flood Attack Q&A Future research Conclusions ARP Attack Scenarios Guido Pineda Reyes Security assessment on a VXLAN-based network

  24. MAC Flood Attack Introduction Double-Encapsulated 802.1Q/Nested VLAN Attack VXLAN prototype ARP Attack Security assessment UDP Flood Attack Q&A Future research Conclusions ARP Attack Summary Tool: arpspoof Configuring private communication between the Results: hosts at the service provider Attacker on physical net: level. Successful Attacker on logical net: Successful Mitigation/Prevention: Blocking direct communication between the attacker and the victim. Guido Pineda Reyes Security assessment on a VXLAN-based network

  25. MAC Flood Attack Introduction Double-Encapsulated 802.1Q/Nested VLAN Attack VXLAN prototype ARP Attack Security assessment UDP Flood Attack Q&A Future research Conclusions ARP Attack Scenarios Guido Pineda Reyes Security assessment on a VXLAN-based network

  26. MAC Flood Attack Introduction Double-Encapsulated 802.1Q/Nested VLAN Attack VXLAN prototype ARP Attack Security assessment UDP Flood Attack Q&A Future research Conclusions Outline 1 Introduction Virtual eXtensible LAN Research question Approach 2 VXLAN prototype 3 Security assessment MAC Flood Attack Double-Encapsulated 802.1Q/Nested VLAN Attack ARP Attack UDP Flood Attack Future research Conclusions 4 Q&A Guido Pineda Reyes Security assessment on a VXLAN-based network

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend