SlideShare a Scribd company logo
1 of 18
Denial of Service in Software Defined
Networks

Mohammad Faraji
ms.faraji@mail.utoronto.ca
Supervisor: Alberto Leon-Garcia
Cloud Computing

• Cloud computing is a model for
  –   on-demand network access
  –   shared pool of configurable computing resources
  –   rapidly provisioned and
  –   released with minimal management effort.




                                                        2
Extended Cloud Computing (ECC)
Cloud Security Challenges


  –   phishing
  –   Downtime
  –   Password weakness
  –   botnet etc.

  – Botnet ( DoS, Spamming etc.)
  – Shared Resources (side channel, covert channel)
  – Fate-sharing
Denial Of Service


• Denial of Service : explicit attempt by
  attackers to prevent legitimate users of a
  service from using that service. (CERT)
• Examples:
  – Flooding a network
• Denial Of Service is considered as the
  largest security threat
Problem

• Application is distributed throughout the
  network (ECC)
• Isolating application traffic reduce
  probability of denial of service significantly
• Network isolation through VLAN
• Limitation:
  – Scalability (4k VLAN id space)
  – Complicated Network Management
  – Per user policy control
Design Goal


•   Isolation
•   Flexibility
•   Location independence
•   Easy policy control
•   Scalability
•   Cache-Coherent
Proposed Method




             Max = 2 Gb
Architecture Elements



              sw Secure
                 Channel


              hw Flow                                    Policy Unit
                 Table




Virtual Resource 3   Virtual Resource 2   Virtual Resource 1
Methodology


•   Identifying attack set
•   Setting up Implementation Platform
•   Selecting representative topologies
•   Modeling Policy Unit
•   Implementing Network Virtualization
•   Evaluation
Policy Unit model

  • Keystone (Openstack Identity Manager)
  • Attribute Based Access Control




                                                       Policy Enforcement



                                          Authorization and Access Control


                                         Attribute Assertion


                       Authentication Assertion (single sign-on)
Implementation Platform

                                       SOAP/WS-API


                                      Control (BPEL)

                                                   Resource Manager                      Storage Manager
  AAA(BPEL)                                                                                  (BPEL)
                                                       (BPEL)




                                       Dynamic Link Generator
                                              (BPEL)

       Data Store(BPEL)                                                             Resources

                                                                 Resources                        Storage
                                                                  Resources
                                                                   (WS)                             Storage
  Query
                 DB        Result         Fabric                    Programmable
                                                                     (WS)
                                                                                                   (WS)Storage
 Generator
                (WS)
                          Processor       (WS)                        Resources                      (WS)
                                                                                                       Resource
  (WS)                      (WS)                                       (WS,BPEL)                       (WS,BPEL)

                                          Fabric
               MySQ                       Agent
                L                                                     Resource                        Resource
                                          SNMP                         Resource                        Resource
                                                                                                           File
                                                                         Resource                        Servers
                                          Fabric
Outcome


• A software Platform on OpenFlow switches
• It decreases chance of denial of service by:
  – Application is able to define their network
    topology
  – Each application can have its own policy
  – Policy control is fine-grained
• DoS does not affect other’s traffic
• Attack can be easily interrupted
References
1.  Karig, David and Ruby Lee. Remote Denial of Service Attacks and Countermeasures, Princeton
    University Department of Electrical Engineering Technical Report CE-L2001-002, October 2001.
2. M. Jensen, N. Gruschka, and N. Luttenberger, “The impact of flooding attacks on network-based
    services,” in Availability, Reliability and Security, 2008. ARES 08. Third International Conference
    on, march 2008, pp. 509 –513.
3. B. Kerns, “Amazon: Hey spammers, get off my cloud!” Jul. 2008. [Online].
    Availabhttp://voices.washingtonpost.com/securityfix/2008/07/
4. P. Mell and T. Grance, “The nist definition of cloud computing,” National Institute of Standards and
    Technology, vol. 53, no. 6, p. 50, 2009. [Online]. Available: http://csrc.nist.gov/groups/SNS/cloud-
    computing/cloud-def-v15.doc
5. S. Shankland, “Hps hurd dings cloud computing, ibm,” Oct. 2009.
6. D. Catteddu and G. Hogben, “Cloud Computing Risk Assessment,” Nov. 2009. [Online]. Available:
    http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment
7. B. Kerns, “Amazon: Hey spammers, get off my cloud!” Jul. 2008. [Online]. Available:
    http://voices.washingtonpost.com/securityfix/2008/07/
8. M. C. Ferrer, “Zeus in-the-cloud,” CA Community Blog, Dec. 2009.
9. M. Price, “The paradox of security in virtual environments,” Computer, vol. 41, no. 11, pp. 22 –
    28, nov. 2008.
10. S. King and P. Chen, “Subvirt: implementing malware with virtual machines,” in Security and
    Privacy, 2006 IEEE Symposium on, may 2006, pp. 14 pp. –327.
THANKS FOR YOUR TIME
QUESTION ?
APPENDIX
The NIST Cloud Definition Framework
                                      Hybrid Clouds
Deployment
Models            Private             Community
                                                                                     Public Cloud
                  Cloud                 Cloud

Service           Software as a               Platform as a                             Infrastructure as a
Models            Service (SaaS)             Service (PaaS)                               Service (IaaS)

                                        On Demand Self-Service
Essential
                      Broad Network Access                               Rapid Elasticity
Characteristics
                         Resource Pooling                              Measured Service


                            Massive Scale                            Resilient Computing

Common                      Homogeneity                          Geographic Distribution
Characteristics             Virtualization                            Service Orientation
                        Low Cost Software                             Advanced Security
                                                Based upon original chart created by Alex Dowbor - http://ornot.wordpress.com
                                                                                                                                17
Classification of DoS Attacks[1]
    Attack            Affected Area             Example                            Description
Network Level         Routers, IP        Ascend Kill II,            Attack attempts to exhaust hardware
Device                Switches,          “Christmas Tree Packets”   resources using multiple duplicate packets
                      Firewalls                                     or a software bug.

OS Level              Equipment          Ping of Death,             Attack takes advantage of the way operating
                      Vendor OS, End-    ICMP Echo Attacks,         systems implement protocols.
                      User Equipment.    Teardrop
Application           Finger Bomb        Finger Bomb,               Attack a service or machine by using an
Level Attacks                            Windows NT RealServer      application attack to exhaust resources.
                                         G2 6.0
Data Flood            Host computer or   Smurf Attack (amplifier    Attack in which massive quantities of data
(Amplification,       network            attack)                    are sent to a target with the intention of
Oscillation, Simple                                                 using up bandwidth/processing resources.
Flooding)
                                         UDP Echo (oscillation
                                         attack)
Protocol Feature      Servers, Client    SYN (connection            Attack in which “bugs” in protocol are
Attacks               PC, DNS Servers    depletion)                 utilized to take down network resources.
                                                                    Methods of attack include: IP address
                                                                    spoofing, and corrupting DNS server cache.

More Related Content

What's hot

5 dani künzli citrix networking news 1
5 dani künzli citrix networking news 15 dani künzli citrix networking news 1
5 dani künzli citrix networking news 1Digicomp Academy AG
 
Inside the Hadoop Machine @ VMworld
Inside the Hadoop Machine @ VMworldInside the Hadoop Machine @ VMworld
Inside the Hadoop Machine @ VMworldRichard McDougall
 
Virtualization Primer for Java Developers
Virtualization Primer for Java DevelopersVirtualization Primer for Java Developers
Virtualization Primer for Java DevelopersRichard McDougall
 
[.Net Juniors Academy] Introdução ao Cloud Computing e Windows Azure Platform
[.Net Juniors Academy] Introdução ao Cloud Computing e Windows Azure Platform[.Net Juniors Academy] Introdução ao Cloud Computing e Windows Azure Platform
[.Net Juniors Academy] Introdução ao Cloud Computing e Windows Azure PlatformVitor Tomaz
 
12th Japan CloudStack User Group Meetup MidoNet with scalable virtual router
12th Japan CloudStack User Group Meetup   MidoNet with scalable virtual router12th Japan CloudStack User Group Meetup   MidoNet with scalable virtual router
12th Japan CloudStack User Group Meetup MidoNet with scalable virtual routerTakeshi Nakajima
 
Emulex OneConnect Universal CNA (Short Overview)
Emulex OneConnect Universal CNA (Short Overview)Emulex OneConnect Universal CNA (Short Overview)
Emulex OneConnect Universal CNA (Short Overview)Emulex Corporation
 
Arquitectura dos Serviços da plataforma Windows Azure
Arquitectura dos Serviços da plataforma Windows AzureArquitectura dos Serviços da plataforma Windows Azure
Arquitectura dos Serviços da plataforma Windows AzureComunidade NetPonto
 
[NetPonto] Arquitectura dos Serviços da plataforma Windows Azure
[NetPonto] Arquitectura dos Serviços da plataforma Windows Azure[NetPonto] Arquitectura dos Serviços da plataforma Windows Azure
[NetPonto] Arquitectura dos Serviços da plataforma Windows AzureVitor Tomaz
 
Scvmm 2012 (maarten wijsman)
Scvmm 2012 (maarten wijsman)Scvmm 2012 (maarten wijsman)
Scvmm 2012 (maarten wijsman)hypervnu
 
Apachecon Euro 2012: Elastic, Multi-tenant Hadoop on Demand
Apachecon Euro 2012: Elastic, Multi-tenant Hadoop on DemandApachecon Euro 2012: Elastic, Multi-tenant Hadoop on Demand
Apachecon Euro 2012: Elastic, Multi-tenant Hadoop on DemandRichard McDougall
 
2011 04-dsi-javaee-in-the-cloud-andreadis
2011 04-dsi-javaee-in-the-cloud-andreadis2011 04-dsi-javaee-in-the-cloud-andreadis
2011 04-dsi-javaee-in-the-cloud-andreadisdandre
 
1 Introduction at CloudStack Developer Day
1 Introduction at CloudStack Developer Day 1 Introduction at CloudStack Developer Day
1 Introduction at CloudStack Developer Day Kimihiko Kitase
 
Enabling Content Workflows in the Cloud
Enabling Content Workflows in the CloudEnabling Content Workflows in the Cloud
Enabling Content Workflows in the CloudAmazon Web Services
 
Manage rising disk prices with storage virtualization webinar
Manage rising disk prices with storage virtualization webinarManage rising disk prices with storage virtualization webinar
Manage rising disk prices with storage virtualization webinarHitachi Vantara
 
Patterns of Data Distribution
Patterns of Data DistributionPatterns of Data Distribution
Patterns of Data DistributionRick Warren
 
NSS File System Performance, Clustering and Auditing in Novell Open Enterpris...
NSS File System Performance, Clustering and Auditing in Novell Open Enterpris...NSS File System Performance, Clustering and Auditing in Novell Open Enterpris...
NSS File System Performance, Clustering and Auditing in Novell Open Enterpris...Novell
 
VMware PEX Boot Camp - Reaching the Clouds with NetApp Integrations with VMwa...
VMware PEX Boot Camp - Reaching the Clouds with NetApp Integrations with VMwa...VMware PEX Boot Camp - Reaching the Clouds with NetApp Integrations with VMwa...
VMware PEX Boot Camp - Reaching the Clouds with NetApp Integrations with VMwa...NetApp
 

What's hot (20)

5 dani künzli citrix networking news 1
5 dani künzli citrix networking news 15 dani künzli citrix networking news 1
5 dani künzli citrix networking news 1
 
Inside the Hadoop Machine @ VMworld
Inside the Hadoop Machine @ VMworldInside the Hadoop Machine @ VMworld
Inside the Hadoop Machine @ VMworld
 
Virtualization Primer for Java Developers
Virtualization Primer for Java DevelopersVirtualization Primer for Java Developers
Virtualization Primer for Java Developers
 
[.Net Juniors Academy] Introdução ao Cloud Computing e Windows Azure Platform
[.Net Juniors Academy] Introdução ao Cloud Computing e Windows Azure Platform[.Net Juniors Academy] Introdução ao Cloud Computing e Windows Azure Platform
[.Net Juniors Academy] Introdução ao Cloud Computing e Windows Azure Platform
 
12th Japan CloudStack User Group Meetup MidoNet with scalable virtual router
12th Japan CloudStack User Group Meetup   MidoNet with scalable virtual router12th Japan CloudStack User Group Meetup   MidoNet with scalable virtual router
12th Japan CloudStack User Group Meetup MidoNet with scalable virtual router
 
Emulex OneConnect Universal CNA (Short Overview)
Emulex OneConnect Universal CNA (Short Overview)Emulex OneConnect Universal CNA (Short Overview)
Emulex OneConnect Universal CNA (Short Overview)
 
Arquitectura dos Serviços da plataforma Windows Azure
Arquitectura dos Serviços da plataforma Windows AzureArquitectura dos Serviços da plataforma Windows Azure
Arquitectura dos Serviços da plataforma Windows Azure
 
[NetPonto] Arquitectura dos Serviços da plataforma Windows Azure
[NetPonto] Arquitectura dos Serviços da plataforma Windows Azure[NetPonto] Arquitectura dos Serviços da plataforma Windows Azure
[NetPonto] Arquitectura dos Serviços da plataforma Windows Azure
 
Scvmm 2012 (maarten wijsman)
Scvmm 2012 (maarten wijsman)Scvmm 2012 (maarten wijsman)
Scvmm 2012 (maarten wijsman)
 
Management server internals
Management server internalsManagement server internals
Management server internals
 
Apachecon Euro 2012: Elastic, Multi-tenant Hadoop on Demand
Apachecon Euro 2012: Elastic, Multi-tenant Hadoop on DemandApachecon Euro 2012: Elastic, Multi-tenant Hadoop on Demand
Apachecon Euro 2012: Elastic, Multi-tenant Hadoop on Demand
 
2011 04-dsi-javaee-in-the-cloud-andreadis
2011 04-dsi-javaee-in-the-cloud-andreadis2011 04-dsi-javaee-in-the-cloud-andreadis
2011 04-dsi-javaee-in-the-cloud-andreadis
 
1 Introduction at CloudStack Developer Day
1 Introduction at CloudStack Developer Day 1 Introduction at CloudStack Developer Day
1 Introduction at CloudStack Developer Day
 
Hadoop on VMware
Hadoop on VMwareHadoop on VMware
Hadoop on VMware
 
Enabling Content Workflows in the Cloud
Enabling Content Workflows in the CloudEnabling Content Workflows in the Cloud
Enabling Content Workflows in the Cloud
 
Manage rising disk prices with storage virtualization webinar
Manage rising disk prices with storage virtualization webinarManage rising disk prices with storage virtualization webinar
Manage rising disk prices with storage virtualization webinar
 
Patterns of Data Distribution
Patterns of Data DistributionPatterns of Data Distribution
Patterns of Data Distribution
 
Aims2012
Aims2012Aims2012
Aims2012
 
NSS File System Performance, Clustering and Auditing in Novell Open Enterpris...
NSS File System Performance, Clustering and Auditing in Novell Open Enterpris...NSS File System Performance, Clustering and Auditing in Novell Open Enterpris...
NSS File System Performance, Clustering and Auditing in Novell Open Enterpris...
 
VMware PEX Boot Camp - Reaching the Clouds with NetApp Integrations with VMwa...
VMware PEX Boot Camp - Reaching the Clouds with NetApp Integrations with VMwa...VMware PEX Boot Camp - Reaching the Clouds with NetApp Integrations with VMwa...
VMware PEX Boot Camp - Reaching the Clouds with NetApp Integrations with VMwa...
 

Similar to Denial of Service in Software Defined Netoworks

Choosing Your Windows Azure Platform Strategy
Choosing Your Windows Azure Platform StrategyChoosing Your Windows Azure Platform Strategy
Choosing Your Windows Azure Platform Strategydrmarcustillett
 
Windows Azure Üzerinden Alınabilecek Hizmetler
Windows Azure Üzerinden Alınabilecek HizmetlerWindows Azure Üzerinden Alınabilecek Hizmetler
Windows Azure Üzerinden Alınabilecek HizmetlerMSHOWTO Bilisim Toplulugu
 
Windows Azure Platform
Windows Azure PlatformWindows Azure Platform
Windows Azure PlatformAsmTrash
 
Lap around windows azure
Lap around windows azureLap around windows azure
Lap around windows azureManish Corriea
 
Brief about Windows Azure Platform
Brief about Windows Azure Platform Brief about Windows Azure Platform
Brief about Windows Azure Platform K.Mohamed Faizal
 
Patterns of Cloud Applications Using Microsoft Azure Services Platform
Patterns of Cloud Applications Using Microsoft Azure Services PlatformPatterns of Cloud Applications Using Microsoft Azure Services Platform
Patterns of Cloud Applications Using Microsoft Azure Services PlatformDavid Chou
 
MS TechDays 2011 - Cloud Computing with the Windows Azure Platform
MS TechDays 2011 - Cloud Computing with the Windows Azure PlatformMS TechDays 2011 - Cloud Computing with the Windows Azure Platform
MS TechDays 2011 - Cloud Computing with the Windows Azure PlatformSpiffy
 
Virtualization for Development
Virtualization for DevelopmentVirtualization for Development
Virtualization for Developmentelliando dias
 
eBay From Ground Level to the Clouds
eBay From Ground Level to the CloudseBay From Ground Level to the Clouds
eBay From Ground Level to the CloudsX.commerce
 
Windows Azure Platform
Windows Azure PlatformWindows Azure Platform
Windows Azure PlatformSoumow Dollon
 
20120620 moving to windows azure
20120620 moving to windows azure20120620 moving to windows azure
20120620 moving to windows azureLuis Martins
 
Windows Azure platform overview
Windows Azure platform overviewWindows Azure platform overview
Windows Azure platform overviewFrédéric Harper
 
Open Cloud Interop Public
Open Cloud Interop PublicOpen Cloud Interop Public
Open Cloud Interop Publicrvanhoe
 
IT FUTURE 2011 - Fujitsu ror orchestration
IT FUTURE 2011 - Fujitsu ror orchestrationIT FUTURE 2011 - Fujitsu ror orchestration
IT FUTURE 2011 - Fujitsu ror orchestrationFujitsu France
 
6.Live Framework 和Mesh Services
6.Live Framework 和Mesh Services6.Live Framework 和Mesh Services
6.Live Framework 和Mesh ServicesGaryYoung
 
OpenStack at Xen summit Asia
OpenStack at Xen summit Asia OpenStack at Xen summit Asia
OpenStack at Xen summit Asia Jaesuk Ahn
 

Similar to Denial of Service in Software Defined Netoworks (20)

Choosing Your Windows Azure Platform Strategy
Choosing Your Windows Azure Platform StrategyChoosing Your Windows Azure Platform Strategy
Choosing Your Windows Azure Platform Strategy
 
Windows Azure Üzerinden Alınabilecek Hizmetler
Windows Azure Üzerinden Alınabilecek HizmetlerWindows Azure Üzerinden Alınabilecek Hizmetler
Windows Azure Üzerinden Alınabilecek Hizmetler
 
Windows Azure Platform
Windows Azure PlatformWindows Azure Platform
Windows Azure Platform
 
Session10part2 Servers Detailed
Session10part2  Servers DetailedSession10part2  Servers Detailed
Session10part2 Servers Detailed
 
Lap around windows azure
Lap around windows azureLap around windows azure
Lap around windows azure
 
Brief about Windows Azure Platform
Brief about Windows Azure Platform Brief about Windows Azure Platform
Brief about Windows Azure Platform
 
Patterns of Cloud Applications Using Microsoft Azure Services Platform
Patterns of Cloud Applications Using Microsoft Azure Services PlatformPatterns of Cloud Applications Using Microsoft Azure Services Platform
Patterns of Cloud Applications Using Microsoft Azure Services Platform
 
MS TechDays 2011 - Cloud Computing with the Windows Azure Platform
MS TechDays 2011 - Cloud Computing with the Windows Azure PlatformMS TechDays 2011 - Cloud Computing with the Windows Azure Platform
MS TechDays 2011 - Cloud Computing with the Windows Azure Platform
 
Virtualization for Development
Virtualization for DevelopmentVirtualization for Development
Virtualization for Development
 
eBay From Ground Level to the Clouds
eBay From Ground Level to the CloudseBay From Ground Level to the Clouds
eBay From Ground Level to the Clouds
 
Windows Azure Platform
Windows Azure PlatformWindows Azure Platform
Windows Azure Platform
 
Windows Azure Overview
Windows Azure OverviewWindows Azure Overview
Windows Azure Overview
 
20120620 moving to windows azure
20120620 moving to windows azure20120620 moving to windows azure
20120620 moving to windows azure
 
Windows Azure platform overview
Windows Azure platform overviewWindows Azure platform overview
Windows Azure platform overview
 
Open Cloud Interop Public
Open Cloud Interop PublicOpen Cloud Interop Public
Open Cloud Interop Public
 
IT FUTURE 2011 - Fujitsu ror orchestration
IT FUTURE 2011 - Fujitsu ror orchestrationIT FUTURE 2011 - Fujitsu ror orchestration
IT FUTURE 2011 - Fujitsu ror orchestration
 
Cloud computing overview
Cloud computing overviewCloud computing overview
Cloud computing overview
 
6.Live Framework 和Mesh Services
6.Live Framework 和Mesh Services6.Live Framework 和Mesh Services
6.Live Framework 和Mesh Services
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
OpenStack at Xen summit Asia
OpenStack at Xen summit Asia OpenStack at Xen summit Asia
OpenStack at Xen summit Asia
 

Recently uploaded

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Denial of Service in Software Defined Netoworks

  • 1. Denial of Service in Software Defined Networks Mohammad Faraji ms.faraji@mail.utoronto.ca Supervisor: Alberto Leon-Garcia
  • 2. Cloud Computing • Cloud computing is a model for – on-demand network access – shared pool of configurable computing resources – rapidly provisioned and – released with minimal management effort. 2
  • 4. Cloud Security Challenges – phishing – Downtime – Password weakness – botnet etc. – Botnet ( DoS, Spamming etc.) – Shared Resources (side channel, covert channel) – Fate-sharing
  • 5. Denial Of Service • Denial of Service : explicit attempt by attackers to prevent legitimate users of a service from using that service. (CERT) • Examples: – Flooding a network • Denial Of Service is considered as the largest security threat
  • 6. Problem • Application is distributed throughout the network (ECC) • Isolating application traffic reduce probability of denial of service significantly • Network isolation through VLAN • Limitation: – Scalability (4k VLAN id space) – Complicated Network Management – Per user policy control
  • 7. Design Goal • Isolation • Flexibility • Location independence • Easy policy control • Scalability • Cache-Coherent
  • 8. Proposed Method Max = 2 Gb
  • 9. Architecture Elements sw Secure Channel hw Flow Policy Unit Table Virtual Resource 3 Virtual Resource 2 Virtual Resource 1
  • 10. Methodology • Identifying attack set • Setting up Implementation Platform • Selecting representative topologies • Modeling Policy Unit • Implementing Network Virtualization • Evaluation
  • 11. Policy Unit model • Keystone (Openstack Identity Manager) • Attribute Based Access Control Policy Enforcement Authorization and Access Control Attribute Assertion Authentication Assertion (single sign-on)
  • 12. Implementation Platform SOAP/WS-API Control (BPEL) Resource Manager Storage Manager AAA(BPEL) (BPEL) (BPEL) Dynamic Link Generator (BPEL) Data Store(BPEL) Resources Resources Storage Resources (WS) Storage Query DB Result Fabric Programmable (WS) (WS)Storage Generator (WS) Processor (WS) Resources (WS) Resource (WS) (WS) (WS,BPEL) (WS,BPEL) Fabric MySQ Agent L Resource Resource SNMP Resource Resource File Resource Servers Fabric
  • 13. Outcome • A software Platform on OpenFlow switches • It decreases chance of denial of service by: – Application is able to define their network topology – Each application can have its own policy – Policy control is fine-grained • DoS does not affect other’s traffic • Attack can be easily interrupted
  • 14. References 1. Karig, David and Ruby Lee. Remote Denial of Service Attacks and Countermeasures, Princeton University Department of Electrical Engineering Technical Report CE-L2001-002, October 2001. 2. M. Jensen, N. Gruschka, and N. Luttenberger, “The impact of flooding attacks on network-based services,” in Availability, Reliability and Security, 2008. ARES 08. Third International Conference on, march 2008, pp. 509 –513. 3. B. Kerns, “Amazon: Hey spammers, get off my cloud!” Jul. 2008. [Online]. Availabhttp://voices.washingtonpost.com/securityfix/2008/07/ 4. P. Mell and T. Grance, “The nist definition of cloud computing,” National Institute of Standards and Technology, vol. 53, no. 6, p. 50, 2009. [Online]. Available: http://csrc.nist.gov/groups/SNS/cloud- computing/cloud-def-v15.doc 5. S. Shankland, “Hps hurd dings cloud computing, ibm,” Oct. 2009. 6. D. Catteddu and G. Hogben, “Cloud Computing Risk Assessment,” Nov. 2009. [Online]. Available: http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment 7. B. Kerns, “Amazon: Hey spammers, get off my cloud!” Jul. 2008. [Online]. Available: http://voices.washingtonpost.com/securityfix/2008/07/ 8. M. C. Ferrer, “Zeus in-the-cloud,” CA Community Blog, Dec. 2009. 9. M. Price, “The paradox of security in virtual environments,” Computer, vol. 41, no. 11, pp. 22 – 28, nov. 2008. 10. S. King and P. Chen, “Subvirt: implementing malware with virtual machines,” in Security and Privacy, 2006 IEEE Symposium on, may 2006, pp. 14 pp. –327.
  • 15. THANKS FOR YOUR TIME QUESTION ?
  • 17. The NIST Cloud Definition Framework Hybrid Clouds Deployment Models Private Community Public Cloud Cloud Cloud Service Software as a Platform as a Infrastructure as a Models Service (SaaS) Service (PaaS) Service (IaaS) On Demand Self-Service Essential Broad Network Access Rapid Elasticity Characteristics Resource Pooling Measured Service Massive Scale Resilient Computing Common Homogeneity Geographic Distribution Characteristics Virtualization Service Orientation Low Cost Software Advanced Security Based upon original chart created by Alex Dowbor - http://ornot.wordpress.com 17
  • 18. Classification of DoS Attacks[1] Attack Affected Area Example Description Network Level Routers, IP Ascend Kill II, Attack attempts to exhaust hardware Device Switches, “Christmas Tree Packets” resources using multiple duplicate packets Firewalls or a software bug. OS Level Equipment Ping of Death, Attack takes advantage of the way operating Vendor OS, End- ICMP Echo Attacks, systems implement protocols. User Equipment. Teardrop Application Finger Bomb Finger Bomb, Attack a service or machine by using an Level Attacks Windows NT RealServer application attack to exhaust resources. G2 6.0 Data Flood Host computer or Smurf Attack (amplifier Attack in which massive quantities of data (Amplification, network attack) are sent to a target with the intention of Oscillation, Simple using up bandwidth/processing resources. Flooding) UDP Echo (oscillation attack) Protocol Feature Servers, Client SYN (connection Attack in which “bugs” in protocol are Attacks PC, DNS Servers depletion) utilized to take down network resources. Methods of attack include: IP address spoofing, and corrupting DNS server cache.

Editor's Notes

  1. In extended cloud computing, resources limitedly provisioned in the a set of clusters near user that are called smart edge. You can find any type of resources in smart edge ranging from computation to FPGA boards. If an application needs more resources, remote datacenters are used where similar resources but in large amount are provided. The set of APIs that are offered in smart edge may be different from the remote resources.
  2. Some security challenges has been established before the advent of cloud computing. Like phishing where a trusted entity is masqueraded. Downtime that a system is out of service. Password weakness due to uneducated user (like using only digit or letter for password). Botnet where a lot of computer throughout the world are compromised and are used to lauch a specific type of attack. However what is important here is that botnet is more serious in cloud computing due huge amount of resources that cloud provider provisions for the user.
  3. This cloud model promotes availability and is composed of five essential characteristics, three service models, and three deployment models.