SlideShare a Scribd company logo
1 of 49
Download to read offline
Security in SDN
An Introduction
Wen-Pai Lu, Ph.D.
Luxoft
July 14, 2015
(ISC)2 Silicon Valley
Agenda
• Status of Networks – How they evolve?
• Why SDN?
• What is SDN?
• SDN Threat Analysis
• Deep Dive at each Layer …
• How SDN can Help to Enhance Security
• Conclusion
STATUS OF NETWORKS TODAY –
HOW THEY EVOLVE
Network Today
• Networks used to be simple: switches, routers,
LAN, protocols, switching, routing, etc.
• Add more switches, routers and networks
increases the complexity because of multiple
regions, domains, routing exchanges, loop
avoidance, etc.
• Changes in routers/switches, links, etc. takes time
to converge
• Add new elements requires careful configurations
• Networks are static and cannot adapt to today
business demands
More Complex in the Networks
• New and more controls required in the networks -> increase
complexity
– Traffic Engineering
– QoS
– VLANs
– ACLs
– MPLS, BGP, etc.
– Appliances
• Firewall
• NATs
• DPI
• Load Balancer
• middlebox
• Etc.
• The protocols are added to solve specific problems and they
deployed independently
Network Communication Protocols Today
Key to Internet Success: Layers
Applications
…built on…
…built on…
…built on…
…built on…
Reliable (or unreliable) transport
Best-effort global packet delivery
Best-effort local packet delivery
Physical transfer of bits
Source: Scott Shenker: The Future of Networking, and the Past of Protocols
WHY SDN?
What are the Problems
• Today’s network architecture cannot meet the demand of users,
enterprises and carriers
• Complexity in the Network
– Protocols are defined in isolation
– Networks are relatively static
– VM migration challenges many aspects of traditionally networking
– Network cannot dynamically adapt to changing traffic applications and user
demands
• Inconsistent Policies
– Difficult to apply a consistent set of access, security, QoS and other policies
• Inability to Scale
– Scaling challenges based on unpredictable traffic pattern
– Multi-tenancy and customized performance control/on-demand delivery
• Vendor Dependence
– Vendor product cycle
– Lack of standards and open interfaces
What are in today’s networks and
Vendor Equipment?
• Many Complex Functions
embedded in the networks
• Routing (OSPF, BGP, etc.)
• MPLS
• Metro Ethernet
• Layers 2 and 3
• Multicast
• Differentiated Services
• Traffic Engineering
• QoS
• Security (NAT, Packet Filtering,
IPSec, etc.)
Million of
lines
of source
code
Billions of
gates
Specialized Packet
Forwarding Hardware
Operating
System
Feature Feature
Routing, Switching, Device Management,
Access Control, Packet Filtering, VPN,
Mobility Management, etc.
Adapting to dynamic changes in the network is very challenging
WHAT IS SDN?
SDN
• “Software Defined Networking”
• Original works were done at UC Berkeley and Stanford
Universities (2006)
• Software – Abstracted and virtualized IT infrastructure
resources managed by “Software” via API invocations
• Defined – Applications automatically “defined”
infrastructure requirements, configuration and service
level expectation
• Networking – Infrastructure is fully programmable to
rapidly deploy workloads on optimal resources and to
instantly respond to changing business demands
• Networks becomes abstract resources
SDN Principles
• Separate Control Plane and Data Plane Entities
• Execute or run Control Plane software on general
purpose hardware
• Centralized network states and intelligence
• Have programmable Data Plane
– Maintain, control and program Data Plane state from a
central entity
• Data Plane also run on the commodity hardware
(White Box server or Switches)
• An architecture to control not just a networking device
but an entire network.
SDN Architecture
The control and data
planes are
decoupled, network
intelligence and state
centralized, and the
underlying network
infrastructure is
abstracted from the
applications
SDN Orchestration
Tools
SDN Controller
OpenFlow
Switches
What is OpenFlow
• Myth: SDN is OpenFlow and vice versa
• OpenFlow is a standard communications interface
defined between the control and forwarding layers of
an SDN architecture
• Allows direct access to and manipulation of the
forwarding plane of network devices, both physical and
virtual
• Overlay network protocols without disrupting
underlying fabrics
• Attractive in many environments
– Dynamic infrastructure as a service
– Made networking behave like software
Basic OpenFlow Architecture
Controller
OpenFlow Switch
Flow
Table
Secure
Channel
Compute
Device
OpenFlow Switch specification
SDN (OpenFlow) Controller
 Manages one or more switch via OpenFlow channels.
 Uses OpenFlow protocol to communicate with a OpenFlow
aware switch.
 Acts similar to control plane of traditional switch.
 Provides a network wide abstraction for the applications on
north bound.
 Responsible for programming various tables in the OpenFlow
Switch.
 Single switch can be managed by more than one controller for
load balancing or redundancy purpose. In this case the
controller can take any one of the following roles.
 Master.
 Slave.
 Equal.
17
OpenFlow Channel
 Used to exchange OpenFlow message between switch and
controller.
 Switch can establish single or multiple connections to same or
different controllers (auxiliary connections).
 A controller configures and manages the switch, receives
events from the switch, and send packets out the switch via
this interface
 The OpenFlow channel is a TLS/TCP connection. Switch and
controller mutually authenticate by exchanging certificates
signed by a site-specific private key
18
OpenFlow Network Element (Switch)
 Run on Commodity Hardware
 Consists of one or more flow tables, group table and meter
table.
 A single switch can be managed by one or more controllers.
 The flow tables and group table are used during the lookup or
forwarding phase in order to forward the packet to appropriate
port.
 Meter table is used to perform simple QOS operations like
rate-limiting to complex QOS operations like DiffServ etc
19
7/15/2015 Security in SDN 20
Pipeline Processing
21
* Figure From OpenFlow Switch Specification
Control Program A Control Program B
Network OS
OpenFlow Forwarding Abstraction
Packet
Forwarding
Packet
Forwarding
Packet
Forwarding
Flow
Table(s)
“If header = p, send to port 4”
“If header = ?, send to me”
“If header = q, overwrite header with r,
add header s, and send to ports 5,6”
7/15/2015 Security in SDN 22
SDN Benefits
• Centralized Control of Multi-vendor environment
• Reduced complexity through automation
• Efficiency with applications, services and infrastructure
optimizations
• Higher Rate of Innovation
– Create and deliver new types of applications and services and
business model
• Scale with rapidly growing of existing applications and
services
• Increase Network reliability and Security
• More Granular Network Control
• Better User experiences
SDN THREATS ANALYSIS
Security Concerns
• Technology is new and immature
• SDN was not designed with Security in mind
• Required proprietary customization for each
implementation
• Virtual Sprawl” – automated creation of virtual
networks, each has its own security needs
• Network segment is created without security
team knowledge
• Software vulnerabilities
Categorization of the Security Issues…
Source: Scott-Hayward, S., O’Callaghan, G. and Sezer, S. “SDN Security: A Survey” IEEE SDN4FNS, November 2013
Source: Scott Hogg, “SDN Security Attack Vectors and SDN Hardenings”
http://www.networkworld.com/article/2840273/sdn/sdn-security-attack-vectors-and-sdn-hardening.html
Data Plane
Control & Management
7
SDN
device
SDN
device
SDN
device
Admin
Sta on
6
5
4
3
SDN
Controller
SDN control protocol
(e.g., OpenFlow )
Management connec on
(e.g., SSH )
2
Data plane
physical / logical
connec ons
SDN
device
1
Source: Diego Kreutz, Fernando Rammos and Paulo Berissimo, “Towards Secure and Dependable Software-Defined Networks”
Data Plane
Control & Management
7
SDN
device
SDN
device
SDN
device
Admin
Sta on
6
5
4
3
SDN
Controller
SDN control protocol
(e.g., OpenFlow )
Management connec on
(e.g., SSH )
2
Data plane
physical / logical
connec ons
SDN
device
1
Threat vector 1
forged or faked traffic
flows
Not specific to SDNs, but can be a door for augmented DoS attacks.
Possible solutions: IDS + rate bounds for control plane requests
Data Plane
Control & Management
7
SDN
device
SDN
device
SDN
device
Admin
Sta on
6
5
4
3
SDN
Controller
SDN control protocol
(e.g., OpenFlow )
Management connec on
(e.g., SSH )
2
Data plane
physical / logical
connec ons
SDN
device
1
Threat vector 2
attacks on vulnerabilities
in switches
Not specific to SDNs, but now the impact is potentially augmented.
Possible solutions: sw/hw attestation with autonomic trust management
Data Plane
Control & Management
7
SDN
device
SDN
device
SDN
device
Admin
Sta on
6
5
4
3
SDN
Controller
SDN control protocol
(e.g., OpenFlow )
Management connec on
(e.g., SSH )
2
Data plane
physical / logical
connec ons
SDN
device
1
Threat vector 3
attacks on control plane
communication
Specific to SDNs: communication with logically centralized controllers can be
exploited.
Possible solutions: threshold cryptography across controller replicas
Data Plane
Control & Management
7
SDN
device
SDN
device
SDN
device
Admin
Sta on
6
5
4
3
SDN
Controller
SDN control protocol
(e.g., OpenFlow )
Management connec on
(e.g., SSH )
2
Data plane
physical / logical
connec ons
SDN
device
1
Threat vector 4
attacks on and
vulnerabilities in
controllers
Specific to SDNs, controlling the controller may compromise the entire network.
Possible solutions: replication + diversity + recovery
Data Plane
Control & Management
7
SDN
device
SDN
device
SDN
device
Admin
Sta on
6
5
4
3
SDN
Controller
SDN control protocol
(e.g., OpenFlow )
Management connec on
(e.g., SSH )
2
Data plane
physical / logical
connec ons
SDN
device
1
Threat vector 5
lack of mechanisms to
ensure trust between
the controller and
management apps
Specific to SDNs, malicious applications can now be easily developed and deployed
on controllers.
Possible solutions: sw attestation with autonomic trust management
Data Plane
Control & Management
7
SDN
device
SDN
device
SDN
device
Admin
Sta on
6
5
4
3
SDN
Controller
SDN control protocol
(e.g., OpenFlow )
Management connec on
(e.g., SSH )
2
Data plane
physical / logical
connec ons
SDN
device
1
Threat vector 6
attacks on and
vulnerabilities in
admin stations
Not specific to SDNs, but now the impact is potentially augmented.
Possible solutions: double credential verification
Data Plane
Control & Management
7
SDN
device
SDN
device
SDN
device
Admin
Sta on
6
5
4
3
SDN
Controller
SDN control protocol
(e.g., OpenFlow )
Management connec on
(e.g., SSH )
2
Data plane
physical / logical
connec ons
SDN
device
1
Threat vector 7
lack of trusted
resources for forensics
and remediation
Not specific to SDNs, but it is still critical to assure fast recovery and diagnosis
when faults happen.
Possible solutions: indelible logging
LET’S LOOK AT EACH LAYER ABOUT
THE SECURITY
OF Network Devices – Data Plane
• Software Code Vulnerabilities
– Unstable code
– Bad Code
• Malicious code attacks
• DDoS attacks
• Target network devices from within the network
itself
• Rouge OF network devices
• Inject undesired network information to the
controller
Communication Channels
• OpenFlow channel defined SSL/TLS, but not
mandatory
• Authentication between the controller and
the OF devices
• DDoS Attacks – keep the link saturated
Control Plane
• Needs protection of the control plane and
manage authorization of access and network
applications
• Need to authenticate application access to
control plane
• Network should service business applications
needs, and business logics dictate how
security is applied
Controller
• Secure the Controller
• Compromising this controller gives the attackers
command of the entire network
• DDoS attacks to the controller
• Bogus Controller can change the network
topology
• Strong authentication mechanism for SDN
Controller access
• Controller Integrity
Northbound API to Applications
• Not define as standard yet, thus
incompatibilities may cause security holes
• Every controller has its own set of APIs
• Authentication to the applications
• Programmable northbound interfaces require
their own security policy framework,
governance, management, … these opens up a
log of very difficult to answer questions
• Communication path is not secure
Applications Layer – SDN layer
• No authentication mechanism for Applications
• Need to protect authenticated application from
attacks
• Applications can change how network functions
• May lack of secure coding practices
• Integrity of applications
• If policy is not synchronized, network operations
and functions could be disrupted
• Applications may not have any idea of security
policies
HOW SDN CAN HELP TO IMPROVE
SECURITY
Security Benefits
• SDN can help provide greater security without
increasing management headache for complex virtual
networks in data center.
• SDN can boost security by routing traffic, as
appropriate, through a central next-generation firewall
and intrusion prevention system
• SDN can also dynamically reprogramming and
restructuring a network that is suffering a distributed
denial-of-service attacks
• SDN can also provide capabilities such as automatically
quarantining an endpoint or network that has been
infected with malware
Example
SUMMARY
Summary
• The Technology is still new and evolving
• A lot of promises with many powerful
capabilities, but…
• Security was not Considered in the Original
Design
• Security Issues remains real in SDN (prevent
organizations to deploy SDN)
• SDN can be an Improvement of Security of
Networks
SDN Security Talk - (ISC)2_3
SDN Security Talk - (ISC)2_3

More Related Content

What's hot

SDN - a new security paradigm?
SDN - a new security paradigm?SDN - a new security paradigm?
SDN - a new security paradigm?Sophos Benelux
 
Attacking SDN infrastructure: Are we ready for the next gen networking
Attacking SDN infrastructure: Are we ready for the next gen networkingAttacking SDN infrastructure: Are we ready for the next gen networking
Attacking SDN infrastructure: Are we ready for the next gen networkingPriyanka Aash
 
44CON & Ruxcon: SDN security
44CON & Ruxcon: SDN security44CON & Ruxcon: SDN security
44CON & Ruxcon: SDN securityDavid Jorm
 
Software defined networking players
Software defined networking playersSoftware defined networking players
Software defined networking playersAmeer Sameer
 
SDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_NetworksSDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_NetworksSrinivasa Addepalli
 
Software Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology BriefSoftware Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology BriefZivaro Inc
 
From IT to IoT: Bridging the Growing Cybersecurity Divide
From IT to IoT: Bridging the Growing Cybersecurity DivideFrom IT to IoT: Bridging the Growing Cybersecurity Divide
From IT to IoT: Bridging the Growing Cybersecurity DividePriyanka Aash
 
BsidesSP: Pentesting in SDN - Owning the Controllers
BsidesSP: Pentesting in SDN - Owning the ControllersBsidesSP: Pentesting in SDN - Owning the Controllers
BsidesSP: Pentesting in SDN - Owning the ControllersRoberto Soares
 
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...Siyabonga Masuku
 
IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networ...
IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networ...IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networ...
IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networ...Open Networking Perú (Opennetsoft)
 
The New Landscape of Airborne Cyberattacks
The New Landscape of Airborne CyberattacksThe New Landscape of Airborne Cyberattacks
The New Landscape of Airborne CyberattacksPriyanka Aash
 
ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)Digital Bond
 
Solving the Visibility Gap for Effective Security
Solving the Visibility Gap for Effective SecuritySolving the Visibility Gap for Effective Security
Solving the Visibility Gap for Effective SecurityLancope, Inc.
 
DEVNET-1114 Automated Management Using SDN/NFV
DEVNET-1114	Automated Management Using SDN/NFVDEVNET-1114	Automated Management Using SDN/NFV
DEVNET-1114 Automated Management Using SDN/NFVCisco DevNet
 
What's New in StealthWatch v6.5
What's New in StealthWatch v6.5 What's New in StealthWatch v6.5
What's New in StealthWatch v6.5 Lancope, Inc.
 

What's hot (20)

SDN - a new security paradigm?
SDN - a new security paradigm?SDN - a new security paradigm?
SDN - a new security paradigm?
 
SDN-Security
SDN-SecuritySDN-Security
SDN-Security
 
SDN-ppt-new
SDN-ppt-newSDN-ppt-new
SDN-ppt-new
 
Attacking SDN infrastructure: Are we ready for the next gen networking
Attacking SDN infrastructure: Are we ready for the next gen networkingAttacking SDN infrastructure: Are we ready for the next gen networking
Attacking SDN infrastructure: Are we ready for the next gen networking
 
Software defined network
Software defined networkSoftware defined network
Software defined network
 
44CON & Ruxcon: SDN security
44CON & Ruxcon: SDN security44CON & Ruxcon: SDN security
44CON & Ruxcon: SDN security
 
Software defined networking players
Software defined networking playersSoftware defined networking players
Software defined networking players
 
SDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_NetworksSDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_Networks
 
Software Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology BriefSoftware Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology Brief
 
From IT to IoT: Bridging the Growing Cybersecurity Divide
From IT to IoT: Bridging the Growing Cybersecurity DivideFrom IT to IoT: Bridging the Growing Cybersecurity Divide
From IT to IoT: Bridging the Growing Cybersecurity Divide
 
BsidesSP: Pentesting in SDN - Owning the Controllers
BsidesSP: Pentesting in SDN - Owning the ControllersBsidesSP: Pentesting in SDN - Owning the Controllers
BsidesSP: Pentesting in SDN - Owning the Controllers
 
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
 
IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networ...
IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networ...IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networ...
IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networ...
 
The New Landscape of Airborne Cyberattacks
The New Landscape of Airborne CyberattacksThe New Landscape of Airborne Cyberattacks
The New Landscape of Airborne Cyberattacks
 
ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)
 
ioT_SDN
ioT_SDN ioT_SDN
ioT_SDN
 
Solving the Visibility Gap for Effective Security
Solving the Visibility Gap for Effective SecuritySolving the Visibility Gap for Effective Security
Solving the Visibility Gap for Effective Security
 
DEVNET-1114 Automated Management Using SDN/NFV
DEVNET-1114	Automated Management Using SDN/NFVDEVNET-1114	Automated Management Using SDN/NFV
DEVNET-1114 Automated Management Using SDN/NFV
 
Sdn ppt
Sdn pptSdn ppt
Sdn ppt
 
What's New in StealthWatch v6.5
What's New in StealthWatch v6.5 What's New in StealthWatch v6.5
What's New in StealthWatch v6.5
 

Similar to SDN Security Talk - (ISC)2_3

Software Defined Networks
Software Defined NetworksSoftware Defined Networks
Software Defined NetworksShreeya Shah
 
Software_Defined_Networking.pptx
Software_Defined_Networking.pptxSoftware_Defined_Networking.pptx
Software_Defined_Networking.pptxAsfawGedamu
 
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SAMeh Zaghloul
 
Introduction to Software Defined Networking (SDN) presentation by Warren Finc...
Introduction to Software Defined Networking (SDN) presentation by Warren Finc...Introduction to Software Defined Networking (SDN) presentation by Warren Finc...
Introduction to Software Defined Networking (SDN) presentation by Warren Finc...APNIC
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0Shah Sheikh
 
Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...
Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...
Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...University of Technology - Iraq
 
Software Defined Networking(SDN) and practical implementation_trupti
Software Defined Networking(SDN) and practical implementation_truptiSoftware Defined Networking(SDN) and practical implementation_trupti
Software Defined Networking(SDN) and practical implementation_truptitrups7778
 
Software Defined networking (SDN)
Software Defined networking (SDN)Software Defined networking (SDN)
Software Defined networking (SDN)Milson Munakami
 
SDN Architecture & Ecosystem
SDN Architecture & EcosystemSDN Architecture & Ecosystem
SDN Architecture & EcosystemKingston Smiler
 
Software-Defined Networking Layers presentation
Software-Defined Networking Layers presentationSoftware-Defined Networking Layers presentation
Software-Defined Networking Layers presentationAbdullah Salama
 
Software defined networking
Software defined networkingSoftware defined networking
Software defined networkingGoogle
 
sdnppt-140325015756-phpapp01.pptx
sdnppt-140325015756-phpapp01.pptxsdnppt-140325015756-phpapp01.pptx
sdnppt-140325015756-phpapp01.pptxAamirMaqsood8
 
btNOG 9 presentation Introduction to Software Defined Networking
btNOG 9 presentation Introduction to Software Defined NetworkingbtNOG 9 presentation Introduction to Software Defined Networking
btNOG 9 presentation Introduction to Software Defined NetworkingAPNIC
 
Software Define Networking (SDN)
Software Define Networking (SDN)Software Define Networking (SDN)
Software Define Networking (SDN)Pradeep Kumar TS
 
Software Defined Networking - 2
Software Defined Networking - 2Software Defined Networking - 2
Software Defined Networking - 2Pradeep Kumar TS
 
IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...
IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...
IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...Christian Esteve Rothenberg
 
Distributed Clouds and Software Defined Networking
Distributed Clouds and Software Defined NetworkingDistributed Clouds and Software Defined Networking
Distributed Clouds and Software Defined NetworkingUS-Ignite
 

Similar to SDN Security Talk - (ISC)2_3 (20)

Software Defined Networks
Software Defined NetworksSoftware Defined Networks
Software Defined Networks
 
Software_Defined_Networking.pptx
Software_Defined_Networking.pptxSoftware_Defined_Networking.pptx
Software_Defined_Networking.pptx
 
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
 
Introduction to Software Defined Networking (SDN) presentation by Warren Finc...
Introduction to Software Defined Networking (SDN) presentation by Warren Finc...Introduction to Software Defined Networking (SDN) presentation by Warren Finc...
Introduction to Software Defined Networking (SDN) presentation by Warren Finc...
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0
 
Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...
Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...
Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...
 
Software Defined Networking(SDN) and practical implementation_trupti
Software Defined Networking(SDN) and practical implementation_truptiSoftware Defined Networking(SDN) and practical implementation_trupti
Software Defined Networking(SDN) and practical implementation_trupti
 
Software Defined networking (SDN)
Software Defined networking (SDN)Software Defined networking (SDN)
Software Defined networking (SDN)
 
SDN Architecture & Ecosystem
SDN Architecture & EcosystemSDN Architecture & Ecosystem
SDN Architecture & Ecosystem
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
Introductionto SDN
Introductionto SDN Introductionto SDN
Introductionto SDN
 
Software-Defined Networking Layers presentation
Software-Defined Networking Layers presentationSoftware-Defined Networking Layers presentation
Software-Defined Networking Layers presentation
 
Software defined networking
Software defined networkingSoftware defined networking
Software defined networking
 
sdnppt-140325015756-phpapp01.pptx
sdnppt-140325015756-phpapp01.pptxsdnppt-140325015756-phpapp01.pptx
sdnppt-140325015756-phpapp01.pptx
 
btNOG 9 presentation Introduction to Software Defined Networking
btNOG 9 presentation Introduction to Software Defined NetworkingbtNOG 9 presentation Introduction to Software Defined Networking
btNOG 9 presentation Introduction to Software Defined Networking
 
Software Define Networking (SDN)
Software Define Networking (SDN)Software Define Networking (SDN)
Software Define Networking (SDN)
 
Software Defined Networking - 2
Software Defined Networking - 2Software Defined Networking - 2
Software Defined Networking - 2
 
IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...
IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...
IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...
 
Distributed Clouds and Software Defined Networking
Distributed Clouds and Software Defined NetworkingDistributed Clouds and Software Defined Networking
Distributed Clouds and Software Defined Networking
 

SDN Security Talk - (ISC)2_3

  • 1. Security in SDN An Introduction Wen-Pai Lu, Ph.D. Luxoft July 14, 2015 (ISC)2 Silicon Valley
  • 2. Agenda • Status of Networks – How they evolve? • Why SDN? • What is SDN? • SDN Threat Analysis • Deep Dive at each Layer … • How SDN can Help to Enhance Security • Conclusion
  • 3. STATUS OF NETWORKS TODAY – HOW THEY EVOLVE
  • 4. Network Today • Networks used to be simple: switches, routers, LAN, protocols, switching, routing, etc. • Add more switches, routers and networks increases the complexity because of multiple regions, domains, routing exchanges, loop avoidance, etc. • Changes in routers/switches, links, etc. takes time to converge • Add new elements requires careful configurations • Networks are static and cannot adapt to today business demands
  • 5. More Complex in the Networks • New and more controls required in the networks -> increase complexity – Traffic Engineering – QoS – VLANs – ACLs – MPLS, BGP, etc. – Appliances • Firewall • NATs • DPI • Load Balancer • middlebox • Etc. • The protocols are added to solve specific problems and they deployed independently
  • 7. Key to Internet Success: Layers Applications …built on… …built on… …built on… …built on… Reliable (or unreliable) transport Best-effort global packet delivery Best-effort local packet delivery Physical transfer of bits Source: Scott Shenker: The Future of Networking, and the Past of Protocols
  • 9. What are the Problems • Today’s network architecture cannot meet the demand of users, enterprises and carriers • Complexity in the Network – Protocols are defined in isolation – Networks are relatively static – VM migration challenges many aspects of traditionally networking – Network cannot dynamically adapt to changing traffic applications and user demands • Inconsistent Policies – Difficult to apply a consistent set of access, security, QoS and other policies • Inability to Scale – Scaling challenges based on unpredictable traffic pattern – Multi-tenancy and customized performance control/on-demand delivery • Vendor Dependence – Vendor product cycle – Lack of standards and open interfaces
  • 10. What are in today’s networks and Vendor Equipment? • Many Complex Functions embedded in the networks • Routing (OSPF, BGP, etc.) • MPLS • Metro Ethernet • Layers 2 and 3 • Multicast • Differentiated Services • Traffic Engineering • QoS • Security (NAT, Packet Filtering, IPSec, etc.) Million of lines of source code Billions of gates Specialized Packet Forwarding Hardware Operating System Feature Feature Routing, Switching, Device Management, Access Control, Packet Filtering, VPN, Mobility Management, etc. Adapting to dynamic changes in the network is very challenging
  • 12. SDN • “Software Defined Networking” • Original works were done at UC Berkeley and Stanford Universities (2006) • Software – Abstracted and virtualized IT infrastructure resources managed by “Software” via API invocations • Defined – Applications automatically “defined” infrastructure requirements, configuration and service level expectation • Networking – Infrastructure is fully programmable to rapidly deploy workloads on optimal resources and to instantly respond to changing business demands • Networks becomes abstract resources
  • 13. SDN Principles • Separate Control Plane and Data Plane Entities • Execute or run Control Plane software on general purpose hardware • Centralized network states and intelligence • Have programmable Data Plane – Maintain, control and program Data Plane state from a central entity • Data Plane also run on the commodity hardware (White Box server or Switches) • An architecture to control not just a networking device but an entire network.
  • 14. SDN Architecture The control and data planes are decoupled, network intelligence and state centralized, and the underlying network infrastructure is abstracted from the applications SDN Orchestration Tools SDN Controller OpenFlow Switches
  • 15. What is OpenFlow • Myth: SDN is OpenFlow and vice versa • OpenFlow is a standard communications interface defined between the control and forwarding layers of an SDN architecture • Allows direct access to and manipulation of the forwarding plane of network devices, both physical and virtual • Overlay network protocols without disrupting underlying fabrics • Attractive in many environments – Dynamic infrastructure as a service – Made networking behave like software
  • 16. Basic OpenFlow Architecture Controller OpenFlow Switch Flow Table Secure Channel Compute Device OpenFlow Switch specification
  • 17. SDN (OpenFlow) Controller  Manages one or more switch via OpenFlow channels.  Uses OpenFlow protocol to communicate with a OpenFlow aware switch.  Acts similar to control plane of traditional switch.  Provides a network wide abstraction for the applications on north bound.  Responsible for programming various tables in the OpenFlow Switch.  Single switch can be managed by more than one controller for load balancing or redundancy purpose. In this case the controller can take any one of the following roles.  Master.  Slave.  Equal. 17
  • 18. OpenFlow Channel  Used to exchange OpenFlow message between switch and controller.  Switch can establish single or multiple connections to same or different controllers (auxiliary connections).  A controller configures and manages the switch, receives events from the switch, and send packets out the switch via this interface  The OpenFlow channel is a TLS/TCP connection. Switch and controller mutually authenticate by exchanging certificates signed by a site-specific private key 18
  • 19. OpenFlow Network Element (Switch)  Run on Commodity Hardware  Consists of one or more flow tables, group table and meter table.  A single switch can be managed by one or more controllers.  The flow tables and group table are used during the lookup or forwarding phase in order to forward the packet to appropriate port.  Meter table is used to perform simple QOS operations like rate-limiting to complex QOS operations like DiffServ etc 19
  • 21. Pipeline Processing 21 * Figure From OpenFlow Switch Specification
  • 22. Control Program A Control Program B Network OS OpenFlow Forwarding Abstraction Packet Forwarding Packet Forwarding Packet Forwarding Flow Table(s) “If header = p, send to port 4” “If header = ?, send to me” “If header = q, overwrite header with r, add header s, and send to ports 5,6” 7/15/2015 Security in SDN 22
  • 23. SDN Benefits • Centralized Control of Multi-vendor environment • Reduced complexity through automation • Efficiency with applications, services and infrastructure optimizations • Higher Rate of Innovation – Create and deliver new types of applications and services and business model • Scale with rapidly growing of existing applications and services • Increase Network reliability and Security • More Granular Network Control • Better User experiences
  • 25. Security Concerns • Technology is new and immature • SDN was not designed with Security in mind • Required proprietary customization for each implementation • Virtual Sprawl” – automated creation of virtual networks, each has its own security needs • Network segment is created without security team knowledge • Software vulnerabilities
  • 26. Categorization of the Security Issues… Source: Scott-Hayward, S., O’Callaghan, G. and Sezer, S. “SDN Security: A Survey” IEEE SDN4FNS, November 2013
  • 27. Source: Scott Hogg, “SDN Security Attack Vectors and SDN Hardenings” http://www.networkworld.com/article/2840273/sdn/sdn-security-attack-vectors-and-sdn-hardening.html
  • 28. Data Plane Control & Management 7 SDN device SDN device SDN device Admin Sta on 6 5 4 3 SDN Controller SDN control protocol (e.g., OpenFlow ) Management connec on (e.g., SSH ) 2 Data plane physical / logical connec ons SDN device 1 Source: Diego Kreutz, Fernando Rammos and Paulo Berissimo, “Towards Secure and Dependable Software-Defined Networks”
  • 29. Data Plane Control & Management 7 SDN device SDN device SDN device Admin Sta on 6 5 4 3 SDN Controller SDN control protocol (e.g., OpenFlow ) Management connec on (e.g., SSH ) 2 Data plane physical / logical connec ons SDN device 1 Threat vector 1 forged or faked traffic flows Not specific to SDNs, but can be a door for augmented DoS attacks. Possible solutions: IDS + rate bounds for control plane requests
  • 30. Data Plane Control & Management 7 SDN device SDN device SDN device Admin Sta on 6 5 4 3 SDN Controller SDN control protocol (e.g., OpenFlow ) Management connec on (e.g., SSH ) 2 Data plane physical / logical connec ons SDN device 1 Threat vector 2 attacks on vulnerabilities in switches Not specific to SDNs, but now the impact is potentially augmented. Possible solutions: sw/hw attestation with autonomic trust management
  • 31. Data Plane Control & Management 7 SDN device SDN device SDN device Admin Sta on 6 5 4 3 SDN Controller SDN control protocol (e.g., OpenFlow ) Management connec on (e.g., SSH ) 2 Data plane physical / logical connec ons SDN device 1 Threat vector 3 attacks on control plane communication Specific to SDNs: communication with logically centralized controllers can be exploited. Possible solutions: threshold cryptography across controller replicas
  • 32. Data Plane Control & Management 7 SDN device SDN device SDN device Admin Sta on 6 5 4 3 SDN Controller SDN control protocol (e.g., OpenFlow ) Management connec on (e.g., SSH ) 2 Data plane physical / logical connec ons SDN device 1 Threat vector 4 attacks on and vulnerabilities in controllers Specific to SDNs, controlling the controller may compromise the entire network. Possible solutions: replication + diversity + recovery
  • 33. Data Plane Control & Management 7 SDN device SDN device SDN device Admin Sta on 6 5 4 3 SDN Controller SDN control protocol (e.g., OpenFlow ) Management connec on (e.g., SSH ) 2 Data plane physical / logical connec ons SDN device 1 Threat vector 5 lack of mechanisms to ensure trust between the controller and management apps Specific to SDNs, malicious applications can now be easily developed and deployed on controllers. Possible solutions: sw attestation with autonomic trust management
  • 34. Data Plane Control & Management 7 SDN device SDN device SDN device Admin Sta on 6 5 4 3 SDN Controller SDN control protocol (e.g., OpenFlow ) Management connec on (e.g., SSH ) 2 Data plane physical / logical connec ons SDN device 1 Threat vector 6 attacks on and vulnerabilities in admin stations Not specific to SDNs, but now the impact is potentially augmented. Possible solutions: double credential verification
  • 35. Data Plane Control & Management 7 SDN device SDN device SDN device Admin Sta on 6 5 4 3 SDN Controller SDN control protocol (e.g., OpenFlow ) Management connec on (e.g., SSH ) 2 Data plane physical / logical connec ons SDN device 1 Threat vector 7 lack of trusted resources for forensics and remediation Not specific to SDNs, but it is still critical to assure fast recovery and diagnosis when faults happen. Possible solutions: indelible logging
  • 36. LET’S LOOK AT EACH LAYER ABOUT THE SECURITY
  • 37. OF Network Devices – Data Plane • Software Code Vulnerabilities – Unstable code – Bad Code • Malicious code attacks • DDoS attacks • Target network devices from within the network itself • Rouge OF network devices • Inject undesired network information to the controller
  • 38. Communication Channels • OpenFlow channel defined SSL/TLS, but not mandatory • Authentication between the controller and the OF devices • DDoS Attacks – keep the link saturated
  • 39. Control Plane • Needs protection of the control plane and manage authorization of access and network applications • Need to authenticate application access to control plane • Network should service business applications needs, and business logics dictate how security is applied
  • 40. Controller • Secure the Controller • Compromising this controller gives the attackers command of the entire network • DDoS attacks to the controller • Bogus Controller can change the network topology • Strong authentication mechanism for SDN Controller access • Controller Integrity
  • 41. Northbound API to Applications • Not define as standard yet, thus incompatibilities may cause security holes • Every controller has its own set of APIs • Authentication to the applications • Programmable northbound interfaces require their own security policy framework, governance, management, … these opens up a log of very difficult to answer questions • Communication path is not secure
  • 42. Applications Layer – SDN layer • No authentication mechanism for Applications • Need to protect authenticated application from attacks • Applications can change how network functions • May lack of secure coding practices • Integrity of applications • If policy is not synchronized, network operations and functions could be disrupted • Applications may not have any idea of security policies
  • 43. HOW SDN CAN HELP TO IMPROVE SECURITY
  • 44. Security Benefits • SDN can help provide greater security without increasing management headache for complex virtual networks in data center. • SDN can boost security by routing traffic, as appropriate, through a central next-generation firewall and intrusion prevention system • SDN can also dynamically reprogramming and restructuring a network that is suffering a distributed denial-of-service attacks • SDN can also provide capabilities such as automatically quarantining an endpoint or network that has been infected with malware
  • 47. Summary • The Technology is still new and evolving • A lot of promises with many powerful capabilities, but… • Security was not Considered in the Original Design • Security Issues remains real in SDN (prevent organizations to deploy SDN) • SDN can be an Improvement of Security of Networks