Skip to main content

Flow Reconnaissance via Timing Attacks on SDN Switches

Publication ,  Conference
Liu, S; Reiter, MK; Sekar, V
Published in: Proceedings - International Conference on Distributed Computing Systems
July 13, 2017

When encountering a packet for which it has no matching forwarding rule, a software-defined networking (SDN) switch requests an appropriate rule from its controller; this request delays the routing of the flow until the controller responds. We show that this delay gives rise to a timing side channel in which an attacker can test for the recent occurrence of a target flow by judiciously probing the switch with forged flows and using the delays they encounter to discern whether covering rules were previously installed in the switch. We develop a Markov model of an SDN switch to permit the attacker to select the best probe (or probes) to infer whether a target flow has recently occurred. Our model captures practical challenges related to rule evictions to make room for other rules; rule timeouts due to inactivity; the presence of multiple rules that apply to overlapping sets of flows; and rule priorities. We show that our model enables detection of target flows with considerable accuracy in many cases.

Duke Scholars

Published In

Proceedings - International Conference on Distributed Computing Systems

DOI

Publication Date

July 13, 2017

Start / End Page

196 / 206
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Liu, S., Reiter, M. K., & Sekar, V. (2017). Flow Reconnaissance via Timing Attacks on SDN Switches. In Proceedings - International Conference on Distributed Computing Systems (pp. 196–206). https://doi.org/10.1109/ICDCS.2017.281
Liu, S., M. K. Reiter, and V. Sekar. “Flow Reconnaissance via Timing Attacks on SDN Switches.” In Proceedings - International Conference on Distributed Computing Systems, 196–206, 2017. https://doi.org/10.1109/ICDCS.2017.281.
Liu S, Reiter MK, Sekar V. Flow Reconnaissance via Timing Attacks on SDN Switches. In: Proceedings - International Conference on Distributed Computing Systems. 2017. p. 196–206.
Liu, S., et al. “Flow Reconnaissance via Timing Attacks on SDN Switches.” Proceedings - International Conference on Distributed Computing Systems, 2017, pp. 196–206. Scopus, doi:10.1109/ICDCS.2017.281.
Liu S, Reiter MK, Sekar V. Flow Reconnaissance via Timing Attacks on SDN Switches. Proceedings - International Conference on Distributed Computing Systems. 2017. p. 196–206.

Published In

Proceedings - International Conference on Distributed Computing Systems

DOI

Publication Date

July 13, 2017

Start / End Page

196 / 206