Skip to main content

Flow Reconnaissance via Timing Attacks on SDN Switches

Publication ,  Conference
Liu, S; Reiter, MK; Sekar, V
Published in: Proceedings International Conference on Distributed Computing Systems
July 13, 2017

When encountering a packet for which it has no matching forwarding rule, a software-defined networking (SDN) switch requests an appropriate rule from its controller; this request delays the routing of the flow until the controller responds. We show that this delay gives rise to a timing side channel in which an attacker can test for the recent occurrence of a target flow by judiciously probing the switch with forged flows and using the delays they encounter to discern whether covering rules were previously installed in the switch. We develop a Markov model of an SDN switch to permit the attacker to select the best probe (or probes) to infer whether a target flow has recently occurred. Our model captures practical challenges related to rule evictions to make room for other rules; rule timeouts due to inactivity; the presence of multiple rules that apply to overlapping sets of flows; and rule priorities. We show that our model enables detection of target flows with considerable accuracy in many cases.

Duke Scholars

Published In

Proceedings International Conference on Distributed Computing Systems

DOI

Publication Date

July 13, 2017

Start / End Page

196 / 206
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Liu, S., Reiter, M. K., & Sekar, V. (2017). Flow Reconnaissance via Timing Attacks on SDN Switches. In Proceedings International Conference on Distributed Computing Systems (pp. 196–206). https://doi.org/10.1109/ICDCS.2017.281
Liu, S., M. K. Reiter, and V. Sekar. “Flow Reconnaissance via Timing Attacks on SDN Switches.” In Proceedings International Conference on Distributed Computing Systems, 196–206, 2017. https://doi.org/10.1109/ICDCS.2017.281.
Liu S, Reiter MK, Sekar V. Flow Reconnaissance via Timing Attacks on SDN Switches. In: Proceedings International Conference on Distributed Computing Systems. 2017. p. 196–206.
Liu, S., et al. “Flow Reconnaissance via Timing Attacks on SDN Switches.” Proceedings International Conference on Distributed Computing Systems, 2017, pp. 196–206. Scopus, doi:10.1109/ICDCS.2017.281.
Liu S, Reiter MK, Sekar V. Flow Reconnaissance via Timing Attacks on SDN Switches. Proceedings International Conference on Distributed Computing Systems. 2017. p. 196–206.

Published In

Proceedings International Conference on Distributed Computing Systems

DOI

Publication Date

July 13, 2017

Start / End Page

196 / 206