Skip to main content

Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts

  • Conference paper
  • First Online:
Security and Privacy in Communication Networks (SecureComm 2019)

Abstract

Software-Defined Networking (SDN) enables diversified network functionalities with plentiful applications deployed on a logically-centralized controller. In order to work properly, applications are naturally provided with much information on SDN. However, this paper shows that malicious applications can exploit basic SDN mechanisms to build covert channels to stealthily leak out valuable information to end hosts, which can bypass network security policies and break physical network isolation. We design two types of covert channels with basic SDN mechanisms. The first type is a high-rate covert channel that exploits SDN proxy mechanisms to transmit covert messages to colluding hosts inside SDN. The second type is a low-rate covert channel that exploits SDN rule expiry mechanisms to transmit covert messages from SDN applications to any host on the Internet. We develop the prototypes of both covert channels in a real SDN testbed consisting of commercial hardware switches and an open source controller. Evaluations show that the covert channels successfully leak out a TLS private key from the controller to a host inside SDN at a rate of 200 bps with 0% bit error rate, or to a remote host on the Internet at a rate of 0.5 bps with less than 3% bit error rate. In addition, we discuss possible countermeasures to mitigate the covert channel attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The padding aims to bloat the ARP frame to the 64-byte length which is the minimum required length of an Ethernet frame.

  2. 2.

    As there are so many flows in the traffic trace, the hosts randomly choose some flows to ensure that the number of flow rules generated by the flows does not exceed the flow table capacity of switches.

References

  1. Access Control in ONOS Controller. https://wiki.onosproject.org/display/ONOS/Access+Control+Based+on+DHCP

  2. Firewall Application in Floodlight Controller. https://floodlight.atlassian.net/wiki/spaces/floodlightcontroller/pages/1343616/Firewall

  3. Floodlight DHCP Proxy Service. https://github.com/floodlight/floodlight/tree/master/src/main/java/net/floodlightcontroller/dhcpserver

  4. Floodlight ProxyARP. https://github.com/mbredel/floodlight-proxyarp

  5. Manchester Code. https://en.wikipedia.org/wiki/Manchester_code

  6. Microsoft Azure and Software Defined Networking. https://docs.microsoft.com/en-us/windows-server/networking/sdn/azure_and_sdn/

  7. ONOS Neighbour Resolution Service for ARP and NDP Proxy. https://wiki.onosproject.org/display/ONOS/Neighbour+Resolution+Service

  8. ONOS ProxyARP. https://github.com/opennetworkinglab/onos/blob/master/apps/proxyarp/src/main/java/org/onosproject/proxyarp/DefaultProxyArp.java

  9. OpenDayLight ARP Proxy Service. https://github.com/opendaylight/honeycomb-vbd/blob/master/api/src/main/yang/proxy-arp

  10. OpenDayLight Neutron DHCP Proxy Service. https://docs.opendaylight.org/en/stable-nitrogen/submodules/netvirt/docs/specs/neutron-port-for-dhcp-service.html

  11. OpenFlow Specification v1.5.1. https://www.opennetworking.org/wp-content/uploads/2014/10/openflow-switch-v1.5.1.pdf

  12. OpenvSwitch: Products and Vulnerabilities. https://www.cvedetails.com/vendor/12098/Openvswitch.html

  13. Routing Application on Floodlight. https://github.com/floodlight/floodlight/tree/master/src/main/java/net/floodlightcontroller/routing/

  14. Abdelltif, A.A., et al.: SDN-based load balancing service for cloud servers. IEEE Commun. Mag. 56(8), 106–111 (2018)

    Article  Google Scholar 

  15. Achleitner, S., et al.: Adversarial network forensics in software defined networking. In: ACM SOSR, pp. 8–20 (2017)

    Google Scholar 

  16. Braun, W., Menth, M.: Software-defined networking using openflow: protocols, applications and architectural design choices. Futur. Internet 6(2), 302–336 (2014)

    Article  Google Scholar 

  17. CAIDA Passive Monitor: Chicago B: http://www.caida.org/data/passive/trace_stats/chicago-B/2015/?monitor=20150219-130000.UTC

  18. Cao, J., Xu, M., Li, Q., Sun, K., Yang, Y., Zheng, J.: Disrupting SDN via the data plane: a low-rate flow table overflow attack. In: Lin, X., Ghorbani, A., Ren, K., Zhu, S., Zhang, A. (eds.) SecureComm 2017. LNICST, vol. 238, pp. 356–376. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-78813-5_18

    Chapter  Google Scholar 

  19. Chiang, S.-H., et al.: Online multicast traffic engineering for software-defined networks. In: IEEE INFOCOM, pp. 414–422 (2018)

    Google Scholar 

  20. Cui, H., et al.: On the fingerprinting of software-defined networks. IEEE TIFS 11(10), 2160–2173 (2016)

    Google Scholar 

  21. Dhawan, M., et al.: Sphinx: detecting security attacks in software-defined networks. In: NDSS, vol. 15, pp. 8–11 (2015)

    Google Scholar 

  22. Gras, B., et al.: Translation leak-aside buffer: defeating cache side-channel protections with TLB attacks. In: USENIX Security, pp. 955–972 (2018)

    Google Scholar 

  23. Hizver, J.: Taxonomic modeling of security threats in software defined networking. In: BlackHat Conference, pp. 1–16 (2015)

    Google Scholar 

  24. Hocquenghem, A.: Codes correcteurs d’erreurs. Chiffres 2(2), 147–156 (1959)

    MathSciNet  MATH  Google Scholar 

  25. Jafarian, J.H., et al.: OpenFlow random host mutation: transparent moving target defense using software defined networking. In: ACM HotSDN, pp. 127–132 (2012)

    Google Scholar 

  26. Kang, M.S., et al.: The crossfire attack. In: IEEE Symposium on Security and Privacy, pp. 127–141 (2013)

    Google Scholar 

  27. Katta, N., et al.: Infinite cacheflow in software-defined networks. In: ACM HotSDN, pp. 175–180 (2014)

    Google Scholar 

  28. Klöti, R., et al.: OpenFlow: a security analysis. In: IEEE ICNP, pp. 1–6 (2013)

    Google Scholar 

  29. Kreutz, D., et al.: Software-defined networking: a comprehensive survey. Proc. IEEE 103(1), 14–76 (2015)

    Article  Google Scholar 

  30. Krösche, R., et al.: I DPID it my way! A covert timing channel in software-defined networks. In: IFIP Networking (2018)

    Google Scholar 

  31. Lam, P., et al.: The soot framework for java program analysis: a retrospective. In: CETUS 2011, vol. 15, p. 35 (2011)

    Google Scholar 

  32. Lee, S., et al.: The smaller, the shrewder: a simple malicious application can kill an entire SDN environment. In: ACM SDN-NFV Security, pp. 23–28 (2016)

    Google Scholar 

  33. Li, H., et al.: vNIDS: towards elastic security with safe and efficient virtualization of network intrusion detection systems. In: ACM CCS, pp. 17–34 (2018)

    Google Scholar 

  34. Lin, Y.-D., et al.: OFBench: performance test suite on OpenFlow switches. IEEE Syst. J. 12(3), 2949–2959 (2018)

    Article  Google Scholar 

  35. Lipp, M., et al.: Meltdown: reading kernel memory from user space. In: USENIX Security, pp. 973–990 (2018)

    Google Scholar 

  36. Liu, S., et al.: Flow reconnaissance via timing attacks on SDN switches. In: IEEE ICDCS, pp. 196–206 (2017)

    Google Scholar 

  37. Maurice, C., et al.: Hello from the other side: SSH over robust cache covert channels in the cloud. In: NDSS (2017)

    Google Scholar 

  38. Moon, S.-J., et al.: Nomad: mitigating arbitrary cloud side channels via provider-assisted migration. In: ACM CCS, pp. 1595–1606 (2015)

    Google Scholar 

  39. Narten, T.: Neighbor Discovery for IP version 6. RFC 2461 (1998)

    Google Scholar 

  40. Ou, X., et al.: A scalable approach to attack graph generation. In: ACM CCS, pp. 336–345 (2006)

    Google Scholar 

  41. Porras, P.A., et al.: Securing the software defined network control layer. In: NDSS (2015)

    Google Scholar 

  42. Rossow, C.: Amplification hell: revisiting network protocols for DDOS abuse. In: NDSS (2014)

    Google Scholar 

  43. Shin, S., Gu, G.: Attacking software-defined networks: a first feasibility study. In: ACM HotSDN, pp. 165–166 (2013)

    Google Scholar 

  44. Shin, S., et al.: Rosemary: a robust, secure, and high-performance network operating system. In: ACM CCS, pp. 78–89 (2014)

    Google Scholar 

  45. Sonchack, J., et al.: Timing-based reconnaissance and defense in software-defined networks. In: IEEE ACSAC, pp. 89–100 (2016)

    Google Scholar 

  46. Thimmaraju, K., et al.: Outsmarting network security with SDN teleportation. In: IEEE EuroS&P, pp. 563–578 (2017)

    Google Scholar 

  47. Ujcich, B.E., et al.: Cross-app poisoning in software-defined networking. In: ACM CCS (2018)

    Google Scholar 

  48. Wang, H., et al.: Towards fine-grained network security forensics and diagnosis in the SDN era. In: ACM CCS, pp. 3–16 (2018)

    Google Scholar 

  49. Wen, X., et al.: SDNshield: reconciliating configurable application permissions for SDN app markets. In: IEEE/IFIP DSN, pp. 121–132 (2016)

    Google Scholar 

  50. Xu, L., et al.: Attacking the brain: races in the SDN control plane. In: USENIX Security, pp. 451–468 (2017)

    Google Scholar 

  51. Yoon, C., Lee, S.: Attacking SDN infrastructure: are we ready for the next-gen networking? In: BlackHat-USA (2016)

    Google Scholar 

  52. Yoon, C., et al.: A security-mode for carrier-grade SDN controllers. In: ACM ACSAC. pp. 461–473 (2017)

    Google Scholar 

  53. Zheng, J., et al.: Realtime DDoS defense using COTS SDN switches via adaptive correlation analysis. IEEE TIFS 13(7), 1838–1853 (2018)

    Google Scholar 

Download references

Acknowledgment

The research is partially supported by the National Natural Science Foundation of China (NSFC) under Grant 61832013, 61625203, 61572278 and U1736209, the National Key R&D Program of China under Grant 2017YFB0803202, and the NSF grants IIP-1266147 and CNS-1822094.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mingwei Xu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cao, J. et al. (2019). Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts. In: Chen, S., Choo, KK., Fu, X., Lou, W., Mohaisen, A. (eds) Security and Privacy in Communication Networks. SecureComm 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 304. Springer, Cham. https://doi.org/10.1007/978-3-030-37228-6_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37228-6_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37227-9

  • Online ISBN: 978-3-030-37228-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics