Networking Issues and Vulnerabilities Flashcards

1
Q

threat

A

possible danger that might explit a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

application plane

A

apps developed for telemetry, orchestration, and other SDN operations can have security vulnerabilityes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Control plane

A

attacker can generate traffic from spoofed IP address and send huge volume of traffed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data Plane

A

can posion the global view of the network by forging the LLDP packages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

TV1 Fake Traffic flows

A

faulty devices or malicious users can use DoS attack to target the TCAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TV2 Switch Specific Vulnerabiity

A

switch can be used to slow down the traffic in SDN environments. or can insert forged traffic requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TV 3 Control Plane Communication attack

A

control plane doesn’t require TLS/SSL. t6his is can lead to compromised CA which would essentially create a botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TV4 Controller vulnerabilites

A

controller is most important component in the SDN environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TV5 lack of trust between controller and management app

A

Controller and management plane applications lack a builtin mechanism to establish trust. The certi fi cate creation and trust veri fi cation between network devices in the SDN environment can be different from the trust framework between normal applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security mechanisms in SDN

A

1 - replications
2 - diversity
3 - automated recovery
4 - dynamic device association
5 - controller switch trust
6 - controller app plane trust
7 - security domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Diversity

A

diversity improves the robustness of intrusion tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Automated recovery

A

in the case of security attacks, leading to service disruption, the proactive and reactive security recovery mechanism can help in maintaining optimal service availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Dynamic device association

A

if one instance of a controller fails, the switch should be able to dynamically associate with the backup controller. helps with faults, and other feautures like load balancing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SDN data plane attacks

A

1 - side channel attacks
2- DoS
3 - Topology poisoning attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Controller Switch Trust

A

in basic scenarios, the controller can maintain a whitelist of switches that are allowed to send control plane specific messages.

in more complex scenarios can use PKI to establish trust between control and data plane devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

controller-app plane trust

A

should use autonomic trust management mechanisms based on mutual trust and delegated trust

13
Q

security domains

A

help in segmenting the network in differentl level of trust and containment of the threat to only the affected section in the SDN framework

14
Q

side channel attack

A

attacker can observe the processing time of the control plane in order to learn the network config

15
Q

Topology poisoning attack

A

two stage data plane attack. can help an attacker establish a previously non existent link between the switches
1st attack - attacker captures the openflow LLDP packets and filters out the LLDP syntax
2nd attack - sends forged LLDP packets to the controller.

16
Q

Side channel countermeasure

A

rely on response time pattern. propose timeout proxy on the data plane to normalize control plane delay. response time can also be randomized

17
Q

Distributed security and microsegmentation

A

is a method of breaking traditional data center and cloud network into logical elements and managing each element separately

Microsegmentation provides software management architecture - prevents lateral movement

18
Q
A