Networking Issues and Vulnerabilities Flashcards
threat
possible danger that might explit a vulnerability
application plane
apps developed for telemetry, orchestration, and other SDN operations can have security vulnerabilityes
Control plane
attacker can generate traffic from spoofed IP address and send huge volume of traffed
Data Plane
can posion the global view of the network by forging the LLDP packages
TV1 Fake Traffic flows
faulty devices or malicious users can use DoS attack to target the TCAM
TV2 Switch Specific Vulnerabiity
switch can be used to slow down the traffic in SDN environments. or can insert forged traffic requests
TV 3 Control Plane Communication attack
control plane doesn’t require TLS/SSL. t6his is can lead to compromised CA which would essentially create a botnet
TV4 Controller vulnerabilites
controller is most important component in the SDN environment
TV5 lack of trust between controller and management app
Controller and management plane applications lack a builtin mechanism to establish trust. The certi fi cate creation and trust veri fi cation between network devices in the SDN environment can be different from the trust framework between normal applications.
Security mechanisms in SDN
1 - replications
2 - diversity
3 - automated recovery
4 - dynamic device association
5 - controller switch trust
6 - controller app plane trust
7 - security domains
Diversity
diversity improves the robustness of intrusion tolerance
Automated recovery
in the case of security attacks, leading to service disruption, the proactive and reactive security recovery mechanism can help in maintaining optimal service availability
Dynamic device association
if one instance of a controller fails, the switch should be able to dynamically associate with the backup controller. helps with faults, and other feautures like load balancing
SDN data plane attacks
1 - side channel attacks
2- DoS
3 - Topology poisoning attacks
Controller Switch Trust
in basic scenarios, the controller can maintain a whitelist of switches that are allowed to send control plane specific messages.
in more complex scenarios can use PKI to establish trust between control and data plane devices