1. Attacking distributed software-defined networks by leveraging network state consistency
- Author
-
Sean McSweeney, Dylan Smyth, Donna O'Shea, and Victor Cionca
- Subjects
Computer Networks and Communications ,Event (computing) ,Computer science ,Distributed computing ,Testbed ,020206 networking & telecommunications ,Denial-of-service attack ,02 engineering and technology ,Variation (game tree) ,Cluster (spacecraft) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,State (computer science) ,Routing control plane ,Host (network) - Abstract
Distributed Software-Defined Networks (SDNs) aim to maintain a consistent network state across members of the distributed control plane. This paper introduces a novel variation to the packet-in flood designed to target distributed SDNs that synchronise the network state in a strongly consistent manner. The Event Flooding Attack (EFA) takes advantage of the characteristics of a strong consistency model to enable an attacker to distribute the adverse effect of a DoS attack across a cluster, as well as engineer inconsistency between the true network state and the control plane’s view of this state. The impact of the attack is evaluated through experiments using an OpenDaylight cluster. It has been demonstrated on the testbed used in this work that an attacker can increase CPU consumption on all cluster nodes and cause inconsistency for a period of ≈ 55 s when 500 events are flooded at a frequency of 1/ms, while the same can be achieved for a period of ≈ 770 s when 2000 events are flooded at the same frequency. The impact of the attack is further demonstrated through it’s collaboration with, and simplification of, an existing host impersonation attack.
- Published
- 2019