TY - GEN
T1 - Unveiling SDN Controller Identity through Timing Side Channel
AU - Kyung, Sukwha
AU - Baek, Jaejong
AU - Ahn, Gail Joon
N1 - Publisher Copyright:
© 2024 IEEE.
PY - 2024
Y1 - 2024
N2 - Software-defined networking (SDN) has revolutionized the landscape of network management by decoupling control and data planes and becoming the backbone of many IT infrastructures including data centers, cloud computing, and enterprise networks. At the same time, however, the control plane has become a prime target for adversaries due to its critical role in network operations and centralized control functions. In this paper, we demonstrate how to discover the identity of different SDN controllers, which could be leveraged for more sophisticated attacks by adversaries. Our approach adopts a timing-based side channel and deep neural networks (DNN). To achieve this, we analyze real-world SDN traffic in a research computing center and accurately identify the controllers, minimizing the impact of random noise. Despite various factors that influence controller behaviors, our fingerprinting approach achieves an average accuracy of more than 90%. Lastly, the mitigation strategies are also discussed.
AB - Software-defined networking (SDN) has revolutionized the landscape of network management by decoupling control and data planes and becoming the backbone of many IT infrastructures including data centers, cloud computing, and enterprise networks. At the same time, however, the control plane has become a prime target for adversaries due to its critical role in network operations and centralized control functions. In this paper, we demonstrate how to discover the identity of different SDN controllers, which could be leveraged for more sophisticated attacks by adversaries. Our approach adopts a timing-based side channel and deep neural networks (DNN). To achieve this, we analyze real-world SDN traffic in a research computing center and accurately identify the controllers, minimizing the impact of random noise. Despite various factors that influence controller behaviors, our fingerprinting approach achieves an average accuracy of more than 90%. Lastly, the mitigation strategies are also discussed.
UR - http://www.scopus.com/inward/record.url?scp=85211901080&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85211901080&partnerID=8YFLogxK
U2 - 10.1109/NoF62948.2024.10741434
DO - 10.1109/NoF62948.2024.10741434
M3 - Conference contribution
AN - SCOPUS:85211901080
T3 - Proceedings of the 15th International Conference on Network of the Future, NoF 2024
SP - 169
EP - 177
BT - Proceedings of the 15th International Conference on Network of the Future, NoF 2024
A2 - Mahmoodi, Toktam
A2 - Munoz, Raul
A2 - Chemouil, Prosper
A2 - Troia, Sebastian
A2 - Nguyen, Thi-Mai-Trang
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 15th International Conference on Network of the Future, NoF 2024
Y2 - 2 October 2024 through 4 October 2024
ER -