skip to main content
10.1145/2342441.2342466acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free Access

A security enforcement kernel for OpenFlow networks

Authors Info & Claims
Published:13 August 2012Publication History

ABSTRACT

Software-defined networks facilitate rapid and open innovation at the network control layer by providing a programmable network infrastructure for computing flow policies on demand. However, the dynamism of programmable networks also introduces new security challenges that demand innovative solutions. A critical challenge is efficient detection and reconciliation of potentially conflicting flow rules imposed by dynamic OpenFlow (OF) applications. To that end, we introduce FortNOX, a software extension that provides role-based authorization and security constraint enforcement for the NOX OpenFlow controller. FortNOX enables NOX to check flow rule contradictions in real time, and implements a novel analysis algorithm that is robust even in cases where an adversarial OF application attempts to strategically insert flow rules that would otherwise circumvent flow rules imposed by OF security applications. We demonstrate the utility of FortNOX through a prototype implementation and use it to examine performance and efficiency aspects of the proposed framework.

Skip Supplemental Material Section

Supplemental Material

hotsdn-iv-03-asecurityenforcementkernelforopenflownetworks.mp4

mp4

41.8 MB

References

  1. E. Al-Shaer and S. Al-Haj. FlowChecker: Configuration Analysis and Verification of Federated Openflow Infrastructures. In Proceedings of the 3rd ACM SafeConfig Workshop, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. E. Al-shaer, W. Marrero, A. El-atawy, and K. Elbadawi. Network Configuration in A Box: Towards End-to-End Verification of Network Reachability and Security. In Proceedings of the IEEE International Conference on Network Protocols, 2009.Google ScholarGoogle Scholar
  3. Z. Cai, A. L. Cox, and T. E. Ng. Maestro: A System for Scalable OpenFlow Control. In Rice University Technical Report, 2010.Google ScholarGoogle Scholar
  4. M. Canini, D. Venzano, P. Peresini, D. Kostic, and J. Rexford. A NICE Way to Test OpenFlow Applications. In Proceedings of the Symposium on Network Systems Design and Implementation, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Casado, M. J. Freedman, J. Pettit, J. Luo, N. McKeown, and S. Shenker. Ethane: Taking Control of the Enterprise. In Proceedings of ACM SIGCOMM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. Casado, T. Garfinkel, M. Freedman, A. Akella, D. Boneh, N. McKeowon, and S. Shenker. SANE: A Protection Architecture for Enterprise Networks. In Proceedings of the Usenix Security Symposium, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. A. El-atawy, T. Samak, Z. Wali, E. Al-shaer, F. Lin, C. Pham, and S. Li. An Automated Framework for Validating Firewall Policy Enforcement. Technical report, 2007.Google ScholarGoogle Scholar
  8. N. Feamster and H. Balakrishnan. Detecting BGP Configuration Faults with Static Analysis. In Proceedings of the Usenix Symposium on Network Systems Design and Implementation, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. Greenberg, G. Hjalmtysson, D. A. Maltz, A. Myers, J. Rexford, G. Xie, H. Yan, J. Zhan, and H. Zhang. A Clean Slate 4D Approach to Network Control and Management. In Proceedings of ACM Computer Communications Review, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. N. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. Shenker. NOX: Towards an Operating System for Networks. In Proceedings of ACM Computer Communications Review, July 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. P. Kazemian, G. Varghese, and N. McKeown. Header Space Analysis: Static Checking for Networks. In Proceedings of the Symposium on Network Systems Design and Implementation, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. A. Khurshid, W. Zhou, M. Caesar, and P. B. Godfrey. VeriFlow: Verifying Network-Wide Invariants in Real Time. In Proceedings of ACM Sigcomm HotSDN Workshop, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. A. Liu. Formal Verification of Firewall Policies. In Proceedings of the International Conference on Communications (ICC), 2008.Google ScholarGoogle ScholarCross RefCross Ref
  14. N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner. OpenFlow: Enabling Innovation in Campus Networks. In Proceedings of ACM Computer Communications Review, April 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. C. Mogul, J. Tourrilhes, P. Yalagandula, P. Sharma, A. R. Curtis, and S. Banerjee. DevoFlow: Cost-effective Flow Management for High Performance Enterprise Networks. In Proceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets), 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A. Nayak, A. Reimers, N. Feamster, and R. Clark. Resonance: Dynamic Access Control for Enterprise Networks. In Proceedings of the 1st ACM SIGCOMM WREN Workshop, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. OpenFlow. OpenFlow 1.1.0 Specification. http://www.openflow.org/documents/openflow-spec-v1.1.0.pdf.Google ScholarGoogle Scholar
  18. OpenFlowHub. BEACON. http//www.openflowhub.org/display/Beacon.Google ScholarGoogle Scholar
  19. M. Reitblatt, N. Foster, J. Rexford, and D. Walker. Consistent Update for Software-Defined Networks: Change You Can Believe In! In Proceedings of the ACM Workshop on Hot Topics in Networks, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S. Sanfilippo. HPing home page. http://www.hping.org.Google ScholarGoogle Scholar
  21. D. Senn, D. Basin, and G. Caronni. Firewall Conformance Testing. In Proceedings of the IFIP TestCom, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. R. Sherwood, G. Gibb, K.-K. Yap, G. Appenzeller, M. Casado, N. McKeown, and G. Parulkar. Can the Production Network Be the Testbed. In Proceedings of the Usenix Symposium on Operating System Design and Implementation (OSDI), 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. G. Xie, J. Zhan, D. Maltz, H. Zhang, A. Greenberg, G. Hjalmtysson, and J. Rexford. On Static Reachability Analysis of IP Networks. In Proceeding of IEEE INFOCOM, 2005.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. A security enforcement kernel for OpenFlow networks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      HotSDN '12: Proceedings of the first workshop on Hot topics in software defined networks
      August 2012
      142 pages
      ISBN:9781450314770
      DOI:10.1145/2342441

      Copyright © 2012 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 13 August 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate88of198submissions,44%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader