Taking Control of SDN-based Cloud Systems via the Data Plane
Virtual switches are a crucial component of SDN-based cloud systems, enabling the interconnection of virtual machines in a flexible and “software-defined” manner. This paper raises the alarm on the security implications of virtual switches. In particular, we show that virtual switches not only increase the attack surface of the cloud, but virtual switch vulnerabilities can also lead to attacks of much higher impact compared to traditional switches. We present a systematic security analysis and identify four design decisions which introduce vulnerabilities. Our findings motivate us to revisit existing threat models for SDN-based cloud setups, and introduce a new attacker model for SDN-based cloud systems using virtual switches. We demonstrate the practical relevance of our analysis using a case study with Open vSwitch and OpenStack. Employing a fuzzing methodology, we find several exploitable vulnerabilities in Open vSwitch. Using just one vulnerability we were able to create a worm that can compromise hundreds of servers in a matter of minutes. Our findings are applicable beyond virtual switches: NFV and high-performance fast path implementations face similar issues. This paper also studies various mitigation techniques and discusses how to redesign virtual switches for their integration.
Top- Thimmaraju, Kashyap
- Shastry, Bhargava
- Fiebig, Tobias
- Hetzelt, Felicitas
- Seifert, Jean-Pierre
- Feldmann, Anja
- Schmid, Stefan
Category |
Paper in Conference Proceedings or in Workshop Proceedings (Paper) |
Event Title |
ACM Symposium on SDN Research (SOSR) |
Divisions |
Communication Technologies |
Subjects |
Informatik Allgemeines |
Event Location |
Los Angeles, California, USA |
Event Type |
Conference |
Event Dates |
March 2018 |
Date |
2018 |
Export |