Loading…

Protecting Virtual Programmable Switches from Cross-App Poisoning (CAP) Attacks

Cross-App Poisoning (CAP) is an emerging class of network integrity attacks against Software Defined Networking (SDN). In a CAP attack, a malicious app poison shared data objects maintained by the controller, thus co-opting legitimate apps into carrying out bogus actions that the malicious app itsel...

Full description

Saved in:
Bibliographic Details
Main Authors: Lamb, Ivan Peter, Saquetti, Mateus, de Oliveira, Guilherme Bueno, Rodrigo Azambuja, Jose, Cordeiro, Weverton
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 9
container_issue
container_start_page 1
container_title
container_volume
creator Lamb, Ivan Peter
Saquetti, Mateus
de Oliveira, Guilherme Bueno
Rodrigo Azambuja, Jose
Cordeiro, Weverton
description Cross-App Poisoning (CAP) is an emerging class of network integrity attacks against Software Defined Networking (SDN). In a CAP attack, a malicious app poison shared data objects maintained by the controller, thus co-opting legitimate apps into carrying out bogus actions that the malicious app itself cannot perform due to insufficient privileges. Existing solutions, such as ProvSDN, demonstrated that Information Flow Control (IFC) can track and thus prevent such attacks. However, these solutions cannot prevent CAP attacks in networks where malicious apps can take advantage of programmable virtual switches to bypass IFC. In this paper, we propose Virtual Information Flow Control (vIFC), a solution for defending against CAP attacks that exploit virtual switches to obfuscate malicious information flow. vIFC has shown high effectivity while posing low performance overhead. We also propose a policy model that offers flexibility to the network manager to determine IFC between apps running on multiple controllers.
doi_str_mv 10.1109/NOMS54207.2022.9789775
format conference_proceeding
fullrecord <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_9789775</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9789775</ieee_id><sourcerecordid>9789775</sourcerecordid><originalsourceid>FETCH-LOGICAL-i203t-41002ac7b7e12cf5112bb11df6d2b6238a32c48d1826de9e87f06b46c41b23493</originalsourceid><addsrcrecordid>eNotj01LAzEURaMgWGt_gSBZ6mLqy0smmSyHwS-otlB1W5JMpkY7nZJExH9vxa7u5cA9cAm5ZDBlDPTN8_xpWQoENUVAnGpVaaXKIzLZNyZlKUACU8dkhFyJQivQp-QspQ8AoYDDiMwXccje5bBd07cQ85fZ0D1aR9P3xm48XX6H7N59ol0cetrEIaWi3u3oYghp2P7Nrpp6cU3rnI37TOfkpDOb5CeHHJPXu9uX5qGYze8fm3pWBASeC8EA0DhllWfoupIxtJaxtpMtWom8MhydqFpWoWy99pXqQFohnWAWudB8TC7-vcF7v9rF0Jv4szr8578EUk8d</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Protecting Virtual Programmable Switches from Cross-App Poisoning (CAP) Attacks</title><source>IEEE Xplore All Conference Series</source><creator>Lamb, Ivan Peter ; Saquetti, Mateus ; de Oliveira, Guilherme Bueno ; Rodrigo Azambuja, Jose ; Cordeiro, Weverton</creator><creatorcontrib>Lamb, Ivan Peter ; Saquetti, Mateus ; de Oliveira, Guilherme Bueno ; Rodrigo Azambuja, Jose ; Cordeiro, Weverton</creatorcontrib><description>Cross-App Poisoning (CAP) is an emerging class of network integrity attacks against Software Defined Networking (SDN). In a CAP attack, a malicious app poison shared data objects maintained by the controller, thus co-opting legitimate apps into carrying out bogus actions that the malicious app itself cannot perform due to insufficient privileges. Existing solutions, such as ProvSDN, demonstrated that Information Flow Control (IFC) can track and thus prevent such attacks. However, these solutions cannot prevent CAP attacks in networks where malicious apps can take advantage of programmable virtual switches to bypass IFC. In this paper, we propose Virtual Information Flow Control (vIFC), a solution for defending against CAP attacks that exploit virtual switches to obfuscate malicious information flow. vIFC has shown high effectivity while posing low performance overhead. We also propose a policy model that offers flexibility to the network manager to determine IFC between apps running on multiple controllers.</description><identifier>EISSN: 2374-9709</identifier><identifier>EISBN: 9781665406017</identifier><identifier>EISBN: 1665406011</identifier><identifier>DOI: 10.1109/NOMS54207.2022.9789775</identifier><language>eng</language><publisher>IEEE</publisher><subject>Control systems ; Data Provenance ; Information Flow Control ; Software defined networking ; Sofware Defined Networking ; Toxicology ; Virtualization</subject><ispartof>NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium, 2022, p.1-9</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9789775$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9789775$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Lamb, Ivan Peter</creatorcontrib><creatorcontrib>Saquetti, Mateus</creatorcontrib><creatorcontrib>de Oliveira, Guilherme Bueno</creatorcontrib><creatorcontrib>Rodrigo Azambuja, Jose</creatorcontrib><creatorcontrib>Cordeiro, Weverton</creatorcontrib><title>Protecting Virtual Programmable Switches from Cross-App Poisoning (CAP) Attacks</title><title>NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium</title><addtitle>NOMS</addtitle><description>Cross-App Poisoning (CAP) is an emerging class of network integrity attacks against Software Defined Networking (SDN). In a CAP attack, a malicious app poison shared data objects maintained by the controller, thus co-opting legitimate apps into carrying out bogus actions that the malicious app itself cannot perform due to insufficient privileges. Existing solutions, such as ProvSDN, demonstrated that Information Flow Control (IFC) can track and thus prevent such attacks. However, these solutions cannot prevent CAP attacks in networks where malicious apps can take advantage of programmable virtual switches to bypass IFC. In this paper, we propose Virtual Information Flow Control (vIFC), a solution for defending against CAP attacks that exploit virtual switches to obfuscate malicious information flow. vIFC has shown high effectivity while posing low performance overhead. We also propose a policy model that offers flexibility to the network manager to determine IFC between apps running on multiple controllers.</description><subject>Control systems</subject><subject>Data Provenance</subject><subject>Information Flow Control</subject><subject>Software defined networking</subject><subject>Sofware Defined Networking</subject><subject>Toxicology</subject><subject>Virtualization</subject><issn>2374-9709</issn><isbn>9781665406017</isbn><isbn>1665406011</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2022</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotj01LAzEURaMgWGt_gSBZ6mLqy0smmSyHwS-otlB1W5JMpkY7nZJExH9vxa7u5cA9cAm5ZDBlDPTN8_xpWQoENUVAnGpVaaXKIzLZNyZlKUACU8dkhFyJQivQp-QspQ8AoYDDiMwXccje5bBd07cQ85fZ0D1aR9P3xm48XX6H7N59ol0cetrEIaWi3u3oYghp2P7Nrpp6cU3rnI37TOfkpDOb5CeHHJPXu9uX5qGYze8fm3pWBASeC8EA0DhllWfoupIxtJaxtpMtWom8MhydqFpWoWy99pXqQFohnWAWudB8TC7-vcF7v9rF0Jv4szr8578EUk8d</recordid><startdate>20220425</startdate><enddate>20220425</enddate><creator>Lamb, Ivan Peter</creator><creator>Saquetti, Mateus</creator><creator>de Oliveira, Guilherme Bueno</creator><creator>Rodrigo Azambuja, Jose</creator><creator>Cordeiro, Weverton</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>20220425</creationdate><title>Protecting Virtual Programmable Switches from Cross-App Poisoning (CAP) Attacks</title><author>Lamb, Ivan Peter ; Saquetti, Mateus ; de Oliveira, Guilherme Bueno ; Rodrigo Azambuja, Jose ; Cordeiro, Weverton</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i203t-41002ac7b7e12cf5112bb11df6d2b6238a32c48d1826de9e87f06b46c41b23493</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Control systems</topic><topic>Data Provenance</topic><topic>Information Flow Control</topic><topic>Software defined networking</topic><topic>Sofware Defined Networking</topic><topic>Toxicology</topic><topic>Virtualization</topic><toplevel>online_resources</toplevel><creatorcontrib>Lamb, Ivan Peter</creatorcontrib><creatorcontrib>Saquetti, Mateus</creatorcontrib><creatorcontrib>de Oliveira, Guilherme Bueno</creatorcontrib><creatorcontrib>Rodrigo Azambuja, Jose</creatorcontrib><creatorcontrib>Cordeiro, Weverton</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Lamb, Ivan Peter</au><au>Saquetti, Mateus</au><au>de Oliveira, Guilherme Bueno</au><au>Rodrigo Azambuja, Jose</au><au>Cordeiro, Weverton</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Protecting Virtual Programmable Switches from Cross-App Poisoning (CAP) Attacks</atitle><btitle>NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium</btitle><stitle>NOMS</stitle><date>2022-04-25</date><risdate>2022</risdate><spage>1</spage><epage>9</epage><pages>1-9</pages><eissn>2374-9709</eissn><eisbn>9781665406017</eisbn><eisbn>1665406011</eisbn><abstract>Cross-App Poisoning (CAP) is an emerging class of network integrity attacks against Software Defined Networking (SDN). In a CAP attack, a malicious app poison shared data objects maintained by the controller, thus co-opting legitimate apps into carrying out bogus actions that the malicious app itself cannot perform due to insufficient privileges. Existing solutions, such as ProvSDN, demonstrated that Information Flow Control (IFC) can track and thus prevent such attacks. However, these solutions cannot prevent CAP attacks in networks where malicious apps can take advantage of programmable virtual switches to bypass IFC. In this paper, we propose Virtual Information Flow Control (vIFC), a solution for defending against CAP attacks that exploit virtual switches to obfuscate malicious information flow. vIFC has shown high effectivity while posing low performance overhead. We also propose a policy model that offers flexibility to the network manager to determine IFC between apps running on multiple controllers.</abstract><pub>IEEE</pub><doi>10.1109/NOMS54207.2022.9789775</doi><tpages>9</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier EISSN: 2374-9709
ispartof NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium, 2022, p.1-9
issn 2374-9709
language eng
recordid cdi_ieee_primary_9789775
source IEEE Xplore All Conference Series
subjects Control systems
Data Provenance
Information Flow Control
Software defined networking
Sofware Defined Networking
Toxicology
Virtualization
title Protecting Virtual Programmable Switches from Cross-App Poisoning (CAP) Attacks
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T23%3A10%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Protecting%20Virtual%20Programmable%20Switches%20from%20Cross-App%20Poisoning%20(CAP)%20Attacks&rft.btitle=NOMS%202022-2022%20IEEE/IFIP%20Network%20Operations%20and%20Management%20Symposium&rft.au=Lamb,%20Ivan%20Peter&rft.date=2022-04-25&rft.spage=1&rft.epage=9&rft.pages=1-9&rft.eissn=2374-9709&rft_id=info:doi/10.1109/NOMS54207.2022.9789775&rft.eisbn=9781665406017&rft.eisbn_list=1665406011&rft_dat=%3Cieee_CHZPO%3E9789775%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i203t-41002ac7b7e12cf5112bb11df6d2b6238a32c48d1826de9e87f06b46c41b23493%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=9789775&rfr_iscdi=true