Loading…
Protecting Virtual Programmable Switches from Cross-App Poisoning (CAP) Attacks
Cross-App Poisoning (CAP) is an emerging class of network integrity attacks against Software Defined Networking (SDN). In a CAP attack, a malicious app poison shared data objects maintained by the controller, thus co-opting legitimate apps into carrying out bogus actions that the malicious app itsel...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 9 |
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Lamb, Ivan Peter Saquetti, Mateus de Oliveira, Guilherme Bueno Rodrigo Azambuja, Jose Cordeiro, Weverton |
description | Cross-App Poisoning (CAP) is an emerging class of network integrity attacks against Software Defined Networking (SDN). In a CAP attack, a malicious app poison shared data objects maintained by the controller, thus co-opting legitimate apps into carrying out bogus actions that the malicious app itself cannot perform due to insufficient privileges. Existing solutions, such as ProvSDN, demonstrated that Information Flow Control (IFC) can track and thus prevent such attacks. However, these solutions cannot prevent CAP attacks in networks where malicious apps can take advantage of programmable virtual switches to bypass IFC. In this paper, we propose Virtual Information Flow Control (vIFC), a solution for defending against CAP attacks that exploit virtual switches to obfuscate malicious information flow. vIFC has shown high effectivity while posing low performance overhead. We also propose a policy model that offers flexibility to the network manager to determine IFC between apps running on multiple controllers. |
doi_str_mv | 10.1109/NOMS54207.2022.9789775 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_9789775</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9789775</ieee_id><sourcerecordid>9789775</sourcerecordid><originalsourceid>FETCH-LOGICAL-i203t-41002ac7b7e12cf5112bb11df6d2b6238a32c48d1826de9e87f06b46c41b23493</originalsourceid><addsrcrecordid>eNotj01LAzEURaMgWGt_gSBZ6mLqy0smmSyHwS-otlB1W5JMpkY7nZJExH9vxa7u5cA9cAm5ZDBlDPTN8_xpWQoENUVAnGpVaaXKIzLZNyZlKUACU8dkhFyJQivQp-QspQ8AoYDDiMwXccje5bBd07cQ85fZ0D1aR9P3xm48XX6H7N59ol0cetrEIaWi3u3oYghp2P7Nrpp6cU3rnI37TOfkpDOb5CeHHJPXu9uX5qGYze8fm3pWBASeC8EA0DhllWfoupIxtJaxtpMtWom8MhydqFpWoWy99pXqQFohnWAWudB8TC7-vcF7v9rF0Jv4szr8578EUk8d</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Protecting Virtual Programmable Switches from Cross-App Poisoning (CAP) Attacks</title><source>IEEE Xplore All Conference Series</source><creator>Lamb, Ivan Peter ; Saquetti, Mateus ; de Oliveira, Guilherme Bueno ; Rodrigo Azambuja, Jose ; Cordeiro, Weverton</creator><creatorcontrib>Lamb, Ivan Peter ; Saquetti, Mateus ; de Oliveira, Guilherme Bueno ; Rodrigo Azambuja, Jose ; Cordeiro, Weverton</creatorcontrib><description>Cross-App Poisoning (CAP) is an emerging class of network integrity attacks against Software Defined Networking (SDN). In a CAP attack, a malicious app poison shared data objects maintained by the controller, thus co-opting legitimate apps into carrying out bogus actions that the malicious app itself cannot perform due to insufficient privileges. Existing solutions, such as ProvSDN, demonstrated that Information Flow Control (IFC) can track and thus prevent such attacks. However, these solutions cannot prevent CAP attacks in networks where malicious apps can take advantage of programmable virtual switches to bypass IFC. In this paper, we propose Virtual Information Flow Control (vIFC), a solution for defending against CAP attacks that exploit virtual switches to obfuscate malicious information flow. vIFC has shown high effectivity while posing low performance overhead. We also propose a policy model that offers flexibility to the network manager to determine IFC between apps running on multiple controllers.</description><identifier>EISSN: 2374-9709</identifier><identifier>EISBN: 9781665406017</identifier><identifier>EISBN: 1665406011</identifier><identifier>DOI: 10.1109/NOMS54207.2022.9789775</identifier><language>eng</language><publisher>IEEE</publisher><subject>Control systems ; Data Provenance ; Information Flow Control ; Software defined networking ; Sofware Defined Networking ; Toxicology ; Virtualization</subject><ispartof>NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium, 2022, p.1-9</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9789775$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9789775$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Lamb, Ivan Peter</creatorcontrib><creatorcontrib>Saquetti, Mateus</creatorcontrib><creatorcontrib>de Oliveira, Guilherme Bueno</creatorcontrib><creatorcontrib>Rodrigo Azambuja, Jose</creatorcontrib><creatorcontrib>Cordeiro, Weverton</creatorcontrib><title>Protecting Virtual Programmable Switches from Cross-App Poisoning (CAP) Attacks</title><title>NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium</title><addtitle>NOMS</addtitle><description>Cross-App Poisoning (CAP) is an emerging class of network integrity attacks against Software Defined Networking (SDN). In a CAP attack, a malicious app poison shared data objects maintained by the controller, thus co-opting legitimate apps into carrying out bogus actions that the malicious app itself cannot perform due to insufficient privileges. Existing solutions, such as ProvSDN, demonstrated that Information Flow Control (IFC) can track and thus prevent such attacks. However, these solutions cannot prevent CAP attacks in networks where malicious apps can take advantage of programmable virtual switches to bypass IFC. In this paper, we propose Virtual Information Flow Control (vIFC), a solution for defending against CAP attacks that exploit virtual switches to obfuscate malicious information flow. vIFC has shown high effectivity while posing low performance overhead. We also propose a policy model that offers flexibility to the network manager to determine IFC between apps running on multiple controllers.</description><subject>Control systems</subject><subject>Data Provenance</subject><subject>Information Flow Control</subject><subject>Software defined networking</subject><subject>Sofware Defined Networking</subject><subject>Toxicology</subject><subject>Virtualization</subject><issn>2374-9709</issn><isbn>9781665406017</isbn><isbn>1665406011</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2022</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotj01LAzEURaMgWGt_gSBZ6mLqy0smmSyHwS-otlB1W5JMpkY7nZJExH9vxa7u5cA9cAm5ZDBlDPTN8_xpWQoENUVAnGpVaaXKIzLZNyZlKUACU8dkhFyJQivQp-QspQ8AoYDDiMwXccje5bBd07cQ85fZ0D1aR9P3xm48XX6H7N59ol0cetrEIaWi3u3oYghp2P7Nrpp6cU3rnI37TOfkpDOb5CeHHJPXu9uX5qGYze8fm3pWBASeC8EA0DhllWfoupIxtJaxtpMtWom8MhydqFpWoWy99pXqQFohnWAWudB8TC7-vcF7v9rF0Jv4szr8578EUk8d</recordid><startdate>20220425</startdate><enddate>20220425</enddate><creator>Lamb, Ivan Peter</creator><creator>Saquetti, Mateus</creator><creator>de Oliveira, Guilherme Bueno</creator><creator>Rodrigo Azambuja, Jose</creator><creator>Cordeiro, Weverton</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>20220425</creationdate><title>Protecting Virtual Programmable Switches from Cross-App Poisoning (CAP) Attacks</title><author>Lamb, Ivan Peter ; Saquetti, Mateus ; de Oliveira, Guilherme Bueno ; Rodrigo Azambuja, Jose ; Cordeiro, Weverton</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i203t-41002ac7b7e12cf5112bb11df6d2b6238a32c48d1826de9e87f06b46c41b23493</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Control systems</topic><topic>Data Provenance</topic><topic>Information Flow Control</topic><topic>Software defined networking</topic><topic>Sofware Defined Networking</topic><topic>Toxicology</topic><topic>Virtualization</topic><toplevel>online_resources</toplevel><creatorcontrib>Lamb, Ivan Peter</creatorcontrib><creatorcontrib>Saquetti, Mateus</creatorcontrib><creatorcontrib>de Oliveira, Guilherme Bueno</creatorcontrib><creatorcontrib>Rodrigo Azambuja, Jose</creatorcontrib><creatorcontrib>Cordeiro, Weverton</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Lamb, Ivan Peter</au><au>Saquetti, Mateus</au><au>de Oliveira, Guilherme Bueno</au><au>Rodrigo Azambuja, Jose</au><au>Cordeiro, Weverton</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Protecting Virtual Programmable Switches from Cross-App Poisoning (CAP) Attacks</atitle><btitle>NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium</btitle><stitle>NOMS</stitle><date>2022-04-25</date><risdate>2022</risdate><spage>1</spage><epage>9</epage><pages>1-9</pages><eissn>2374-9709</eissn><eisbn>9781665406017</eisbn><eisbn>1665406011</eisbn><abstract>Cross-App Poisoning (CAP) is an emerging class of network integrity attacks against Software Defined Networking (SDN). In a CAP attack, a malicious app poison shared data objects maintained by the controller, thus co-opting legitimate apps into carrying out bogus actions that the malicious app itself cannot perform due to insufficient privileges. Existing solutions, such as ProvSDN, demonstrated that Information Flow Control (IFC) can track and thus prevent such attacks. However, these solutions cannot prevent CAP attacks in networks where malicious apps can take advantage of programmable virtual switches to bypass IFC. In this paper, we propose Virtual Information Flow Control (vIFC), a solution for defending against CAP attacks that exploit virtual switches to obfuscate malicious information flow. vIFC has shown high effectivity while posing low performance overhead. We also propose a policy model that offers flexibility to the network manager to determine IFC between apps running on multiple controllers.</abstract><pub>IEEE</pub><doi>10.1109/NOMS54207.2022.9789775</doi><tpages>9</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | EISSN: 2374-9709 |
ispartof | NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium, 2022, p.1-9 |
issn | 2374-9709 |
language | eng |
recordid | cdi_ieee_primary_9789775 |
source | IEEE Xplore All Conference Series |
subjects | Control systems Data Provenance Information Flow Control Software defined networking Sofware Defined Networking Toxicology Virtualization |
title | Protecting Virtual Programmable Switches from Cross-App Poisoning (CAP) Attacks |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T23%3A10%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Protecting%20Virtual%20Programmable%20Switches%20from%20Cross-App%20Poisoning%20(CAP)%20Attacks&rft.btitle=NOMS%202022-2022%20IEEE/IFIP%20Network%20Operations%20and%20Management%20Symposium&rft.au=Lamb,%20Ivan%20Peter&rft.date=2022-04-25&rft.spage=1&rft.epage=9&rft.pages=1-9&rft.eissn=2374-9709&rft_id=info:doi/10.1109/NOMS54207.2022.9789775&rft.eisbn=9781665406017&rft.eisbn_list=1665406011&rft_dat=%3Cieee_CHZPO%3E9789775%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i203t-41002ac7b7e12cf5112bb11df6d2b6238a32c48d1826de9e87f06b46c41b23493%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=9789775&rfr_iscdi=true |