Skip to content

Latest commit

 

History

History
25 lines (14 loc) · 2.54 KB

sdn.md

File metadata and controls

25 lines (14 loc) · 2.54 KB

Home

Software Defined Network Security

A secure software infrastructure connecting all components is a necessary backbone for delivering and deploying secure software updates to endpoints. We address network infrastructure security on several levels, combining a diverse set of approaches and tools.

Routing misconfigurations commonly occur in complex heterogeneous networks, potentially leading to routing policy violations. We used property-based testing to detect - before deployment - network routes that may violate routing policies in Software-Defined Networks.

Software network components deployed throughout the network fabric are valuable targets for adversaries that aim to take over the network infrastructure. We started off by improving the security of data collected and processed by Open vSwitch by decomposing and porting it to Intel SGX enclaves. Here we built on earlier experience in using confidential enclaves to protect the privacy of software patching recommendations. It later became evident that firmware patches aimed at preventing speculative execution attacks, while necessary, induce a tangible performance overhead on common network switch operations. We subsequently addressed this by improving the IO performance of network components deployed in SGX enclaves This work was preseted at the SPIN'21 Workshop on Secure Programmable Network Infrastructure.

{% include vimeoPlayer.html id=651087489 %}

Key distribution can be made more efficient by leveraging the control and configuration messages exchanged between the components of SDN deployments. We used this insight to deploy ephemeral symmetric keys and reduce the computational cost of key negotiation between resource-constrained endpoints in Flowrider. We demonstrated our results at the 25th Conference on Innovation in Clouds, Internet and Networks

{% include vimeoPlayer.html id=651095024 %}

We implemented the approach using Open vSwitch and a Ryu controller with endpoints deployed in Docker containers.

{% include vimeoPlayer.html id=651095395 %}

Our implementation showed that the Flowrider approach can reduce the computational cost of setting up a secure communication channel by an order of magnitude. Results published in SecureComm 2021.