skip to main content
10.1145/2876019.2876026acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
research-article

SHIELD: An Automated Framework for Static Analysis of SDN Applications

Published: 11 March 2016 Publication History

Abstract

Software-Defined Network (SDN) is getting popular and increasingly deployed in both of academia and industry. As a result of which, its security issue is being magnified as a critical controversy, and some pioneering researchers have investigated the vulnerabilities of SDN to discover the feasibility of compromising SDN networks. Especially, they prove that a simple malicious/buggy SDN application running on an SDN controller can kill an SDN control plane because it usually has a right to access the resources of SDN controller. To address this issue, we focus on the malicious SDN application themselves (i.e., how to understand if an SDN application is malicious). In this context, we consider analyzing SDN applications before running in a static manner. We present SHIELD, a new automated framework for static analysis of SDN applications carefully considering SDN abilities. SHIELD provides the Control-Flow Graph (CFG) and critical flows of SDN applications. We evaluate the effectiveness of SHIELD with 33 real world applications (both benign and malicious applications), and from the results, we define 10 malicious behaviors of SDN applications.

References

[1]
D. Arp, M. Spreitzenbarth, M. H bner, H. Gascon, K. Rieck, and C. Siemens. Drebin: Effective and explainable detection of android malware in your pocket. In NDSS, 2014.
[2]
J. Ellson, E. Gansner, L. Koutsoffos, S. C. North, and G. Woodhull. Graphviz-open source graph drawing tools. In Graph Drawing, pages 483--484, 2002.
[3]
FloodLight. http:// oodlight.open owhub.org/.
[4]
O. N. Foundation. Open ow switch specification 1.5.0. https://www.opennetworking.org/images/stories/downloads/sdn-resources/onf-specifications/open ow/ open ow-switch-v1.5.0.noipr.pdf.
[5]
E. Gansner, E. Koutsoffos, and S. North. Drawing graphs with dot. Technical report, AT&T Research. http://www.graphviz.org/Documentation/dotguide.pdf, 2006.
[6]
C.-Y. Hong, S. Kandula, R. Mahajan, M. Zhang, V. Gill, M. Nanduri, and R. Wattenhofer. Achieving high utilization with software-driven wan. In ACM SIGCOMM Computer Communication Review, volume 43, pages 15--26, 2013.
[7]
S. Hong, L. Xu, H. Wang, and G. Gu. Poisoning network visibility in software-defined networks: New attacks and countermeasures. In NDSS, 2015.
[8]
S. Jain, A. Kumar, S. Mandal, J. Ong, L. Poutievski, A. Singh, S. Venkata, J. Wanderer, J. Zhou, M. Zhu, et al. B4: Experience with a globally-deployed software defined wan. In ACM SIGCOMM Computer Communication Review, volume 43, pages 3--14, 2013.
[9]
C. Kolbitsch, P. M. Comparetti, C. Kruegel, E. Kirda, X.-y. Zhou, and X. Wang. Effective and efficient malware detection at the end host. In USENIX security symposium, pages 351--366, 2009.
[10]
P. Lam, E. Bodden, O. Lhotak, and L. Hendren. The soot framework for java program analysis: a retrospective. In Cetus Users and Compiler Infrastructure Workshop (CETUS 2011), 2011.
[11]
J. Medved, R. Varga, A. Tkacik, and K. Gray. Opendaylight: Towards a model-driven sdn controller architecture. In 2014 IEEE 15th International Symposium on, pages 1--6. IEEE, 2014.
[12]
P. Porras, S. Cheung, M. Fong, K. Skinner, and V. Yegneswaran. Securing the software-defined network control layer. In NDSS, 2015.
[13]
SDNSecurity.org. http://SDNSecurity.org/.
[14]
S. Shin and G. Gu. Attacking software-defined networks: A first feasibility study. In Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, pages 165--166, 2013.
[15]
S. Shin, Y. Song, T. Lee, S. Lee, J. Chung, P. Porras, V. Yegneswaran, J. Noh, and B. B. Kang. Rosemary: A robust, secure, and high-performance network operating system. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pages 78--89, 2014.
[16]
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, you, get off my market: Detecting malicious apps in official and alternative android markets. In NDSS, 2012.

Cited By

View all

Index Terms

  1. SHIELD: An Automated Framework for Static Analysis of SDN Applications

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SDN-NFV Security '16: Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization
    March 2016
    64 pages
    ISBN:9781450340786
    DOI:10.1145/2876019
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 March 2016

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. malware analysis
    2. software-defined networks security
    3. static analysis

    Qualifiers

    • Research-article

    Funding Sources

    • IITP / MSIP Republic of Korea

    Conference

    CODASPY'16
    Sponsor:

    Acceptance Rates

    SDN-NFV Security '16 Paper Acceptance Rate 7 of 20 submissions, 35%;
    Overall Acceptance Rate 11 of 30 submissions, 37%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)20
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 01 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media