Description of the technology
(Urias,
Stout, & Loverro, 2015) Software defined networks (SDNs) is an emerging
technology that is changing the defense and networking paradigm. (Hande,
Jadhav, Patil, & Zagade, n.d.) Traditionally, network devices like switches
and routers, using protocols (on the control plane) such as Open Shortest Path
First(OSPF), Border Gateway Protocol(BGP) and Spanning Tree Protocol(STP)
determine the best port or interface to forward packets (on the data plane).
These routing protocols use static information such as hop count to determine
the best path through the network. Moreover, (Ali, Sivaraman, Radford, &
Jha, 2015) this decentralized method of network management is the leading cause
of network faults and bugs due to errors during configuration. Not to mention,
a proliferation of ’internet ossification phenomenon’ which is basically the
stagnated network innovation. Additionally, there was no segregation of control
and data plane which is hardware centric and does not provide the flexibility,
extensibility, reliability and manageability as with SDNs.
On
the other hand, according to (Chiang et al., 2016) and (Masoudi & Ghaffari,
2016) SDNs simplify and improve networking management by decoupling the data
(forwarding) from the control (network) plane. This separation allows the
control plan to program the forwarding plane via control protocols such as
OpenFlow. (Masoudi & Ghaffari, 2016) Its’ architecture consists of a
logically centralized controller which has a global view of the network and
forwarding devices also known as SDN switches (equivalent to routers, switches,
NAT firewalls). (Ali et al., 2015) In SDN, switching devices (forwarding
devices/data plane element) contain flow tables which contain flow rules which
determine how packets will be handled based on matching fields or criteria.
Examples of fields/criteria are header content and incoming port. These rules
are managed remotely by the controller (control plane element) via a control
protocol. Flow tables can be updated reactively or via the controller.
Reactively meaning flow rules are updated based on an event occurring such as
the arrival of a packet. The controller continuously
polls statistics from the data plane elements resulting the view of real time
network state. API’s can then be used to expose the state, allowing developers
to build innovate network management applications like dynamic load balancing
and advanced threat mitigation.
(Scott-Hayward,
O’Callaghan, & Sezer, 2013) This emerging technology can be exploited to
enhance information security by creating highly reactive networking monitoring,
traffic analysis and response systems presenting new ways to prevent, detect
and react to threats.
Security problems it addresses
SDN’s
can be used to improve security controls making it adaptive and reactive in
real time to internal and external threats. (Ali et al., 2015) Security
policies today consists of a combination of security solutions that are
distributed, complicated and specialized in functionality. Implementing an
enterprise wide security management system consists of integrating and
harmonizing these disparate controls. Usually these controls are at high layers
in the OSI stack which can be undermined by vulnerabilities in the lower
levels. However, SDNs enforces security at the link layer which leaves no room
for lower level exploits. In addition, SDNS can be integrated with prevention,
detection and response techniques to improve overall functionality to create agile
security systems.
(Ali
et al., 2015) In the case of DoS attacks, network state information can be used
by applications interacting with the controller to reprogram switches to drop
malicious traffic (compared to normal baseline traffic), thereby preventing a
potential DoS attack. Similarly, with malware containment, by instructing
switches to restrict traffic flows to an infected network segment and diverting
traffic from the infected hosts to a quarantine server, it prevents further
damage to an organizations networking infrastructure and spoiling data theft
and ransomeware attacks.
Using
other technologies like machine learning and data mining techniques, statistics
collected by the SDN controller can be analyzed to identify and detect threat
patterns. This feature would only be made possible because of the controller
having network state view and availability of the open application programmable
interface provided by SDNs. In traditional networks, traffic dropping was the
only response to a possible threat. However, SDNs highly programmable feature
promotes more dynamic responses such as quarantining, traffic redirection, and
entrapment and deception mechanism (Carroll & Grosu, 2011) like honey pots
and tarpits.
Business Benefits/Implications
SDN deployment is gaining momentum
across the global (Ali et al., 2015) for example, Google has deployed software
defined networks for handling a datacenter backbone traffic and other companies
like Cisco, Dell, Juniper networks have announced support towards this emerging
technology. There a numerous benefits to businesses due to the adoption of this
upcoming trend that is changing the traditional networking paradigm.
Apart from creating security as a
service (Ali et al., 2015) solutions, SDNs enables an elastic cost model for
value added services as security capabilities and controls can be selectively
invoked on demand. (Nunes, Mendonca, Nguyen, Obraczka, & Turletti, 2014) In
addition, outsourcing network security is enabled by SDNs which is a plus since
there seems to be a short supply of skill security professionals. This move
further decreases cost of protecting businesses with a projected cost savings
of 53 percent according to (Brief, 2016).
SDNs extensible, flexible,
programmable nature provide a holistic management approach which is synonymous
to how information security management is implemented. This allows enhanced
productivity as business do not have to invest significantly in securing their
assets and focus on its business aspects. (Brief, 2016) In addition, the
application layer enables applications to be developed which increases
manageability of networks.
Real time reaction to threats
decreases risks associated with any vulnerabilities. Like all technologies,
(Scott-Hayward, Natarajan, & Sezer, 2015) SDNs are not without its
potential disadvantages, however, due to the evolving threat landscape,
businesses also have to evolve with new protection mechanisms.
References
Ali, S. T., Sivaraman, V., Radford,
A., & Jha, S. (2015). A survey of securing networks
using
software defined networking. IEEE transactions on reliability, 64 (3),
1086–1097.
Brief, E. (2016). SDN Growth Takes
IT Infrastructure by Storm.
Carroll, T. E., & Grosu, D.
(2011). A game theoretic investigation of deception in
network security.
Security and Communication Networks, 4 (10), 1162–1172.
Chiang, C.-Y. J., Gottlieb, Y. M.,
Sugrim, S. J., Chadha, R., Serban, C., Poylisher, A.,
. . .
Santos, J. (2016). Acyds: An adaptive cyber deception system. In Military
communications
conference, milcom 2016-2016 ieee (pp. 800–805).
Hande, Y., Jadhav, A., Patil, A.,
& Zagade, R. (n.d.). Software defined networking
with
intrusion detection system.
Masoudi, R., & Ghaffari, A.
(2016). Software defined networks: A survey. Journal of
Network
and Computer Applications, 67 , 1–25.
Nunes, B. A. A., Mendonca, M., Nguyen, X.-N.,
Obraczka, K., & Turletti, T. (2014). A
survey of
software-defined networking: Past, present, and future of programmable
networks. IEEE Communications Surveys & Tutorials, 16 (3), 1617–1634.
Scott-Hayward, S., Natarajan, S.,
& Sezer, S. (2015). A survey of security in software
defined
networks. IEEE Communications Surveys & Tutorials, 18 (1), 623–654.
Scott-Hayward, S., O’Callaghan, G.,
& Sezer, S. (2013). Sdn security: A survey. In
Future
networks and services (sdn4fns), 2013 ieee sdn for (pp. 1–7).
Urias, V. E., Stout, W. M., &
Loverro, C. (2015). Computer network deception as a
moving
target defense. In Security technology (iccst), 2015 international carnahan
conference
on (pp. 1–6).
Comments
Post a Comment