skip to main content
10.1145/2620728.2620749acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free Access

FLOWGUARD: building robust firewalls for software-defined networks

Published:22 August 2014Publication History

ABSTRACT

Software-Defined Networking (SDN) introduces significant granularity, visibility and flexibility to networking, but at the same time brings forth new security challenges. One of the fundamental challenges is to build robust firewalls for protecting OpenFlow-based networks where network states and traffic are frequently changed. To address this challenge, we introduce FlowGuard, a comprehensive framework, to facilitate not only accurate detection but also effective resolution of firewall policy violations in dynamic OpenFlow-based networks. FlowGuard checks network flow path spaces to detect firewall policy violations when network states are updated. In addition, FlowGuard conducts automatic and real-time violation resolutions with the help of several innovative resolution strategies designed for diverse network update situations. We also implement our framework and demonstrate the efficacy and efficiency of the proposed detection and resolution approaches in FlowGuard through experiments with a real-world network topology.

References

  1. Floodlight: Open SDN Controller. http://www.projectfloodlight.org.Google ScholarGoogle Scholar
  2. Frenetic: A Family of Network Programming Languages. http://frenetic-lang.org/.Google ScholarGoogle Scholar
  3. Header Space Library. https://bitbucket.org/peymank/hassel-public.Google ScholarGoogle Scholar
  4. E. Al-Shaer and H. Hamed. Discovery of policy anomalies in distributed firewalls. In INFOCOM'04.Google ScholarGoogle Scholar
  5. G. Bianchi, M. Bonola, A. Capone, and C. Cascone. OpenState: programming platform-independent stateful openflow applications inside the switch. ACM SIGCOMM Computer Communication Review, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. B. Braga, M. Mota, P. Passito, et al. Lightweight ddos flooding attack detection using nox/openflow. In Proceedings of the 2010 IEEE 35th Conference on Local Computer Networks (LCN'10), pages 408--415. IEEE, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. S. K. Fayazbakhsh, L. Chiang, V. Sekar, M. Yu, and J. C. Mogul. Enforcing network-wide policies in the presence of dynamic middlebox actions using flowtags. In NSDI'14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. H. Hu, G.-J. Ahn, and K. Kulkarni. FAME: a firewall anomaly management environment. In SafeConfig'10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. H. Hu, G.-J. Ahn, and K. Kulkarni. Detecting and resolving firewall policy anomalies. IEEE Transactions on Dependable and Secure Computing, 9(3):318--331, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Ioannidis, A. D. Keromytis, S. M. Bellovin, and J. M. Smith. Implementing a distributed firewall. In CCS'00. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. P. Kazemian, M. Chang, H. Zeng, G. Varghese, N. McKeown, and S. Whyte. Real time network policy checking using header space analysis. In NSDI'13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. P. Kazemian, G. Varghese, and N. McKeown. Header space analysis: static checking for networks. In NSDI'12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. A. Khurshid, X. Zou, W. Zhou, M. Caesar, and P. B. Godfrey. Veriflow: verifying network-wide invariants in real time. In NSDI'13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. D. Kreutz, F. Ramos, and P. Verissimo. Towards secure and dependable software-defined networks. In HotSDN'13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. H. Mai, A. Khurshid, R. Agarwal, M. Caesar, P. Godfrey, and S. T. King. Debugging the data plane with anteater. In SIGCOMM'11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner. Openflow: enabling innovation in campus networks. ACM SIGCOMM Computer Communication Review, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. S. A. Mehdi, J. Khalid, and S. A. Khayam. Revisiting traffic anomaly detection using software defined networking. In RAID'11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. C. Monsanto, J. Reich, N. Foster, J. Rexford, and D. Walker. Composing software-defined networks. In NSDI'13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. P. Porras, S. Shin, V. Yegneswaran, M. Fong, M. Tyson, and G. Gu. A security enforcement kernel for openflow networks. In HotSDN'12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. M. Reitblatt, N. Foster, J. Rexford, C. Schlesinger, and D. Walker. Abstractions for network update. In SIGCOMM'12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. E. E. Schultz. A framework for understanding and predicting insider attacks. Computers & Security, 21(6):526--531, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. S. Shin, V. Yegneswaran, P. Porras, and G. Gu. Avant-guard: scalable and vigilant switch flow management in software-defined networks. In CCS'13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. S. Shirali-Shahreza and Y. Ganjali. Flexam: Flexible sampling extension for monitoring and security applications in openflow. In HotSDN'13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. R. Stoenescu, M. Popovici, L. Negreanu, and C. Raiciu. Symnet: static checking for stateful networks. In HotMiddlebox'13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. J. Wang, Y. Wang, H. Hu, Q. Sun, H. Shi, and L. Zeng. Towards a security-enhanced firewall application for openflow networks. In Cyberspace Safety and Security, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  26. L. Yuan, H. Chen, J. Mai, C. Chuah, Z. Su, P. Mohapatra, and C. Davis. Fireman: A toolkit for firewall modeling and analysis. In 2006 IEEE Symposium on Security and Privacy. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. FLOWGUARD: building robust firewalls for software-defined networks

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          HotSDN '14: Proceedings of the third workshop on Hot topics in software defined networking
          August 2014
          252 pages
          ISBN:9781450329897
          DOI:10.1145/2620728

          Copyright © 2014 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 22 August 2014

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          HotSDN '14 Paper Acceptance Rate50of114submissions,44%Overall Acceptance Rate88of198submissions,44%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader