Friday 24 April 2015

Discussion: Researching SDN and zero-day network attacks

The area surrounding SDN and zero-day network attacks is almost limitless, in regards its scope for future developments and improvements. Research to date only scratches the surface of this technology and its possibilities for the world’s future networks. It is my belief that creating a technology that would solve such issues would also have a significant market value. Bringing a project of developing this concept to the next stage would require a team of both researchers and software developers, along with full access to an adequate functional test bed.

To justify this it must be considered that in order to develop this software it must be fully understood, and extensively tested. The threat surface in our network infrastructures is constantly changing and to defend against an unknown threat quantity such as a zero day network attack many different approaches and attack methods need to be examined. It is my belief that SDN has all of the qualities needed to maintain and protect the networks of the future. It is also my belief that after researching the technology SDN also poses many new security obstacles that need to be further addressed.

The centralized controller architecture in my belief is an architecture that may need to be reexamined, as a single point of failure in a corporate network is not an acceptable risk factor. This however, should not be something to deter anyone from SDN it is simply an area that requires more attention in regards securing the environment and creating redundancy were the controller to go down.  During the course of this studying this technology it also came to my attention that the area of zero day attacks could not be defined to a specific attack method and therefore this area alone requires extensive research. It is proposed future projects should be split into three defined research modules.
  
 1)  The first module would be to extensively research past and present zero-day network attacks and endeavor to discover small similarities. There is already an active community carrying out this research in the form of HP’s zero-day initiative which was established in 2005. This community actively reports, records and researches zero-day attacks. In understanding the many different types of zero-day network attacks, similarities in code may not be found but it may uncover similarities in construct. It would then be possible to match these similarities to normal network activity data and it may be possible to identify early warning methods for such attacks.

This type of approach would still not be enough to ensure that zero-day exploits would be discovered in real-time, in fact potential attackers would certainly change their exploits to avoid this detection. This research would however, lead researchers to learn more about how potential hackers operate and therefore give an insight into how they construct and target attacks. All of this information may be useless by itself but combined may paint a picture of attack locations, unique signatures, hardware weakness and possibly many more unforeseen traits. This type of data gathering may unearth a larger scope and highlight unseen trends.

This type of data gathering however will only be of use if gathered on a massive scale, this would require mass collaborating across the board among all parties involved in various research across this area. This type of open collaboration can only lead to more positive outcomes and would also help kindle the open source collaboration that the SDN platform is currently being built on. It is our belief that the only way to fight an unknown threat such as a zero-day network attack is to take such an approach, and by doing so in a shared forum, opens the door for many different outlooks and opinions on the best ways and methods to combat this.


2)      The second module of research would be to extensively test not the capabilities of SDN but its weaknesses. It is not possible to have a technology that will defend and protect against the threats of the future if its own weakness are not first exposed and reinforced. In my opinion the capabilities of SDN far extend the scope of current networking capabilities, however, new threat surfaces are also presented, these new threat surfaces need to be examined and challenged thoroughly before SDN can be extensively rolled out. By first securing the weakness of the technology its strengths can then be accessed. It is my opinion that the open source communities such as the OpenDaylight project will have a far greater chance to conquer these vulnerabilities through mass collaboration and innovation.

The unique way that SDN is designed will allows for much more fluid networking platforms. Corporations and Governments will be able to tailor their networks to meet the demands of their environments both in quality of service and security. Custom applications can be written to meet specific demands for data centers, and cities such as Bristol as it endeavors to make history as the world’s first SDN city. In my opinion the Open Bristol project will be the most interesting project as regards a live research bed especially in regards to security. This project alone may very well test the weaknesses and capabilities of SDN in ways that have not previously been considered and should be closely monitored and heavily documented. It is projects like this that will give researchers an opportunity to test the capabilities of SDN to defend against not only zero-day network attacks but all network related intrusions. In my opinion security professionals and researchers should be allowed full access to this project in a collaborative effort to create the most efficient and powerful networking tools and architectures for the future. To expose these weaknesses now will only allow for a stronger implementation of the architecture as it becomes more mainstream.             

3)      The third and final module for research should be a combination of both modules 1 & 2. Meaning that in order to utilize software defined networking to automate the defense against zero-day network attacks, the two areas must be thoroughly tested and examined first. It is my belief that SDN will provide the answers that are needed in this area, but the path that will lead to this solution must first be thoroughly examined. As previously stated, before SDN can protect the networks of the future it must first gain the ability to protect itself. This ability will only be gained by continuous research and testing in the area. It is my hope that this blog and other articles and papers on the area have opened the door for a more heated and wide spread discussion around the area of zero-day network attacks and SDN. It is also my hope that any future work in the area is carried out in an open and collaborative fashion allowing for many ideas and concepts to be exchanged in order to find fitting solutions.

It is very important to remember that with SDN the world is not limited to a one network fits all implementation, as every architecture can be custom tailored to the needs of that network. This flexibility alone will go a long way to mitigate attacks that were once exploited by attacking set network infrastructures and hardware. By diversifying these future networks there is a layer of complication added that is currently not present. Researchers need to focus on these changing elements to creatively implement and innovative solutions that can be fitted into future networks defense mechanisms. It is my belief that the capabilities of SDN may far exceed what was originally thought of this new architecture, and only future developments will show exactly what the power of SDN has to offer.


After identifying zero-day network attacks as a potential area that can theoretically be irradiated by the arrival of software defined networking, it is hoped that this blog and other discussions and papers on the are have highlighted this topic. It is my hope that if anything this type of discussion and research will open a debate surrounding SDN and zero-day network attacks. It is also my hope that this will highlight the need for more discussion about the vulnerabilities that exist in current SDN architectures. It is vitally important that these weaknesses first be addressed and amended before SDN can be considered as a mainstream opponent to current network infrastructures. A project like Bristol is Open marks a vital keystone in the growth of this area and will be of keen interest as it evolves and take its place in the history books of networking. It will only be as project like this one emerge and are tested by the threats of the outside world, will the true capabilities and weaknesses of SDN will be understood.


It has been identified that this technology has only evolved so quick because of the open source communities that have nurtured and contributed to its development. It is my opinion that this collaboration will be the best way to create sustainable security solutions into the future, as once quoted the journalist Mark Shields, “There is always strength in numbers. The more individuals or organizations that you can rally to your cause, the better”.  This is the type of mentality that needs to be adapted when approaching SDN as the only way to maintain reliability and security is to constantly challenge the capabilities of the technology. It is our belief that there is no better way of doing this than leaving this technology in the hands of open source communities such as the OpenDaylight Project or project Floodlight. These open communities will allow for the innovation and creative thinking that may otherwise be curtailed in a more profit driven environment.

If you would like to add to this discussion feel free to share your opinions below.   

1 comment:

  1. it was absolutely actual informative.I attending advanced in account added of your assignment post, And accomplish you abiding that i will bookmark your post how ever i can appear a back latter.Online lead generation

    ReplyDelete