Slide 1

Slide 1 text

Resilient SDN Controllers Arun Sood, PhD Prof Computer Science, Dir International Cyber Center, GMU Founder CEO SCIT Labs Shahid N. Shah CEO Netspective Communications All Rights Reserved - SCIT Labs Confidential and Proprietary

Slide 2

Slide 2 text

Application Application Application Application Controller Management Monitoring APIs SDN Devices Application Layer Control Layer Infrastructure Layer SDN Architecture 2

Slide 3

Slide 3 text

SDN Security Threat Vectors 3 • Insert forged traffic • Communication paths • Network device vulnerabilities • Device logs • Controller vulnerabilities

Slide 4

Slide 4 text

SDN Controllers 4 • Centralized or Distributed • Potential for single point of failure • Physical access • Static systems • Monitoring and remote access • Software driven - vulnerable to attack

Slide 5

Slide 5 text

Breaches in the News • South Carolina Department of Revenue: 33 malwares were used to attack 44 systems – 75 GB lost; 3.8 M individual and >699K business tax returns; remediation cost estimated at $19 million • Target: False positives overwhelmed the security team – 40 million credit debit card info stolen; $236 million in expenses • Home Depot: Zero day attack – customized malware was not detected – 56 M cards stolen over five months. Cost $62 million • Reactive Security works some of the time. Remediation costs are high

Slide 6

Slide 6 text

Cyber Threat Observations I. Intrusions are inevitable. Most breaches discovered by third parties II. Malware installed. Intruders stay in systems for days, weeks, months III. Current servers are “sitting ducks” 6

Slide 7

Slide 7 text

7 IDS, Firewall, IPS Monitoring High Losses Low High Intruder Residence Low Manual Reimage Resilience Automated Restoration Losses vs Intruder Residence 7 Perfect Software White Listing

Slide 8

Slide 8 text

Cyber Resilience 8 • Typical requirements – Continuity of operations – Meet mission requirements – Limited degradation of performance • Operational requirement for threat deterrence – Restoration to pristine uncontaminated state

Slide 9

Slide 9 text

Risk Management Approach Cyber Risk = Threats x Vulnerabilities x Consequences Focus on Consequence Management Resilience through seamless recovery User trade-off: compute cycles vs cyber risk (exposure)

Slide 10

Slide 10 text

10 Cyber Kill Chain

Slide 11

Slide 11 text

Resilience Approach: Self Cleansing Intrusion Tolerance Restoration & Moving Target Defense – How it works 11

Slide 12

Slide 12 text

Constantly Restore Server Integrity 12

Slide 13

Slide 13 text

Additional Advantages of Resilience & Restoration Approach 13 Security • Reduce data ex-filtration losses – Disconnect from malicious site – Rate modulation on outgoing data • IT Early warning • Respond to high threat intensity • Software whitelist on steroids • Reduce SOC ticket response time • Recovery • Forensic System & Network Management • Operational Resilience – No memory leaks – Apply hot patches – no server reboot required – Quick recovery from bad patch – Better manage the level of testing required • Configuration management • Automatically replace compromised VMs • Supports disaster recovery

Slide 14

Slide 14 text

Cyber Security Solution Properties 14 • Accuracy • Speed • Agility • Automation • Defender workload vs Attacker workload

Slide 15

Slide 15 text

Conclusion 15 • SDN security requires a resilience approach • SDN controller needs particular focus – Static implementations lead to asymmetric advantage for attacker – Successful persistent attacks can damage the network • SDN transactions are short – enables automated restoration • Cost of computer cycles is falling - supports a restoration strategy

Slide 16

Slide 16 text

PROACTIVE CYBER ATTACK DEFENSE 6 issued US patents (2009 – 2013) http://scitlabs.com/en/download/videos Arun Sood, Ph.D. [email protected] 16

Slide 17

Slide 17 text

Architects & Engineers for next generation networks http://www.Netspective.com Shahid N. Shah @ShahidNShah http://www.ShahidShah.com 17