Show simple item record

dc.contributor.authorWeintraub, Ben
dc.contributor.authorKim, Jiwon
dc.contributor.authorTao, Ran
dc.contributor.authorNita-Rotaru, Cristina
dc.contributor.authorOkhravi, Hamed
dc.contributor.authorTian, Dave (Jing)
dc.contributor.authorUjcich, Benjamin
dc.date.accessioned2025-01-28T13:45:00Z
dc.date.available2025-01-28T13:45:00Z
dc.date.issued2024-12-02
dc.identifier.isbn979-8-4007-0636-3
dc.identifier.urihttps://hdl.handle.net/1721.1/158083
dc.descriptionCCS ’24, October 14–18, 2024, Salt Lake City, UT, USAen_US
dc.description.abstractIntent-based networking (IBN) enables network administrators to express high-level goals and network policies without needing to specify low-level forwarding configurations, topologies, or protocols. Administrators can define intents that capture the overall behavior they want from the network, and an IBN controller compiles such intents into low-level configurations that get installed in the network and implement the desired behavior. We discovered that current IBN specifications and implementations do not specify that flow rule installation orderings should be enforced, which leads to temporal vulnerabilities where, for a limited time, attackers can exploit indeterminate connectivity behavior to gain unauthorized network access. In this paper, we analyze the causes of such temporal vulnerabilities and their security impacts with a representative case study via the ONOS IBN implementation. We devise the Phantom Link attack and demonstrate a working exploit to highlight the security impacts. To defend against such attacks, we propose Spotlight, a detection method that can alert a system administrator of risky intent updates prone to exploitable temporal vulnerabilities. Spotlight is effective in identifying risky updates using realistic network topologies and policies. We show that Spotlight can detect risky updates in a mean time of 0.65 seconds for topologies of over 1,300 nodes.en_US
dc.publisherACM|Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Securityen_US
dc.relation.isversionofhttps://doi.org/10.1145/3658644.3670301en_US
dc.rightsCreative Commons Attributionen_US
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/en_US
dc.sourceAssociation for Computing Machineryen_US
dc.titleExploiting Temporal Vulnerabilities for Unauthorized Access in Intent-based Networkingen_US
dc.typeArticleen_US
dc.identifier.citationCCS ’24, October 14–18, 2024, Salt Lake City, UT, USAen_US
dc.contributor.departmentLincoln Laboratoryen_US
dc.identifier.mitlicensePUBLISHER_CC
dc.eprint.versionFinal published versionen_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dc.date.updated2025-01-01T08:48:51Z
dc.language.rfc3066en
dc.rights.holderThe author(s)
dspace.date.submission2025-01-01T08:48:51Z
mit.licensePUBLISHER_CC
mit.metadata.statusAuthority Work and Publication Information Neededen_US


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record