Internet DRAFT - draft-li-sfc-security-mimicry-defense
draft-li-sfc-security-mimicry-defense
SFC C. Li
Internet-Draft Z. Tang
Intended status: Informational C. Chen
Expires: October 2, 2021 Zhejiang Gongshang University
March 31, 2021
SFC Security Mimicry Defense
draft-li-sfc-security-mimicry-defense-00
Abstract
With the increase of network threats, the Service Function Chain
(SFC) is vulnerable to various attacks, and as a key component of the
entire SFC, the security of the service function (SF) is more
critical. This document proposes a mimic SF security architecture
based on the dynamic heterogeneous redundancy model, which can
effectively protect the normal execution function of SF in SFC. The
security architecture adopts an active defense method to defend
against network attacks, and it can effectively defend against most
SF attacks.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on October 2, 2021.
Copyright Notice
Copyright (c) 2021 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
Li, et al. Expires October 2, 2021 [Page 1]
Internet-Draft Security Mimicry Defense March 2021
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 2
3. Security issues of SFC . . . . . . . . . . . . . . . . . . . 3
3.1. Tamper with Network Service Header . . . . . . . . . . . 3
3.2. Attack Service Function . . . . . . . . . . . . . . . . . 3
4. SFC Security Mimicry Defense . . . . . . . . . . . . . . . . 4
4.1. Mimicry Defense . . . . . . . . . . . . . . . . . . . . . 4
4.2. SFC Mimicry Defense Architecture . . . . . . . . . . . . 5
4.3. Data Flow . . . . . . . . . . . . . . . . . . . . . . . . 6
4.4. Analysis of Attack and Defense . . . . . . . . . . . . . 7
5. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 8
6. References . . . . . . . . . . . . . . . . . . . . . . . . . 8
6.1. Normative References . . . . . . . . . . . . . . . . . . 8
6.2. Informative References . . . . . . . . . . . . . . . . . 9
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 9
1. Introduction
SF is the most critical part of the entire SFC. The data flow in the
SFC domain must go through specific SFs to complete a specific
function. If the SF is controlled by the hacker, the hacker can
tamper with and discard the data by the hijacked SF, and even
paralyze the SFF by DOS attacks. It can not only result in the
failure of specified functioning when operating SF, but it may also
cause the collapse of the entire SFC domain, which completely
violates the original intention of SFC.
This document describes a mimic security architecture based on
Dynamic Heterogeneous Redundancy Model (DHRM), adopting a proactive
defense method to deal with the SFC security problems mentioned
above.
2. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
Li, et al. Expires October 2, 2021 [Page 2]
Internet-Draft Security Mimicry Defense March 2021
3. Security issues of SFC
3.1. Tamper with Network Service Header
[RFC8300] points out that the NSH (Network Service Header) is the SFC
encapsulation referenced in [RFC7665].NSH contains path
identification information to implement service paths. Metadata
information is also included which enables service functions to share
initial and intermediate classification results with downstream
service functions. NSH provides functions to monitor and
troubleshoot the SFC.
[RFC8300]mentions three methods of protecting NSH headers: SFF / SF
NSH Verification, Transport Security, NSH Variable Header-Based
Integrity.
However, the above three methods cannot solve the NSH tampering
problem effectively. If a hacker cracks the encryption mode of NSH
and obtained the permission successfully to change the header of a
certain SF, the hacker can change the NSH information, and the data
is therefore discarded when returns to SFF without finding the
mapping relationship. While in practical applications, it is
impossible for each SFF to belong to only a specific SFC. Thus, if a
hacker obtains the mapping relationship in the SFF, the hacker can
change the NSH information to make the packet taking another SFC
path, and the control plane cannot detect it. By changing the
metadata information, the hacker can even make all devices in the SFC
domain reach a wrong consensus.
3.2. Attack Service Function
If a hacker attacks the SF directly and successfully controls the SF,
obtaining all the permissions of the SF, the hacker can manipulate
the SF arbitrarily. SFC domain may leads to the following damage.
a. The packets passing through the SF may be tampered with,
discarded, or even diverted to the hacker server, thereby
intercepting the effective information in the network traffic.
For example, a hacker can tamper with the data fields of all data
packets flowing through the SF.
b. This will cause all the packets in the SFC domain that pass the
SF to be finally sent to the destination host with incorrect
information. Even if the destination host finds an error and
discards the packet, it will cause the waste of bandwidth and
normal SF resources.
Li, et al. Expires October 2, 2021 [Page 3]
Internet-Draft Security Mimicry Defense March 2021
c. The attacker can directly change the functions completed by the
SF, which is difficult to detect. Assuming that the firewall
function is to filter useful information, and due to the unknown
information that the firewall need to filter in the control
level, it seems that the firewall still completes the filtering
function, actually, it is the useful packet which is filtered.
Even if it notices a lot of information that should not be
present in the SFC, it is not easy to locate which specific part
has been attacked.
4. SFC Security Mimicry Defense
This document designs a mimic SF defense architecture based on a
Dynamic Heterogeneous Redundancy Model (DHRM). This framework
ensures the security of SF by setting up an SF executive pool
composed of M heterogeneous SFs, and the control plane manages the SF
executive pool. Assuming that the decision algorithm is perfectly
performed without any wrong outcome, the SF will be offline and
cleaned by the control plane once the execution result of the SF is
wrong, The following sub-chapter illustrates the architecture and
mimic defense process specifically.
4.1. Mimicry Defense
The mimic defense technology is an active defense strategy proposed
against the serious asymmetry of the defense cost and attack cost of
cyberspace. The redundancy and heterogeneity of the executive body
are introduced to change the unity and similarity of the system, and
the dynamic and randomness are adopted to change the stativity and
certainty of the system, and the non-similar redundancy space is used
to block or disrupt the network attack to meet the requirements of
controllable system security risks.
Specifically, the mimic security defense is composed of executive
bodies with equivalent functions but different composition structures
to form the core function. Based on the DHRM, randomness and
dynamicity are realized, and the heterogeneous executive bodies in
the heterogeneous executive pool are continuously changing, which
greatly improves the dynamics and uncertainty of functional
representation. It makes it difficult for a hacker to detect the
behavior and characteristics of the target system, increasing the
complexity of the system, and also makes it difficult for hackers to
exploit system vulnerabilities to make effective attacks.
The DHRM is the basic model of mimic defense. Heterogeneity is the
foundation of the dynamic heterogeneous redundancy architecture. It
is necessary to ensure that each heterogeneous executive has the
greatest difference in various characteristics and attributes. The
Li, et al. Expires October 2, 2021 [Page 4]
Internet-Draft Security Mimicry Defense March 2021
more heterogeneous attributes a heterogeneous executor has, the more
loopholes it can defend, and the higher the cost and price an
attacker will have to pay for an attack. Dynamicity means that
different sets of heterogeneous actuators can be generated in
different periods to replace the currently compromised set of
heterogeneous actuators. Dynamicity makes the system present
different characteristics to the outside world in different periods.
This brings uncertainty to the attacker's attack, which will further
increase the difficulty of the attacker's attack. Redundancy means
that multiple heterogeneous executors which have the same function
process the same business request. The collaborative work between
the heterogeneity and redundancy realizes the change of the single
environment on which the attack depends, increasing the attacker's
attack cost and difficulty, and improving the security and
reliability of the system. This concept was first proposed in 2013
and has been effectively applied in the field of cyberspace security,
such as mimic routers, mimic web servers, mimic DNS, mimic workflow
execution system, mimic blockchain, etc. In addition, some mimic
network devices have been produced and tested successfully.
4.2. SFC Mimicry Defense Architecture
+---------------------------------------------------------------------+
| Control Plane |
+---------------------------------------------------------------------+
| | | | |
| | +=====================+ |+======================+
| | | Mimetic Control | || Mimetic Control |
| | | Plugin | || Plugin |
| | |+--------+ +--------+| || +--------+ +--------+|
| | ||Schedule| |Decision|| || |Schedule| |Decision||
| | || Module | | Module || || | Module | | Module ||
| | |+--------+ +--------+| || +--------+ +--------+|
| | +=====================+ |+======================+
| | | | | | |
| | | | | | |
| | | +-------------+ | | +--------------+
| | | |Heterogeneous| | | |Heterogeneous |
| | | | SF Executive| | | | SF Executive |
| | | | Pool | | | | Pool |
| | | +-------------+ | | +--------------+
| | | | | | |
| | | | | | |
+-----+ +----------+ +-----------+ +----------------+ +------+
|Users|-|Classifier|--| SFF1 | ......| SFFn |--|Target|
+-----+ +----------+ +-----------+ +----------------+ +------+
Figure 1: SFC Mimicry Defense Architecture
Li, et al. Expires October 2, 2021 [Page 5]
Internet-Draft Security Mimicry Defense March 2021
The detailed system architecture is shown in Figure 1. For a better
understanding, it is assumed that the system has a single SFC
(including the host, SFF, SF, and independent servers with other
modules, each SF connected to an SFF) and a single control plane.
The system architecture contains 05 components as follows:
Control plane defines the SFC in the network. The control plane
installs the flow rules in the SFF, and delivers the classification
strategy to the classifier based on the information uploaded by the
classifier. According to the judgment result, the abnormal SF
executor is cleaned and be offline, and the next SFF in the SFC is
notified that data is coming when the data passes through the SFF.
Mimic control plug-in: composed of 02 modules.
a. Scheduling module: accept the running instruction of the control
plane, select N SF executives from the SF executive pool to
activate by using the scheduling algorithm.
b. Judgment module: Judge the execution result of the SF executive
body, and randomly select one from the correct results and send
it to the SFF. If an abnormal SF executor is judged, the
abnormal information will be transmitted to the control plane.
SF executive body pool: it consists of M heterogeneous SF executive
bodies, and N of them are activated by the scheduling module every
time when data passes.
SFF: forward the data according to the NSH information, copy the
packet into N copies and send the information to activate the
scheduling module.
Classifier: send the packet information to the control plane, and add
the corresponding NSH to the packet according to the classification
strategy issued by the control plane.
4.3. Data Flow
+-----+ +----------+ +----+ +----+ +----+ +------+
|Users|--|Classifier|--|SFF1|-----|SFF2| ......|SFFn|--------|Target|
+-----+ +----------+ +----+ +----+ +----+ +------+
| | |
| | |
+-----+ +-----+ +-----+
| SF1 | | SF2 | | SFn |
+-----+ +-----+ +-----+
Figure 2: SFC Use Case
Li, et al. Expires October 2, 2021 [Page 6]
Internet-Draft Security Mimicry Defense March 2021
Take the SFC in Figure 2 as an example, we assume that the packet
path is the source host-classifier-SFF1-SF1-SFF1-SFF2-SF2 ...- target
host. The data first reaches the classifier before entering the SFC
domain, and the classifier sends the data information to the control
plane. The controller sends a classification strategy to the
classifier based on the uploaded information, then the classifier
adds NSH to the data packet according to the strategy and forwards
the data packet to SFF1 based on the header information. When the
data arrives at SFF1, we need to judge whether the data packet needs
to go through SF1 according to the NSH of the data packet.
When the packet reaches SFF1 for the first time, it should be
forwarded to SF. Therefore, SFF1 first sends a running instruction
to the scheduling module. After the scheduling module receives the
instruction, it uses a scheduling algorithm to select N activations
from the SF executive pool. Then, the information for activating the
SF actuator is forwarded to SFF1. SFF1 copies the packet into N
copies and sends the data to N SF actuators according to the
information provided by the scheduling module. Each SF performs its
designated network function and sends the execution result to the
decision module. After the judgment module accepts the execution
result, it judges whether there is an abnormal SF executive body by
using a judgment algorithm. If there is an abnormal execution body,
the abnormal information is sent to the control plane, and the
abnormal SF will be cleaned and offline by the control plane, then
the decision module selects one from the correct results and sends it
to SFF1. If there is no abnormal execution body, it will directly
select one from the correct results and send it to SFF1. SFF1 judges
whether to forward to SF1 according to the NSH of the returned
packet.
In this case, the packet should be forwarded to SFF2. After the
packet reaches SFF2, the same judgment and operation are performed
until it leaves the SFC domain.
4.4. Analysis of Attack and Defense
The SF executive pool is the foundation of the security of this
framework. By configuring M heterogeneous SF execution bodies to
form an SF execution body pool and using a scheduling algorithm to
select N activation methods from the M SF execution bodies to improve
the heterogeneity and dynamicity of the architecture, which increases
the difficulty of the hacker's attacks. Assuming that the packet
path is the source host-classifier-SFF1-SF1-SFF1-SFF2-SF2 ...- target
host. For a traditional SFC, if a hacker hijacks SF1, it can
manipulate SF1 to tamper with NSH so that traffic cannot reach SFF2.
Furthermore, if the attacker intercepts the mapping table of SFF2,
the hacker can tamper with the NSH header to make the traffic go
Li, et al. Expires October 2, 2021 [Page 7]
Internet-Draft Security Mimicry Defense March 2021
through a completely different SFC link. Any device in the SFC
domain, including the controller, will not find any abnormalities. A
hacker can also directly tamper with the service functions of SF, for
instance, the original SF performs load-balancing function. The
hacker can tamper with all the data to the same link, which may
paralyze the entire link.
If the security framework of this document is adopted, first, during
the SF attack detection phase, the hacker will find that there are M
SFs with the same function but different operating environments and
hardware devices mounted under the same SFF, which has caused certain
difficulty for the attack. If the hacker successfully controls one
SF executive in the M SF executive pool under SFF2. Before the data
is forwarded from the control module to the SF executive body, the
scheduling module uses a scheduling algorithm to activate N of the M
SF executive bodies. When M and N differ greatly, the probability of
selecting an abnormal SF execution body by random scheduling is
extremely low. It is further assumed that even if an abnormal
executor is selected, no matter whether the attacker tampers with the
packet or data function in the controlled SF executor, the decision
module can judge the exception when it judges the N execution
results, it can select the correct result and send abnormal
information to the control module for offline processing. Unless the
hacker successfully attacks more than half of the SF execution
bodies, the attack can be completely successful. While development
vendors and hardware equipment are different in different SFs
operating environment, which will cause great difficulty to the
hacker.
In another case, after the packet arrives at SFF1, it is not
forwarded to SF to complete the specified function but directly
forwarded to SFF2. When the packet arrives at SFF2, SFF2 will infer
from the NSH's SPI and SI information that the packet do not pass the
specified function in the previous SFF, and then report an error to
the control plane.
5. Acknowledgements
Thanks to Lei Rui and Chen Zebin for the first draft.
6. References
6.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>.
Li, et al. Expires October 2, 2021 [Page 8]
Internet-Draft Security Mimicry Defense March 2021
[RFC8300] Quinn, P., Ed., Elzur, U., Ed., and C. Pignataro, Ed.,
"Network Service Header (NSH)", RFC 8300,
DOI 10.17487/RFC8300, January 2018,
<https://www.rfc-editor.org/info/rfc8300>.
6.2. Informative References
[RFC7665] Halpern, J., Ed. and C. Pignataro, Ed., "Service Function
Chaining (SFC) Architecture", RFC 7665,
DOI 10.17487/RFC7665, October 2015,
<https://www.rfc-editor.org/info/rfc7665>.
Authors' Addresses
Chuanhuang Li
Zhejiang Gongshang University
18 Xuezheng Str., Xiasha University Town
Hangzhou 310018
P.R.China
Phone: +86 571 28877723
Email: chuanhuang_li@zjsu.edu.cn
Zhongyun Tang
Zhejiang Gongshang University
18 Xuezheng Str., Xiasha University Town
Hangzhou 310018
P.R.China
Phone: +86 571 28877723
Email: tangzy@zjsu.edu.cn
Chao Chen
Zhejiang Gongshang University
18 Xuezheng Str., Xiasha University Town
Hangzhou 310018
P.R.China
Phone: +86 571 28877723
Email: eckio_491@zjgsu.edu.cn
Li, et al. Expires October 2, 2021 [Page 9]