There are many demands in the industry to improve services in a more agile environment and find more cost-effective solutions. With virtualization and the popularization of cloud computing, technology is advancing. When developing products running on virtualized platforms, it is critical to capture network traffic using mirroring for debugging, troubleshooting, and lawful interception functionality. For products running on virtualized platforms, certain network traffic does not leave the server, so it is necessary to mirror the network traffic on the virtualized network equipment.
Software Defined Networks (SDN) automate network systems and make networks more programmable, making packet routing more flexible. SDN technology enables centralized mirroring management of both hardware network devices and virtualized network devices. This simplifies mirroring management as well as overall network management even in large setups. The thesis shows how to set up a traffic mirroring system, as one of the examples of the use of software defined networks. This solution uses network switches with a controller that allows easier and more dynamic configuration of the system for packet monitoring and analysis.
There are security concerns with SDN because virtualizing the network infrastructure increases potential attack vectors. The controller, as the central decision point, is usually the primary target of attackers. Because of this centralized design of SDN, compromising the security of a controller is tantamount to compromising the security of the entire network. The implementation of security is necessary for the smooth operation of the network and the provision of the traffic mirroring function.
In the master's thesis, we reviewed the field of existing technologies, security requirements, and vulnerabilities in the SDN network. We investigated various threats and security issues of the OpenDaylight controller. Using practical examples, we evaluated possible attacks on the controller and how these affect the provision of the traffic mirroring function. Finally, we identified the attacks and suggested techniques to protect against the attacks.