127
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      scite_
       
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Security Challenges and Solutions in SD-WAN Deployments

      Preprint
      In review
      research-article
        1 , , 2 , 3 , 2
      ScienceOpen Preprints
      ScienceOpen
      Bookmark

            Abstract

            Abstract

            Enterprise wide area network (WAN) is a private network that connects the computers and other devices across an organisation’s branch locations and the data centers. It forms the backbone of enterprise communication. Currently, multiprotocol label switching (MPLS) is commonly used to provide this service. As a recent alternative to MPLS, software-defined wide area networking (SDWAN) solutions are being introduced as an IP based cloud-networking service for enterprises. SD-WAN virtualizes the networking service and eases the complexity of configuring and managing the enterprise network by moving these tasks to software and a central controller. The introduction of new technologies causes concerns about their security. Also, this new solution is introduced as a replacement for MPLS, which has been considered secure and has been in use for more than 16 years. Thus, there is a need to analyze the security of SDWAN, which is the goal of this thesis.

            In this thesis, we perform a security analysis of a commercial SD-WAN solution, by finding its various attack surfaces, associated vulnerabilities and design weaknesses. We choose Nuage VNS, an SD-WAN product provided by Nuage Networks, as the analysis target. As a result, many attack surfaces and security weaknesses were found and reported, especially in the Customer Premises Equipment (CPE). In particular, we found vulnerabilities in the CPE’s secure bootstrapping method and demonstrated some attacks by exploiting them. Finally, we propose mitigation steps to avoid the attacks.

            The results of this thesis will help both the service provider and the SD-WAN solution vendor to know about the attack surfaces and weaknesses of SD-WAN before offering it to their customers. We also help in implementing the temporary countermeasures to mitigate the attacks. The results have been presented to the service provider and the vendor of the SDWAN product.

            Content

            Author and article information

            Journal
            ScienceOpen Preprints
            ScienceOpen
            28 February 2024
            Affiliations
            [1 ] Sheffield Hallam University , Sheffield , South Yorkshire , United Kingdom;
            [2 ] Austin peay State University;
            [3 ] Indianna UNiversity ;
            Author notes
            Author information
            https://orcid.org/0009-0003-8754-0754
            https://orcid.org/0009-0000-9832-879X
            https://orcid.org/0009-0007-3428-4442
            https://orcid.org/0009-0001-0866-7649
            Article
            10.14293/PR2199.000729.v1
            a6cb3283-889a-40af-88aa-e53fe5ce9bba

            This work has been published open access under Creative Commons Attribution License CC BY 4.0 , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Conditions, terms of use and publishing policy can be found at www.scienceopen.com .

            History
            : 28 February 2024
            Categories

            Data sharing not applicable to this article as no datasets were generated or analysed during the current study.
            Security & Cryptology

            Comments

            Comment on this article