SDN Pen Test
A significant attack that happens on the control plane of the Software-Defined Network architecture. An intruder imperils the SDN controller, fabricates fake network data and launches other attacks on the complete network.
The network factors at the data plane is the victim of this offence. Timing data, such as the new network connection takes to establish, can inform an adversary if a flow rule exists.
Denial of Service (DoS) Attacks
The most common attacks and affects all sectors of the SDN. By applying a DoS, an antagonist could cause the reduction or entire disruption of SDN services.
ARP Spoofing Attack
A Man-in-the-middle attack (MiTM) or ARP cache-poisoning. A malicious intruder uses an ARP spoofing to infiltrate the network, sniff packets, transform it and even halt it. It corrupts the network topology data and the topology-aware SDN apps. Protocols such as LLDP or IGMP are other attack-vectors
The APIs of a software element might hold vulnerabilities that allow a hacker to perform an unapproved disclosure of data. API exploitation happens at the northbound interface and may direct to the disruption of network flows.
A sniffing denunciation is a conventional technique used by the hacker to catch and examine network communication data. Eavesdrop data from network links and steal valuable information. Exploiting unencrypted communications to intercept traffic from and to a central controller. The data occupied could incorporate critical knowledge on flows or transport recognised on the network.