Fuzzing on the Openflow Protocol

Sébastien Coorevits 1, 2
1 MADYNES - Management of dynamic networks and services
Inria Nancy - Grand Est, LORIA - NSS - Department of Networks, Systems and Services
Abstract : This internship had for purpose to create a fuzzer for the openflow protocol. At first I had to document, and correct (if possible) the bugs, the OFTest framework so we could monitore and verify the state of the switch after the fuzzing. During the internship I also had to search in detail the origin of an issue concernint the matching on Ethernet source addresses. It turned out that this issue was due to the device and not the software thus reducing the impact. Final tests of the fuzzing were not really meaningfull as the switch is systematically blocking the connection if the messages are too different from standard Openflow mesages or if there is too much information and that it is not capable of treating it. However after the test, the switch go back to his normal behaviour, and no anomaly could be found.
Type de document :
Mémoires d'étudiants -- Hal-inria+
Networking and Internet Architecture [cs.NI]. 2016
Liste complète des métadonnées

Littérature citée [2 références]  Voir  Masquer  Télécharger

Contributeur : Jérôme François <>
Soumis le : mardi 25 octobre 2016 - 22:54:28
Dernière modification le : jeudi 11 janvier 2018 - 06:25:23



  • HAL Id : hal-01386939, version 1



Sébastien Coorevits. Fuzzing on the Openflow Protocol . Networking and Internet Architecture [cs.NI]. 2016. 〈hal-01386939〉



Consultations de la notice


Téléchargements de fichiers