Fuzzing on the Openflow Protocol

Sébastien Coorevits 1, 2
1 MADYNES - Management of dynamic networks and services
Inria Nancy - Grand Est, LORIA - NSS - Department of Networks, Systems and Services
Abstract : This internship had for purpose to create a fuzzer for the openflow protocol. At first I had to document, and correct (if possible) the bugs, the OFTest framework so we could monitore and verify the state of the switch after the fuzzing. During the internship I also had to search in detail the origin of an issue concernint the matching on Ethernet source addresses. It turned out that this issue was due to the device and not the software thus reducing the impact. Final tests of the fuzzing were not really meaningfull as the switch is systematically blocking the connection if the messages are too different from standard Openflow mesages or if there is too much information and that it is not capable of treating it. However after the test, the switch go back to his normal behaviour, and no anomaly could be found.
Document type :
Master thesis
Complete list of metadatas

Cited literature [2 references]  Display  Hide  Download

https://hal.inria.fr/hal-01386939
Contributor : Jérôme François <>
Submitted on : Tuesday, October 25, 2016 - 10:54:28 PM
Last modification on : Tuesday, February 5, 2019 - 2:46:01 PM

Identifiers

  • HAL Id : hal-01386939, version 1

Collections

Citation

Sébastien Coorevits. Fuzzing on the Openflow Protocol . Networking and Internet Architecture [cs.NI]. 2016. ⟨hal-01386939⟩

Share

Metrics

Record views

199

Files downloads

432