Ambusher: Exploring the Security of Distributed SDN Controllers Through Protocol State Fuzzing

📅 2025-10-17
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Distributed SDN controllers are widely deployed in wide-area networks (e.g., SD-WAN), yet their protocol-level security vulnerabilities remain systematically unassessed. To address this gap, we propose a state-aware fuzzing methodology tailored for distributed SDN controller protocols. Our approach first performs reverse engineering of distributed systems and infers protocol state machines to construct a lightweight, unified state model; it then leverages this model to guide efficient, scalable, state-directed fuzzing—overcoming the fundamental limitation of conventional fuzzing in modeling multi-node collaborative states. Evaluated in a real-world SD-WAN environment spanning two campus networks and one enterprise network, our method uncovered six previously unknown protocol-level vulnerabilities. This work establishes the first automated security assessment framework for distributed control planes that supports complex, inference-based state modeling—demonstrating both practical efficacy and broad applicability.

Technology Category

Application Category

📝 Abstract
Distributed SDN (Software-Defined Networking) controllers have rapidly become an integral element of Wide Area Networks (WAN), particularly within SD-WAN, providing scalability and fault-tolerance for expansive network infrastructures. However, the architecture of these controllers introduces new potential attack surfaces that have thus far received inadequate attention. In response to these concerns, we introduce Ambusher, a testing tool designed to discover vulnerabilities within protocols used in distributed SDN controllers. Ambusher achieves this by leveraging protocol state fuzzing, which systematically finds attack scenarios based on an inferred state machine. Since learning states from a cluster is complicated, Ambusher proposes a novel methodology that extracts a single and relatively simple state machine, achieving efficient state-based fuzzing. Our evaluation of Ambusher, conducted on a real SD-WAN deployment spanning two campus networks and one enterprise network, illustrates its ability to uncover 6 potential vulnerabilities in the widely used distributed controller platform.
Problem

Research questions and friction points this paper is trying to address.

Investigates security vulnerabilities in distributed SDN controller protocols
Develops fuzzing tool to discover attack surfaces in SD-WAN systems
Addresses inadequate attention to distributed controller security risks
Innovation

Methods, ideas, or system contributions that make the work stand out.

Protocol state fuzzing for vulnerability discovery
Inferred state machine enabling systematic attack scenarios
Novel methodology for efficient state-based fuzzing
🔎 Similar Papers
No similar papers found.
J
Jinwoo Kim
School of Software at Kwangwoon University, Seoul, South Korea
Minjae Seo
Minjae Seo
KAIST
AI SecurityNetwork Security
Eduard Marin
Eduard Marin
Senior Research Scientist and Team Lead at Telefonica Research
NetworksSystemsCloud ComputingSecurityCTI
S
Seungsoo Lee
Department of Computer Science & Engineering at Incheon National University, Incheon, South Korea
J
Jaehyun Nam
Department of Computer Engineering at Dankook University, Yongin, Gyeonggi-do, South Korea
S
Seungwon Shin
School of Electrical Engineering at KAIST, Daejeon, South Korea