Logical Partition Media Access Control Impostor Detector
First Claim
1. A method, comprising:
- establishing a plurality of cryptographically secure channels, each channel between a monitoring device and a monitored device of a plurality of monitored devices, each monitored device of the plurality of monitored devices associated with unique address;
transmitting a heartbeat from the monitoring device to a first monitored device of the plurality of monitored devices via a first secure channel, corresponding to the first monitored device, of the plurality of secure channels;
if a response to the heartbeat is received, transmitting a second heartbeat from the monitoring device to a second monitored device of the plurality of monitor devices via the first secure channel; and
if a response to the heartbeat is not received, executing a spoofing detection scheme, comprising;
transmitting a second heartbeat to the first monitored device via an address associated with a second monitored device;
receiving a response to the second heartbeat; and
determining that a spoofing attack has occurred by the fact that the response to the second heartbeat has been received.
1 Assignment
0 Petitions
Accused Products
Abstract
Provided are techniques for to enable a virtual input/output server (VIOS) to establish cryptographically secure signals with target LPARs to detect an imposter or spoofing LPAR. The secure signal, or “heartbeat,” may be configured as an Internet Key Exchange/Internet Protocol Security (IKE/IPSec) encapsulated packet (ESP) connection or tunnel. Within the tunnel, the VIOS pings each target LPAR and, if a heartbeat is interrupted, the VIOS makes a determination as to whether the tunnel is broken, the corresponding LPAR is down or a media access control (MAC) spoofing attach is occurring. The determination is made by sending a heartbeat that is designed to fail unless the heartbeat is received by a spoofing device.
-
Citations
25 Claims
-
1. A method, comprising:
-
establishing a plurality of cryptographically secure channels, each channel between a monitoring device and a monitored device of a plurality of monitored devices, each monitored device of the plurality of monitored devices associated with unique address; transmitting a heartbeat from the monitoring device to a first monitored device of the plurality of monitored devices via a first secure channel, corresponding to the first monitored device, of the plurality of secure channels; if a response to the heartbeat is received, transmitting a second heartbeat from the monitoring device to a second monitored device of the plurality of monitor devices via the first secure channel; and if a response to the heartbeat is not received, executing a spoofing detection scheme, comprising; transmitting a second heartbeat to the first monitored device via an address associated with a second monitored device; receiving a response to the second heartbeat; and determining that a spoofing attack has occurred by the fact that the response to the second heartbeat has been received. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computing system, comprising:
-
a processor; a computer-readable storage medium, coupled to the processor; and logic, stored on the computer-readable storage medium and executed on the processor, for; establishing a plurality of cryptographically secure channels, each channel between a monitoring device and a monitored device of a plurality of monitored devices, each monitored device associated with unique address; transmitting a heartbeat from the monitoring device to a first monitored device of the plurality of monitored devices via a first secure channel, corresponding to the first monitored device, of the plurality of secure channels; if a response to the heartbeat is received, transmitting a second heartbeat from the monitoring device to a second monitored device of the plurality of monitored devices via the first secure channel; and if a response to the heartbeat is not received, executing a spoofing detection scheme, comprising; transmitting a second heartbeat to the first monitored device via an address associated with a second monitored device; receiving a response to the second heartbeat; and determining that a spoofing attack has occurred by the fact that the response to the second heartbeat has been received. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A computing programming product, comprising:
-
a computer-readable storage medium; and logic, stored on the computer-readable storage medium for execution on a processor, for; establishing a plurality of cryptographically secure channels, each channel between a monitoring device and a monitored device of a plurality of monitored devices, each monitored device associated with unique address; transmitting a heartbeat from the monitoring device to a first monitored device of the plurality of monitor devices via a first secure channel, corresponding to the first monitored device, of the plurality of secure channels; if a response to the heartbeat is received, transmitting a second heartbeat from the monitoring device to a second monitored device of the plurality of monitored devices via the first secure channel; and if a response to the heartbeat is not received, executing a spoofing detection scheme, comprising; transmitting a second heartbeat to the first monitored device via an address associated with a second monitored device; receiving a response to the second heartbeat; and determining that a spoofing attack has occurred by the fact that the response to the second heartbeat has been received. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A method, comprising:
-
establishing by a hypervisor, coupled to a computing system, a plurality of cryptographically secure channels, each channel between a monitoring device of the computing system and a monitored device of a plurality of monitored devices of the computing system, each monitored device associated with unique address; transmitting a heartbeat from the monitoring device to a first monitored device of the plurality of monitored devices via a first secure channel, corresponding to the first monitored device, of the plurality of secure channels; if a response to the heartbeat is received, transmitting a second heartbeat from the monitoring device to a second monitored device of the plurality of monitored devices via the first secure channel; and if a response to the heartbeat is not received, executing a spoofing detection scheme, comprising; transmitting a second heartbeat to the first monitored device via an address associated with a second monitored device; receiving a response to the second heartbeat; and determining that a spoofing attack has occurred by the fact that the response to the second heartbeat has been received. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A method, comprising:
-
establishing a plurality of cryptographically secure channels, each channel between a virtual input/output server (VIOS) and a monitored device of a plurality of monitored devices, each monitored device associated with unique address; transmitting a heartbeat from the VIOS to a first monitored device of the plurality of monitored devices via a first secure channel, corresponding to the first monitored device, of the plurality of secure channels; if a response to the heartbeat is received, transmitting a second heartbeat from the VIOS to a second monitored device of the plurality of monitored devices via the first secure channel; and if a response to the heartbeat is not received, executing a spoofing detection scheme, comprising; transmitting a second heartbeat to the first monitored device via an address associated with a second monitored device; receiving a response to the second heartbeat; and determining that a spoofing attack has occurred by the fact that the response to the second heartbeat has been received. - View Dependent Claims (22, 23, 24, 25)
-
Specification