Logical partition media access control impostor detector
First Claim
1. A method for detecting a spoofing attack on a monitoring device, comprising:
- establishing a plurality of cryptographically secure channels, each channel between the monitoring device and a monitored device of a plurality of monitored devices, each monitored device associated with a corresponding unique address;
transmitting a first heartbeat from the monitoring device to a first monitored device of the plurality of monitored devices via a first secure channel, corresponding to the first monitored device, of the plurality of secure channels;
in the event a response to the first heartbeat is received, transmitting a second heartbeat from the monitoring device to a second monitored device of the plurality of monitored devices via the first secure channel; and
in the event a response to the first heartbeat is not received, executing a spoofing detection scheme, comprising;
transmitting a second heartbeat to the first monitored device via an address associated with a second monitored device;
receiving a response to the second heartbeat; and
determining that a spoofing attack has occurred on the monitoring device by the fact that the response to the second heartbeat has been received; and
in response to a determination that a response to the second heartbeat has not been received, determining that a spoofing attack has not occurred on the monitoring device.
1 Assignment
0 Petitions
Accused Products
Abstract
Provided are techniques to enable a virtual input/output server (VIOS) to establish cryptographically secure signals with target LPARs to detect an imposter or spoofing LPAR. The secure signal, or “heartbeat,” may be configured as an Internet Key Exchange/Internet Protocol Security (IKE/IPSec) encapsulated packet (ESP) connection or tunnel. Within the tunnel, the VIOS pings each target LPAR and, if a heartbeat is interrupted, the VIOS makes a determination as to whether the tunnel is broken, the corresponding LPAR is down or a media access control (MAC) spoofing attach is occurring. The determination is made by sending a heartbeat that is designed to fail unless the heartbeat is received by a spoofing device.
26 Citations
15 Claims
-
1. A method for detecting a spoofing attack on a monitoring device, comprising:
-
establishing a plurality of cryptographically secure channels, each channel between the monitoring device and a monitored device of a plurality of monitored devices, each monitored device associated with a corresponding unique address; transmitting a first heartbeat from the monitoring device to a first monitored device of the plurality of monitored devices via a first secure channel, corresponding to the first monitored device, of the plurality of secure channels; in the event a response to the first heartbeat is received, transmitting a second heartbeat from the monitoring device to a second monitored device of the plurality of monitored devices via the first secure channel; and in the event a response to the first heartbeat is not received, executing a spoofing detection scheme, comprising; transmitting a second heartbeat to the first monitored device via an address associated with a second monitored device; receiving a response to the second heartbeat; and determining that a spoofing attack has occurred on the monitoring device by the fact that the response to the second heartbeat has been received; and in response to a determination that a response to the second heartbeat has not been received, determining that a spoofing attack has not occurred on the monitoring device. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computing system for detecting a spoofing attack on a monitoring device, comprising:
-
a hardware processor; a non-transitory computer-readable storage medium, coupled to the processor; and logic, stored on the computer-readable storage medium and executed on the processor, to configure the processor to; establish a plurality of cryptographically secure channels, each channel between the monitoring device and a monitored device of a plurality of monitored devices, each monitored device associated with a corresponding unique address; transmit a first heartbeat from the monitoring device to a first monitored device of the plurality of monitored devices via a first secure channel, corresponding to the first monitored device, of the plurality of secure channels; in the event a response to the first heartbeat is received, transmit a second heartbeat from the monitoring device to a second monitored device of the plurality of monitored devices via the first secure channel; and in the event a response to the first heartbeat is not received, execute a spoofing detection scheme, comprising; transmitting a second heartbeat to the first monitored device via an address associated with a second monitored device; receiving a response to the second heartbeat; and determining that a spoofing attack has occurred on the monitoring device by the fact that the response to the second heartbeat has been received; and in response to a determination that a response to the second heartbeat has not been received, determine that a spoofing attack has not occurred on the monitoring device. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A computing programming product, for detecting a spoofing attack on a monitoring device, comprising:
-
a non-transitory computer-readable storage medium; and logic, stored on the computer-readable storage medium for execution on a processor, for; establishing a plurality of cryptographically secure channels, each channel between the monitoring device and a monitored device of a plurality of monitored devices, each monitored device associated with a corresponding unique address; transmitting a first heartbeat from the monitoring device to a first monitored device of the plurality of monitored devices via a first secure channel, corresponding to the first monitored device, of the plurality of secure channels; in the event a response to the first heartbeat is received, transmitting a second heartbeat from the monitoring device to a second monitored device of the plurality of monitored devices via the first secure channel; and in the event a response to the first heartbeat is not received, executing a spoofing detection scheme, comprising; transmitting a second heartbeat to the first monitored device via an address associated with a second monitored device; receiving a response to the second heartbeat; and determining that a spoofing attack has occurred on the monitoring device by the fact that the response to the second heartbeat has been received; and in response to a determination that a response to the second heartbeat has not been received, determining that a spoofing attack has not occurred on the monitoring device. - View Dependent Claims (12, 13, 14, 15)
-
Specification