Critical analysis of layer 2 network security in virtualised environments

被引:5
|
作者
Bull, Ronny L. [1 ]
Matthews, Jeanna N. [1 ]
机构
[1] Clarkson Univ, Wallace H Coulter Sch Engn, Potsdam, NY 13676 USA
关键词
virtualisation; networking; network security; cloud security; virtual switches; layer; 2; attacks; DHCP; DNS; MAC flooding;
D O I
10.1504/IJCNDS.2016.10000954
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we explore whether layer 2 network attacks that work on physical switches apply to their virtualised counterparts by performing a systematic study across four major hypervisor environments - Open vSwitch, Citrix XenServer, Microsoft Hyper-V Server and VMware vSphere - in seven different virtual networking configurations. First, we use a malicious virtual machine to run a MAC flooding attack and evaluate the impact on co-resident virtual machines. We find that network performance is degraded on all platforms and that it is possible to eavesdrop on other client traffic passing over the same virtual network for Open vSwitch and Citrix XenServer. Second, we use a malicious virtual machine to run a rogue DHCP server and then run multiple DHCP attack scenarios. On all four platforms, co-resident virtual machines can be manipulated by providing them with incorrect or malicious network information.
引用
收藏
页码:315 / 333
页数:19
相关论文
共 50 条
  • [31] A network layer for teleoperations in high speed environments
    LaMarche, B. L.
    Hopkins, D. F.
    Hughes, C. O.
    McKenna, T.
    Fulp, E. W.
    2007 HIGH-SPEED NETWORKS WORKSHOP, 2007, : 11 - +
  • [32] Network Security Challenges and Countermeasures in SDN Environments.
    Hegazy, Abdelrahman
    El-Aasser, Minar
    2021 EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), 2021, : 43 - 50
  • [33] Challenges of Fiction in Network Security - Perspective of Virtualized Environments
    Bukac, Vit
    Ostadal, Radim
    Svenda, Petr
    Baghdasaryan, Tatevik
    Matyas, Vashek
    SECURITY PROTOCOLS XXIII, 2015, 9379 : 145 - 151
  • [34] Approaches for collaborative security defences in multi network environments
    Koning, Ralph
    Polevoy, Gleb
    Meijer, Lydia
    de Laat, Cees
    Grosso, Paola
    2019 6TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (IEEE CSCLOUD 2019) / 2019 5TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (IEEE EDGECOM 2019), 2019, : 113 - 123
  • [35] WHAT IS A SECURITY - CRITICAL ANALYSIS
    NEWTON, WH
    MISSISSIPPI LAW JOURNAL, 1977, 48 (02): : 167 - 199
  • [36] Security Testing and Evaluation on Access Layer Network
    Salamon, Zaleha
    Ab Rahman, Ruhani
    Yahaya, Cik Ku Haroswati Che Ku
    Mahmud, Abd Razak
    Yusof, Mat Ikram
    2018 IEEE 8TH INTERNATIONAL CONFERENCE ON SYSTEM ENGINEERING AND TECHNOLOGY (ICSET), 2018, : 184 - 188
  • [37] Trust management and network layer security protocols
    Blaze, M
    Ioannidis, J
    Keromytis, AD
    SECURITY PROTOCOLS, 2000, 1796 : 103 - 108
  • [38] MULTI-LAYER NETWORK SECURITY ARCHITECTURE
    Chan, Vincent W. S.
    IEEE COMMUNICATIONS MAGAZINE, 2020, 58 (12) : 4 - 4
  • [39] Quantum photonic network and physical layer security
    Sasaki, Masahide
    Endo, Hiroyuki
    Fujiwara, Mikio
    Kitamura, Mitsuo
    Ito, Toshiyuki
    Shimizu, Ryosuke
    Toyoshima, Morio
    PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2017, 375 (2099):
  • [40] Cognitive Security in Software Define Network Layer
    Kavitha, R.
    Priya, N.
    JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019, : 69 - 74