DocumentCode
715411
Title
Hyperthreats: Hypercall-based DoS attacks
Author
Shropshire, Jordan
Author_Institution
CIS, Univ. of South Alabama, Mobile, AL, USA
fYear
2015
fDate
9-12 April 2015
Firstpage
1
Lastpage
7
Abstract
The cloud offers a new environment for achieving Denial of Service (DoS) conditions on targeted infrastructure. Once confined to the network, they are now conducted over the hypercall interface. These attacks are initiated by malicious, unprivileged guests with a goal of incapacitating hosting hypervisors. Because they are not packet-based, they cannot be detected or prevented using network security measures. The present study systematically explores this risk and develops a taxonomy of hypercall-based DoS attacks. For purpose of illustration, a denial of service is attempted against a Xen hypervisor. This scenario demonstrates that even a relatively simple attack could have significant implications for system stability. Finally, system for defending hypervisors against hypercall attacks is introduced. This mitigation observes N-grams and calculates the conditional probability of a sequence of hypercalls. The assumption is that exploits will be manifested as previously-unobserved sequences of hypercalls. The early results of testing are provided.
Keywords
computer network security; probability; virtual machines; N-grams; Xen hypervisor; conditional probability calculation; denial-of-service attacks; hosting hypervisor incapacitation; hypercall-based DoS attacks; hyperthreats; malicious guests; system stability; unprivileged guests; Computer crime; Hardware; Software; Taxonomy; Virtual machine monitors; Virtual machining; Virtualization; Hypercalls; denial of service; simulation; taxonomy;
fLanguage
English
Publisher
ieee
Conference_Titel
SoutheastCon 2015
Conference_Location
Fort Lauderdale, FL
Type
conf
DOI
10.1109/SECON.2015.7133049
Filename
7133049
Link To Document