SVTester: Finding DoS Vulnerabilities of Virtual Switches

Nowadays, virtualization is being deployed in many companies and institutions' systems. However, a noticeable security problem of virtualization is the fact that multiple virtual machines are run on one physical host machine called hypervisor. Hypervisors often implement a virtual switch to man...

Full description

Saved in:
Bibliographic Details
Published inJournal of Information Processing Vol. 29; pp. 581 - 591
Main Authors Nguyen, Son Duc, Mimura, Mamoru, Tanaka, Hidema
Format Journal Article
LanguageEnglish
Published Information Processing Society of Japan 2021
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Nowadays, virtualization is being deployed in many companies and institutions' systems. However, a noticeable security problem of virtualization is the fact that multiple virtual machines are run on one physical host machine called hypervisor. Hypervisors often implement a virtual switch to manage network connections between the internal virtual network and the external physical network. However, an adversary could exploit virtual switch flaws and use them to sabotage the entire virtual network. As a consequence, the attack could make all applications running on virtual machines unavailable. In this paper, we present SVTester, a fuzzing-based testing tool that can automatically identify possible vulnerabilities of a virtual switch that can be exploited for certain types of Denial-of-Service attack. We used an initial version of SVTester to check several hypervisors that implement the virtual switch. The results show that SVTester was able to rediscover DoS weaknesses on an old version of VMware hypervisor and found a novel possible vulnerability in the Oracle VirtualBox hypervisor. Our results also prove the effectiveness and potential of SVTester in evaluating virtual network security.
ISSN:1882-6652
1882-6652
DOI:10.2197/ipsjjip.29.581