Back to Search
Start Over
On the Potential Abuse of IGMP
- Source :
- ACM SIGCOMM Computer Communication Review. 47:27-35
- Publication Year :
- 2017
- Publisher :
- Association for Computing Machinery (ACM), 2017.
-
Abstract
- In this paper we investigate the vulnerability of the Internet Group Management Protocol (IGMP) to be leveraged for denial-of-service (DoS) attacks. IGMP is a connectionless protocol and therefore susceptible to attackers spoofing a third-party victim's source address in an effort to coax responders to send their replies to the victim. We find 305K IGMP responders that will indeed answer queries from arbitrary Internet hosts. Further, the responses are often larger than the requests, hence amplifying the attacker's own expenditure of bandwidth. We conclude that attackers can coordinate IGMP responders to mount sizeable DoS attacks.
- Subjects :
- Spoofing attack
Computer Networks and Communications
computer.internet_protocol
business.industry
Computer science
ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS
020206 networking & telecommunications
Denial-of-service attack
02 engineering and technology
Internet hosting service
Computer security
computer.software_genre
IGMP snooping
Connectionless communication
020204 information systems
Internet Group Management Protocol
0202 electrical engineering, electronic engineering, information engineering
The Internet
business
computer
Software
Computer network
Subjects
Details
- ISSN :
- 01464833
- Volume :
- 47
- Database :
- OpenAIRE
- Journal :
- ACM SIGCOMM Computer Communication Review
- Accession number :
- edsair.doi...........256a8b1444ddcaac896a7958f0ec53a1