Back to Search Start Over

On the Potential Abuse of IGMP

Authors :
Matthew Sargent
John Kristoff
Mark Allman
Vern Paxson
Source :
ACM SIGCOMM Computer Communication Review. 47:27-35
Publication Year :
2017
Publisher :
Association for Computing Machinery (ACM), 2017.

Abstract

In this paper we investigate the vulnerability of the Internet Group Management Protocol (IGMP) to be leveraged for denial-of-service (DoS) attacks. IGMP is a connectionless protocol and therefore susceptible to attackers spoofing a third-party victim's source address in an effort to coax responders to send their replies to the victim. We find 305K IGMP responders that will indeed answer queries from arbitrary Internet hosts. Further, the responses are often larger than the requests, hence amplifying the attacker's own expenditure of bandwidth. We conclude that attackers can coordinate IGMP responders to mount sizeable DoS attacks.

Details

ISSN :
01464833
Volume :
47
Database :
OpenAIRE
Journal :
ACM SIGCOMM Computer Communication Review
Accession number :
edsair.doi...........256a8b1444ddcaac896a7958f0ec53a1