On The Potential Abuse Of Igmp

Matthew Sargent, John Kristo,Vern Paxson,Mark Allman

ACM SIGCOMM Computer Communication Review(2017)

引用 10|浏览80
暂无评分
摘要
In this paper we investigate the vulnerability of the Internet Group Management Protocol (IGMP) to be leveraged for denial-of-service (DoS) attacks. IGMP is a connection-less protocol and therefore susceptible to attackers spoofing a third-party victim's source address in an effort to coax responders to send their replies to the victim. We find 305K IGMP responders that will indeed answer queries from arbitrary Internet hosts. Further, the responses are often larger than the requests, hence amplifying the attacker's own expenditure of bandwidth. We conclude that attackers can coordinate IGMP responders to mount sizeable DoS attacks.
更多
查看译文
关键词
IGMP,Security,Denial-of-Service,Attacks
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要