On the Potential Abuse of IGMP

Matthew Sargent, John Kristoff, Vern Paxson, Mark Allman.
Abstract

In this paper we investigate the vulnerability of the Internet Group Management Protocol (IGMP) to be leveraged for denial-of-service (DoS) attacks. IGMP is a connectionless protocol and therefore susceptible to attackers spoofing a third-party victim’s source address in an effort to coax responders to send their replies to the victim. We find 305K IGMP responders that will indeed answer queries from arbitrary Internet hosts. Further, the responses are often larger than the requests, hence amplifying the attacker’s own expenditure of bandwidth. We conclude that attackers can coordinate IGMP responders to mount sizeable DoS attacks.

Download the full article DOI: 10.1145/3041027.3041031

23 comments

  1. Pingback: 메이저사이트
  2. Pingback: forum
  3. Pingback: Interior Design
  4. Pingback: opinie
  5. Pingback: IG porn
  6. Pingback: Nonton Bos21
  7. Pingback: Source
  8. Pingback: GCLUB
  9. Pingback: 바카라사이트

Leave a Reply