skip to main content
research-article

On the Potential Abuse of IGMP

Published:17 January 2017Publication History
Skip Abstract Section

Abstract

In this paper we investigate the vulnerability of the Internet Group Management Protocol (IGMP) to be leveraged for denial-of-service (DoS) attacks. IGMP is a connectionless protocol and therefore susceptible to attackers spoofing a third-party victim's source address in an effort to coax responders to send their replies to the victim. We find 305K IGMP responders that will indeed answer queries from arbitrary Internet hosts. Further, the responses are often larger than the requests, hence amplifying the attacker's own expenditure of bandwidth. We conclude that attackers can coordinate IGMP responders to mount sizeable DoS attacks.

References

  1. Cisco IOS Software Product Lifecycle Dates & Milestones. http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ios-software-releases-12-2-mainline/prod\_bulletin0900aecd801eda8a.html.Google ScholarGoogle Scholar
  2. DVMRP Can Be Used to Trigger an Amplification Attack Against a Third Party. https://kb.juniper.net/InfoCenter/index?page=content&id=KB29553.Google ScholarGoogle Scholar
  3. Open Resolver Project. http://openresolverproject.org/.Google ScholarGoogle Scholar
  4. A. Aina, J. Akkerhuis, K. Claffy, S. Crocker, D. Karrenberg, J. Ihrn, R. Joffe, M. Kosters, A. Mankin, R. Mohan, et al. SSAC Advisory SAC008 DNS Distributed Denial of Service (DDoS) Attacks, 2006.Google ScholarGoogle Scholar
  5. B. Cain, S. Deering, I. Kouvelas, B. Fenner, and A. Thyagarajan. Internet Group Management Protocol, Version 3, Oct. 2002. RFC 3376. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Deering. Host Extensions for IP Multicasting, Aug. 1989. RFC 1112. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Z. Durumeric, E. Wustrow, and J. A. Halderman. ZMap: Fast Internet-wide Scanning and Its Security Applications. In USENIX Security, pages 605-620. Citeseer, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. W. Fenner. Internet Group Management Protocol, Version 2, Nov. 1997. RFC 2236. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. G. Huston. The 32-bit AS Number Report, Apr. 2016. http://www.potaroo.net/tools/asn32/.Google ScholarGoogle Scholar
  10. V. Jacobson, C. Leres, and S. McCanne. The tcpdump Manual Page. Lawrence Berkeley Laboratory, 1989.Google ScholarGoogle Scholar
  11. J. Kristoff. DVMRP Ask Neighbors2: an IGMP-based DDoS/Leak Threat, Oct. 2014. https://www.cymru.com/jtk/talks/nanog62-an2.pdf.Google ScholarGoogle Scholar
  12. A. Kuzmanovic and E. Knightly. Low-Rate TCP-Targeted Denial of Service Attacks (The Shrew vs. the Mice and Elephants). In ACM SIGCOMM, Aug. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. P. Mérindol, B. Donnet, J.-J. Pansiot, M. Luckie, and Y. Hyun. MERLIN: MEasure the Router Level of the INternet. In Next Generation Internet (NGI), 2011 7th EURO-NGI Conference on, pages 1-8. IEEE, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  14. P. Mérindol, V. Van den Schrieck, B. Donnet, O. Bonaventure, and J.-J. Pansiot. Quantifying ASes Multiconnectivity Using Multicast Information. In ACM SIGCOMM Internet Measurement Conference, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. T. Pusateri. Distance Vector Multicast Routing Protocol, Oct. 2003. Internet-Draft draft-ietf-idmr-dvmrp-v3-11.txt (work in progress).Google ScholarGoogle Scholar
  16. R. Rasti, M. Murthy, N. Weaver, and V. Paxson. Temporal lensing and its application in pulsing denial-of-service attacks. In IEEE Symposium on Security and Privacy, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. C. Rossow. Amplification Hell: Revisiting Network Protocols for DDoS Abuse. In Symposium on Network and Distributed System Security (NDSS), 2014.Google ScholarGoogle Scholar
  18. P. Schmehl. The Microsoft UPnP (Universal Plug and Play) Vulnerability. http://bandwidthco.com/sf_whitepapers/windows/The\%20Microsoft\%20UPnP\%20(Universal\%20Plug\%20and\%20Play)\%20Vulnerability.pdf, 2002.Google ScholarGoogle Scholar
  19. K. Schomp, T. Callahan, M. Rabinovich, and M. Allman. On Measuring the Client-Side DNS Infrastructure. In ACM Internet Measurement Conference, Oct. 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. SpamHaus. The Policy Block List. https://www.spamhaus.org/pbl/.Google ScholarGoogle Scholar
  21. C. Systems. Cisco Event Response: Network Time Protocol Amplification Distributed Denial of Service Attacks. http://www.cisco.com/web/about/security/intelligence/ERP-NTP-DDoS.html, Feb. 2014.Google ScholarGoogle Scholar
  22. P. Technologies. An Analysis of DrDos SNMP/NTP/CHARGEN Reflection Attacks: Part II of the DrDos White Paper Series. http://www.prolexic.com/kcresources/white-paper/white-paper-snmp-ntp-chargen-reflection-attacks-drdos/An_Analysis_of_DrDoS_SNMP-NTP-CHARGEN_Reflection_Attacks_White_Paper_A4_042913.pdf, 2013.Google ScholarGoogle Scholar
  23. D. Waitzman, C. Partridge, and S. Deering. Distance Vector Multicast Routing Protocol, Nov. 1988. RFC 1075. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Zmap. https://zmap.io/.Google ScholarGoogle Scholar

Index Terms

  1. On the Potential Abuse of IGMP

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM SIGCOMM Computer Communication Review
          ACM SIGCOMM Computer Communication Review  Volume 47, Issue 1
          January 2017
          60 pages
          ISSN:0146-4833
          DOI:10.1145/3041027
          Issue’s Table of Contents

          Copyright © 2017 Authors

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 17 January 2017

          Check for updates

          Qualifiers

          • research-article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader