On the Potential Abuse of IGMP

  title={On the Potential Abuse of IGMP},
  author={Matthew Sargent and John Kristoff and Vern Paxson and Mark Allman},
  journal={Computer Communication Review},
In this paper we investigate the vulnerability of the Internet Group Management Protocol (IGMP) to be leveraged for denial-of-service (DoS) attacks. IGMP is a connectionless protocol and therefore susceptible to attackers spoofing a third-party victim's source address in an effort to coax responders to send their replies to the victim. We find 305K IGMP responders that will indeed answer queries from arbitrary Internet hosts. Further, the responses are often larger than the requests, hence… CONTINUE READING


Publications citing this paper.
Showing 1-4 of 4 extracted citations


Publications referenced by this paper.
Showing 1-6 of 6 references

MERLIN: MEasure the router level of the INternet

2011 7th EURO-NGI Conference on Next Generation Internet Networks • 2011
View 7 Excerpts
Highly Influenced

et al

A. Aina, J. Akkerhuis, +7 authors R. Mohan
SSAC Advisory SAC008 DNS Distributed Denial of Service (DDoS) Attacks • 2006
View 7 Excerpts
Highly Influenced

Cisco Event Response: Network Time Protocol Amplification

C. Systems
Distributed Denial of Service Attacks. http://www.cisco.com/web/about/security/ intelligence/ERP-NTP-DDoS.html, • 2014
View 5 Excerpts
Highly Influenced


P. Mérindol
Van den Schrieck, B. Donnet, O. Bonaventure, and J.-J. Pansiot. Quantifying ASes Multiconnectivity Using Multicast Information. In ACM SIGCOMM Internet Measurement Conference • 2009
View 4 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…