On the potential of IPv6 open resolvers for DDoS attacks

Luuk Hendriks, Ricardo de Oliveira Schmidt, Roland van Rijswijk-Deij, Aiko Pras

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)

    Abstract

    Distributed Denial of Service (DDoS) attacks have become a daily problem in today’s Internet. These attacks aim at overwhelm- ing online services or network infrastrucure. Some DDoS attacks explore open services to perform reflected and amplified attacks; and the DNS is one of the most (mis)used systems by attackers. This problem can be further aggravated in the near future by the increasing number of IPv6-enabled services in the Internet. Given that the deployment of IPv6-enabled services is increasing, it becomes impor- tant to find vulnerable IPv6 open services that could be (mis)used by attackers, and prevent that misuse. However, unlike with IPv4, simply scanning the IPv6 address space to find these open services is impractical. In this paper we present an active measurement approach to enumer- ate a relevant list of open resolvers on IPv6 in the wild that could be potentially exploited in a DDoS attack. Based on the assumption that IPv6 open resolvers can be found via IPv4 ones, we show that IPv6-based amplified DDoS attacks are a significantly potential threat in the Inter- net: the analyzed resolvers, of which 72% are assumingly infrastructural servers, showed a median amplification factor of 50. 1
    Original languageEnglish
    Title of host publicationPassive and Active Measurement
    Subtitle of host publication18th International Conference, PAM 2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings
    EditorsMohamed Ali Kaafar, Steve Uhlig, Johanna Amann
    Place of PublicationCham
    PublisherSpringer
    Pages17-29
    Number of pages13
    ISBN (Electronic)978-3-319-54328-4
    ISBN (Print)978-3-319-54327-7
    DOIs
    Publication statusPublished - 2017
    Event18th International Conference Passive and Active Measurement, PAM 2017 - Sydney, Australia
    Duration: 30 Mar 201730 Mar 2017
    Conference number: 18

    Publication series

    NameLecture Notes in Computer Science
    PublisherSpringer
    Volume10176
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349
    NameLecture Notes in Computer Communication Networks and Telecommunications
    PublisherSpringer

    Conference

    Conference18th International Conference Passive and Active Measurement, PAM 2017
    Abbreviated titlePAM
    CountryAustralia
    CitySydney
    Period30/03/1730/03/17

      Fingerprint

    Keywords

    • Open Resolver
    • Domain Name System
    • IPv6 Address
    • Response Size
    • Shared Cache

    Cite this

    Hendriks, L., de Oliveira Schmidt, R., van Rijswijk-Deij, R., & Pras, A. (2017). On the potential of IPv6 open resolvers for DDoS attacks. In M. A. Kaafar, S. Uhlig, & J. Amann (Eds.), Passive and Active Measurement: 18th International Conference, PAM 2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings (pp. 17-29). (Lecture Notes in Computer Science; Vol. 10176), (Lecture Notes in Computer Communication Networks and Telecommunications). Cham: Springer. https://doi.org/10.1007/978-3-319-54328-4_2