Grey Rhino Warning: IPv6 is Becoming Fertile Ground for Reflection Amplification Attacks
By: Ling Hu , Tao Yang , Yu Pang and more
Potential Business Impact:
Finds internet weaknesses for powerful attacks.
Distributed Denial-of-Service (DDoS) attacks represent a cost-effective and potent threat to network stability. While extensively studied in IPv4 networks, DDoS implications in IPv6 remain underexplored. The vast IPv6 address space renders brute-force scanning and amplifier testing for all active addresses impractical. Innovatively, this work investigates AS-level vulnerabilities to reflection amplification attacks in IPv6. One prerequisite for amplification presence is that it is located in a vulnerable autonomous system (AS) without inbound source address validation (ISAV) deployment. Hence, the analysis focuses on two critical aspects: global detection of ISAV deployment and identification of amplifiers within vulnerable ASes. Specifically, we develop a methodology combining ICMP Time Exceeded mechanisms for ISAV detection, employ IPv6 address scanning for amplifier identification, and utilize dual vantage points for amplification verification. Experimental results reveal that 4,460 ASes (61.36% of measured networks) lack ISAV deployment. Through scanning approximately 47M active addresses, we have identified reflection amplifiers in 3,507 ASes. The analysis demonstrates that current IPv6 networks are fertile grounds for reflection amplification attacks, alarming network security.
Similar Papers
Unveiling IPv6 Scanning Dynamics: A Longitudinal Study Using Large Scale Proactive and Passive IPv6 Telescopes
Networking and Internet Architecture
Finds internet scanners by watching for them.
Scanning the IPv6 Internet Using Subnet-Router Anycast Probing
Networking and Internet Architecture
Finds more internet addresses faster and safer.
Where Have All the Firewalls Gone? Security Consequences of Residential IPv6 Transition
Networking and Internet Architecture
IPv6 makes home devices easier for hackers.