Exploiting MQTT-SN for distributed reflection denial-of-service attacks

H. Sochor, F. Ferrarotti, R. Ramler. Exploiting MQTT-SN for distributed reflection denial-of-service attacks. pages 74-81, DOI https://doi.org/10.1007/978-3-030-59028-4_7, 9, 2020.

Autoren
  • Hannes Sochor
  • Flavio Ferrarotti
  • Rudolf Ramler
Editoren
  • Gabriele Kotsis
  • A Min Tjoa
  • Ismail Khali
  • Lukas Fischer Ph.D.
  • Priv.-Doz. Dr. Bernhard A. Moser
  • Atif Mashkoor
  • Johannes Sametinger
  • Anna Fensel
  • Dr. Jorge Martinez-Gil
BuchDEXA 2020: Database and Expert Systems Applications
TypIn Konferenzband
VerlagSpringer
SerieCommunications in Computer and Information Science
DOIhttps://doi.org/10.1007/978-3-030-59028-4_7
ISBN978-3-030-59027-7
Monat9
Jahr2020
Seiten74-81
Abstract

Distributed Denial-of-Service attacks are a dramatically increasing threat to Internet-based services and connected devices. In the form of reflection attacks they are abusing other systems to perform the actual attack, often with an additional amplification factor. In this work we describe a reflection attack exploiting the industrial Message Queuing Telemetry Transport for Sensor Networks (MQTT-SN) protocol, which theoretically allows to achieve an unlimited amplification rate. This poses a significant risk not only for the organizations which are running a MQTT-SN broker but also for possible targets of such DRDoS attacks. Countermeasures are limited as the underlying weakness is rooted in the specification of MQTT-SN itself.