Abstract
We explore the risk that network attackers can exploit unauthenticated Network Time Protocol (NTP) traffic to alter the time on client systems. We first discuss how an onpath attacker, that hijacks traffic to an NTP server, can quickly shift time on the server’s clients. Then, we present an extremely low-rate (single packet) denial-of-service attack that an off-path attacker, located anywhere on the network, can use to disable NTP clock synchronization on a client. Next, we show how an off-path attacker can exploit IPv4 packet fragmentation to dramatically shift time on a client. We discuss the implications of these attacks on other core Internet protocols, quantify their attack surface using Internet measurements, and suggest a few simple countermeasures that can improve the security of NTP.
Cite
CITATION STYLE
Malhotra, A., Cohen, I. E., Brakke, E., & Goldberg, S. (2016). Attacking the Network Time Protocol. In 23rd Annual Network and Distributed System Security Symposium, NDSS 2016. The Internet Society. https://doi.org/10.14722/ndss.2016.23090
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.