Securing Multicast Networks in ISP Environments: A Forgotten Attack Surface
Keywords:
Multicast Security, ISP Infrastructure, Protocol-level Segmentation, Fallback Logic, Attack Surface, PIM-SM, M-SENTINEL, Network Resilience.Abstract
Internet Service Providers (ISPs) increasingly leverage IP multicast for efficient content delivery of streaming media, IoT data, and financial information, yet the security implications remain largely unaddressed in mainstream literature. Multicast protocols inherently introduce unique attack vectors including rogue rendezvous point attacks, source impersonation, and control plane flooding that threaten network infrastructure integrity. This paper identifies critical security gaps in current multicast deployments through a comprehensive analysis of protocol vulnerabilities and operational practices. We propose M-SENTINEL, an innovative security framework incorporating protocol-level segmentation with dynamic fallback logic to isolate trust domains and maintain service continuity during attacks. Our implementation features hierarchical key distribution and behavioral-based anomaly detection with mathematical formulations for threat quantification. Simulation results demonstrate 94.8% attack detection rates with under 2.1% false positives while maintaining sub-50ms fallback activation during security incidents. This work establishes a foundational security methodology for multicast infrastructures that have long represented a neglected attack surface in ISP environments, with specific contributions in trust segmentation, attack resilience, and operational continuity mechanisms.
Downloads
References
"Secure IP Multicast Deployments," Cisco Systems, 2022. [Online]. Available: https://www.cisco.com/c/en/us/support/docs/ip/ip-multicast/218004-secure-ip-multicast-deployments.html
P. Savola, "Overview of the Internet Multicast Addressing Architecture," RFC 6308, IETF, 2011. [Online]. Available: https://www.rfc-editor.org/rfc/rfc6308.html
"Future of IP Multicast: Trends & Predictions," OrhanErgun.net, 2023. [Online]. Available: https://orhanergun.net/future-of-ip-multicast-trends-predictions
"Overlay Multicast - an overview," ScienceDirect, 2009. [Online]. Available: https://www.sciencedirect.com/topics/computer-science/overlay-multicast
"Secure multicast & applications for securing multicast CIP traffic," IEB Media, 2019. [Online]. Available: https://iebmedia.com/technology/iiot/secure-multicast-applications-for-securing-multicast-cip-traffic/
C. Perkins et al., "Multicast Considerations over IEEE 802 Wireless Media," RFC 9119, IETF, 2021. [Online]. Available: https://datatracker.ietf.org/doc/rfc9119/
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.


