DDoS attackers start targeting IPv6 networks
2011 brought the first DDoS attacks against IPv6 networks, but their number remains insignificant
IDG News Service - Cybercriminals have started launching distributed denial-of-service (DDoS) attacks against networks that transmit data over IPv6 (Internet Protocol version 6), according to a report published recently by DDoS mitigation vendor Arbor Networks.
Even though 2011 was the first year when IPv6 DDoS attacks were recorded, such incidents remain rare because they are not economically relevant for Internet criminals, said Bill Cerveny, a senior software quality assurance engineer at Arbor.
Some companies have projected increases of more than 100 percent for their IPv6 traffic volumes over the next 12 months, but the changes will be insignificant compared to the overall traffic volume.
The majority of organizations remain reluctant to switch to the new IP protocol version because their network security and traffic analysis equipment is not fully compatible with it.
Sixty-five percent of respondents to Arbor Network's 7th annual Worldwide Infrastructure Security Report said that their main concern is the lack of feature parity between IPv4 and IPv6, while 60 percent expressed concerns that they cannot properly analyze IPv6 traffic.
"Many infrastructure solutions currently do not offer the same features and functionality for IPv6 as they do for IPv4," Cerveny said via email. "This lack of feature parity means that security teams do not have the same visibility and mitigation capabilities when trying to identify and block IPv6-based attacks against targets."
"We see IPv6 attacks as an emerging threat," said Neal Quinn, vice president of operations at DDoS mitigation vendor Prolexic, in a phone interview. Quinn believes that the current IPv6 DDoS attacks are most likely tests performed by malware writers who want to be prepared when large Internet service providers will start switching their subscribers to IPv6.
Prolexic is investigating what issues could arise on routers that support both IPv6 and IPv4 stacks, because these will be increasingly important as companies create bridges between IPv6 and IPv4 networks.
"The issue of having infrastructure equipment with the same capabilities to defend against both IPv4 and IPv6 attacks is critical," said Cerveny. "As our security report findings show, it is critical for network operators to address this discrepancy."
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts