Close Menu
The LinkxThe Linkx
  • Home
  • Technology
    • Gadgets
    • IoT
    • Mobile
    • Nanotechnology
    • Green Technology
  • Trending
  • Advertising
  • Social Media
    • Branding
    • Email Marketing
    • Video Marketing
  • Shop

Subscribe to Updates

Get the latest tech news from thelinkx.com about tech, gadgets and trendings.

Please enable JavaScript in your browser to complete this form.
Loading
What's Hot

This Phone Will Auto Shut Display If Someone Peeking Your Phone Displa…

October 15, 2025

Mark Carney could make it easier for us to buy EVs if he wanted. Right…

October 15, 2025

The Sky’s No Longer the Limit

October 15, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram Pinterest Vimeo
The LinkxThe Linkx
  • Home
  • Technology
    • Gadgets
    • IoT
    • Mobile
    • Nanotechnology
    • Green Technology
  • Trending
  • Advertising
  • Social Media
    • Branding
    • Email Marketing
    • Video Marketing
  • Shop
The LinkxThe Linkx
Home»IoT»IKE Throttling for Cloud-based VPN Resiliency
IoT

IKE Throttling for Cloud-based VPN Resiliency

Editor-In-ChiefBy Editor-In-ChiefAugust 7, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
IKE Throttling for Cloud-based VPN Resiliency
Share
Facebook Twitter LinkedIn Pinterest Email


Additional Post Contributors: Maxime Peim, Benoit Ganne

Cloud-VPN & IKEv2 endpoints exposition to DoS attacks

Cloud-based VPN solutions commonly expose IKEv2 (Internet Key Exchange v2) endpoints to the public Internet to support scalable, on-demand tunnel establishment for customers. While this enables flexibility and broad accessibility, it also significantly increases the attack surface. These publicly reachable endpoints become attractive targets for Denial-of-Service (DoS) attacks, wherein adversaries can flood the key exchange servers with a high volume of IKE traffic.

Beyond the computational and memory overhead involved in handling large numbers of session initiations, such attacks can impose severe stress on the underlying system through extreme packet I/O rates, even before reaching the application layer. The combined effect of I/O saturation and protocol-level processing can lead to resource exhaustion, thereby preventing legitimate users from establishing new tunnels or maintaining existing ones — ultimately undermining the availability and reliability of the VPN service.

IKE flooding on a cloud-based VPNIKE flooding on a cloud-based VPN
Fig. 1:  IKE Flooding on Cloud-based VPN

Implementing a network-layer throttling mechanism

To enhance the resilience of our infrastructure against IKE-targeted DoS attacks, we implemented a generalized throttling mechanism at the network layer to limit the rate of IKE session initiations per source IP, without impacting IKE traffic associated with established tunnels. This approach reduces the processing burden on IKE servers by proactively filtering excessive traffic before it reaches the IKE server. In parallel, we deployed a tracking system to identify source IPs exhibiting patterns consistent with IKE flooding behavior, enabling rapid response to emerging threats. This network-level mitigation is designed to operate in tandem with complementary protection at the application layer, providing a layered defense strategy against both volumetric and protocol-specific attack vectors.

Protecting Cloud-based VPNs using IKE ThrottlingProtecting Cloud-based VPNs using IKE Throttling
Fig. 2:  Protecting Cloud-based VPNs using IKE Throttling

The implementation was done in our data-plane framework (based on FD.io/VPP – Vector Packet processor) by introducing a new node in the packet-processing path for IKE packets.

This custom node leverages the generic throttling mechanism available in VPP, with a balanced approach between memory-efficiency and accuracy: Throttling decisions are taken by inspecting the source IP addresses of incoming IKEv2 packets, processing them into a fixed-size hash table, and verifying if a collision has occurred with previously-seen IPs over the current throttling time interval.

IKE Throttling in the VPP node graph IKE Throttling in the VPP node graph
Fig. 3: IKE Throttling in the VPP node graph
IKE throttling - VPP node algorithmIKE throttling - VPP node algorithm
Fig. 4:  IKE Throttling – VPP node Algorithm

Minimizing the impact on legitimate users

Occasional false positives or unintended over-throttling may occur when distinct source IP addresses collide within the same hash bucket during a given throttling interval. This situation can arise due to hash collisions in the throttling data structure used for rate limiting. However, the practical impact is minimal in the context of IKEv2, as the protocol is inherently resilient to transient failures through its built-in retransmission mechanisms. Additionally, the throttling logic incorporates periodic re-randomization of the hash table seed at the end of each interval. This seed regeneration ensures that the probability of repeated collisions between the same set of source IPs across consecutive intervals remains statistically low, further reducing the likelihood of systematic throttling anomalies.

IKE throttling, IKE throttling reset mechanismIKE throttling, IKE throttling reset mechanism
Fig. 5:  IKE Throttling – IKE Throttling Reset Mechanism

Providing observability on high-rate initiators with a probabilistic approach

To complement the IKE throttling mechanism, we implemented an observability mechanism that retains metadata on throttled source IPs. This provides critical visibility into high-rate initiators and supports downstream mitigation of workflows. It employs a Least Frequently Used (LFU) 2-Random eviction policy, specifically chosen for its balance between accuracy and computational efficiency under high-load or adversarial conditions such as DoS attacks.

Rather than maintaining a fully ordered frequency list, which would be costly in a high-throughput data plane, LFU 2-Random approximates LFU behavior by randomly sampling two entries from the cache upon eviction and removing the one with the lower access frequency. This probabilistic approach ensures minimal memory and processing overhead, as well as faster adaptation to shifts in DoS traffic patterns, ensuring that attackers with historically high-frequency do not remain in the cache after being inactive for a certain period of time, which would impact observability on more recent active attackers (see Figure-6). The data collected is subsequently leveraged to trigger additional responses during IKE flooding scenarios, such as dynamically blacklisting malicious IPs and identifying legitimate users with potential misconfigurations that generate excessive IKE traffic.

Conducting consecutive DoS attack phases, and comparing each phase’s attacker cache presence over timeConducting consecutive DoS attack phases, and comparing each phase’s attacker cache presence over time
Fig. 6: LFU vs LFU 2-Random – Conducting consecutive DoS attack phases, and comparing each phase’s attacker cache presence over time

Closing Notes

We encourage similar Cloud-based VPN services and/or services exposing internet-facing IKEv2 server endpoints to proactively investigate similar mitigation mechanisms which would fit their architecture. This would increase systems resiliency to IKE flood attacks at a low computational cost, as well as offers critical visibility into active high-rate initiators to take further actions.


We’d love to hear what you think! Ask a question and stay connected with Cisco Security on social media.

Cisco Security Social Media

LinkedIn
Facebook
Instagram
X

Share:





Source link

Cloudbased IKE Resiliency Security Service Edge SSE Throttling VPN
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleIt’s no joke, Verizon customers are really leaving after losing their …
Next Article EVs have become a litmus test for whether we’re still America’s buddy …
Editor-In-Chief
  • Website

Related Posts

IoT

The Sky’s No Longer the Limit

October 15, 2025
IoT

Views from an Insider on the CCNP Automation Track: DCNAUTO 2.0 Editio…

October 14, 2025
IoT

Nordic Semiconductor, Sateliot and Gatehouse Satcom achieve breakthrou…

October 12, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

100+ TikTok Statistics Updated for December 2024

December 4, 202487 Views

How to Fix Cant Sign in Apple Account, Verification Code Not Received …

February 11, 202567 Views

Cisco Automation Developer Days 2025

February 10, 202522 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from thelinkx.com about tech, gadgets and trendings.

Please enable JavaScript in your browser to complete this form.
Loading
About Us

Welcome to TheLinkX – your trusted source for everything tech and gadgets! We’re passionate about exploring the latest innovations, diving deep into emerging trends, and helping you find the best tech products to suit your needs. Our mission is simple: to make technology accessible, engaging, and inspiring for everyone, from tech enthusiasts to casual users.

Our Picks

This Phone Will Auto Shut Display If Someone Peeking Your Phone Displa…

October 15, 2025

Mark Carney could make it easier for us to buy EVs if he wanted. Right…

October 15, 2025

The Sky’s No Longer the Limit

October 15, 2025

Subscribe to Updates

Get the latest tech news from thelinkx.com about tech, gadgets and trendings.

Please enable JavaScript in your browser to complete this form.
Loading
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2025 Thelinkx.All Rights Reserved Designed by Prince Ayaan

Type above and press Enter to search. Press Esc to cancel.