SBC Threat Protection
UDPÂ Threats
 UDP Short Header
UDPÂ Flood
UDP spoofed  boradcast  echo (Fraggle Attack)
 UDP attack  on  diag ports (Pepsi Attack)
RTPÂ Threats
RTPÂ rogue packets (after-call)
RTPÂ flooding during call
RTPÂ flooding attacks
RTPÂ spoofing
SIPÂ Threats
SDPÂ malformed contents (Protos Test)
SIPÂ malformed packet
SIPÂ request message flood attack
  SIP response message flood attack
SIPÂ Invite spoof
SIPÂ Register spoof
SIPÂ Registerfloodattack
SIPÂ request spoof
SIPÂ response spoof
SIPÂ end-callattack
IP Threat
Unknown Protocol
ARPÂ Flood (Poink Attack)
IP Stream Option
IP Spoofing
IP Source Route Option, Strict
IP Source Route Option, Loose
IP Short Header
IP Malformed Packet
IP bad Option
IP address Session Limit
Fragments – too many
Fragments, Large – Offset
Fragments – Storm
Fragments – Same Offset
Fragments – Reassembly w/different offsets (tear drop)
Fragments – Reassembly w/different offsets and padding (new tear attack)
Fragments – Reassembly w/different offsets and oversize (Bonk/Boink attack)
Fragments – Reassembly off by one IP header (Nestea attack)
Fragments – flood initial fragment only (Rose Attack)
Fragments – Deny
ICMPÂ Threat
ICMPÂ Source quench
ICMPÂ mask request
ICMPÂ large packet(>1472)
ICMP oversized packet(>65536) – ping of death/ssping attack)
ICMPÂ info request
ICMPÂ incompatible fragment (jolt attack)
ICMPÂ flood
ICMPÂ broadcast with spoofed source (Smurf/Pong attack)
ICMP error  packets flood (Trash attack)
ICMPÂ spoofed unreachable (Click attack)
ICMPÂ spoofed unreachable flood (smack/bloop/puke attack)
TCPÂ Threat
TCPÂ Packets without flag
TCPÂ packets, oversized
TCP FIN bit with no ACK bit
TCP packet with URG/OOB flag (nuke attack)
TCP SYN fragments – reassembly with overlap (syndrop attack)
SYNÂ fragment
SYNÂ attack w/ip spoofing (land attack)
SYNÂ attack (syn flood)
SYN and FIN bits set
Scan attack– TCP port
Â