Technological Developments in Networking, Education and Automation 2010
DOI: 10.1007/978-90-481-9151-2_87
|View full text |Cite
|
Sign up to set email alerts
|

ICMP Covert Channel Resiliency

Abstract: The ICMP protocol has been widely used and accepted as a covert channel. While the ICMP protocol is very simple to use, modern security approaches such as firewalls, deep-packet inspection and intrusion detection systems threaten the use of ICMP for a reliable means for a covert channel. This study explores the modern usefulness of ICMP with typical security measures in place. Existing ICMP covert channel solutions are examined for compliance with standard RFCs and resiliency with modern security approaches.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…After a training phase, they built an SVM classifier able to discern suspect ICMP packets. In [8] K. Stokes et al tested the efficiency of firewalls and IDS to detect ICMP based hidden channels. They concluded that covert channels can easily defeat many modern security appliances if ICMP protocol is permitted.…”
Section: Related Workmentioning
confidence: 99%
“…After a training phase, they built an SVM classifier able to discern suspect ICMP packets. In [8] K. Stokes et al tested the efficiency of firewalls and IDS to detect ICMP based hidden channels. They concluded that covert channels can easily defeat many modern security appliances if ICMP protocol is permitted.…”
Section: Related Workmentioning
confidence: 99%
“…It offers password protection with SHA-256 and ability to change usage of ICMP codes within the application. These payload tunnels are further examined in [111] for resiliency with modern security approaches. Ping tunnel [110] allows to reliably tunnel TCP connections to a remote host using ICMP Echo Request and Echo Response packets.…”
Section: Need Of Synchronizationmentioning
confidence: 99%