Description
The ICMP protocol has been widely used and accepted as a covert channel. While the ICMP protocol is very simple to use, modern security approaches such as firewalls, deep-packet inspection and intrusion detection systems threaten the use of ICMP for a reliable means for a covert channel. This study explores the modern usefulness of ICMP with typical security measures in place. Existing ICMP covert channel solutions are examined for compliance with standard RFCs and resiliency with modern security approaches.
Date of creation, presentation, or exhibit
2010
Document Type
Conference Paper
Department, Program, or Center
Department of Computing Security (GCCIS)
Recommended Citation
Stokes K., Yuan B., Johnson D., Lutz P. (2010) ICMP Covert Channel Resiliency. In: Elleithy K., Sobh T., Iskander M., Kapila V., Karim M., Mahmood A. (eds) Technological Developments in Networking, Education and Automation. Springer, Dordrecht
Campus
RIT – Main Campus
Comments
This is the pre-print of a paper published by Springer. The final publication is available at link.springer.com via https://doi.org/10.1007/978-90-481-9151-2_87
Copyright 2010 Springer
Note: imported from RIT’s Digital Media Library running on DSpace to RIT Scholar Works in February 2014.