2003
DOI: 10.1007/3-540-45067-x_20
|View full text |Cite
|
Sign up to set email alerts
|

Malicious ICMP Tunneling: Defense against the Vulnerability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2005
2005
2020
2020

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 25 publications
(13 citation statements)
references
References 2 publications
0
13
0
Order By: Relevance
“…Many of the channels described earlier can be eliminated by normalising protocol headers, padding and extensions as described by Malan et al [101], Handley et al [102] and Fisk et al [4] in general, or more specifically for the IPv6 protocol by Lucena et al [37] and ICMP tunneling by Singh [103]. Traffic normalisation can be performed by end hosts or by network devices such as firewalls or proxies.…”
Section: Traffic Normalizationmentioning
confidence: 99%
“…Many of the channels described earlier can be eliminated by normalising protocol headers, padding and extensions as described by Malan et al [101], Handley et al [102] and Fisk et al [4] in general, or more specifically for the IPv6 protocol by Lucena et al [37] and ICMP tunneling by Singh [103]. Traffic normalisation can be performed by end hosts or by network devices such as firewalls or proxies.…”
Section: Traffic Normalizationmentioning
confidence: 99%
“…If active attackers can manipulate the network traffic by RST attacks [22] or by using the ICMP traffic method [23], or by controlling the local DNS server, they could launch an privacy reduction attack against our random noise based range query protocol. The method of the active privacy reduction attack is based on dropping the query range…”
Section: Active Privacy Reduction Attackmentioning
confidence: 99%
“…Additional defensive research has been performed to further limit the capabilities of ICMP covert channels. A Linux kernel module was developed to scan ICMP messages for specific signatures such as passwd, root, etc, ls and dir [5]. If these signatures were detected, the ICMP message was essentially scrubbed by zeroing out the data field while being processed by the network stack.…”
Section: Related Workmentioning
confidence: 99%