Stokes et al., 2010 - Google Patents
ICMP covert channel resiliencyStokes et al., 2010
View PDF- Document ID
- 4840655800321637344
- Author
- Stokes K
- Yuan B
- Johnson D
- Lutz P
- Publication year
- Publication venue
- Technological Developments in Networking, Education and Automation
External Links
Snippet
The ICMP protocol has been widely used and accepted as a covert channel. While the ICMP protocol is very simple to use, modern security approaches such as Firewalls, deep-packet inspection and intrusion detection systems threaten the use of ICMP for a reliable means for …
- 238000001514 detection method 0 abstract description 6
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12231403B2 (en) | Cloud-based intrusion prevention system, multi-tenant firewall, and stream scanner | |
US11811809B2 (en) | Rule-based network-threat detection for encrypted communications | |
US10931797B2 (en) | Correlating packets in communications networks | |
US7797411B1 (en) | Detection and prevention of encapsulated network attacks using an intermediate device | |
US10498618B2 (en) | Attributing network address translation device processed traffic to individual hosts | |
WO2007073971A1 (en) | Distributed network protection | |
Mukkamala et al. | A survey on the different firewall technologies | |
WO2020214660A1 (en) | Efficient protection for a virtual private network | |
Abdulla | Survey of security issues in IPv4 to IPv6 tunnel transition mechanisms | |
Stokes et al. | ICMP covert channel resiliency | |
Cisco | Command Reference | |
Cisco | Command Reference | |
Johnson et al. | ICMP covert channel resiliency | |
Herrera | How secure is the next-generation internet? An examination of IPv6 | |
van Oorschot | Firewalls and tunnels | |
Pahlevan | Signaling and Policy Enforcement for Cooperative Firewalls | |
Bahnasse et al. | Security of Dynamic and Multipoint Virtual Private Network | |
Hoagland et al. | Windows vista network attack surface analysis | |
Trabelsi | Switched network sniffers detection technique based on IP packet routing | |
McGann | IPv6 packet filtering | |
Jayaraman | A Study on the Network Security Aspects in IPv6 | |
Parameswari et al. | ARP Protocol Sequence Analysis for Intrusion Detection System | |
Sharma et al. | Network Security and Networking Protocols | |
Luomala | A tool for generating protocol dissectors for Wireshark in Lua | |
Zhou | Comparing Dedicated and Integrated Firewall Performance |