[go: up one dir, main page]

Stokes et al., 2010 - Google Patents

ICMP covert channel resiliency

Stokes et al., 2010

View PDF
Document ID
4840655800321637344
Author
Stokes K
Yuan B
Johnson D
Lutz P
Publication year
Publication venue
Technological Developments in Networking, Education and Automation

External Links

Snippet

The ICMP protocol has been widely used and accepted as a covert channel. While the ICMP protocol is very simple to use, modern security approaches such as Firewalls, deep-packet inspection and intrusion detection systems threaten the use of ICMP for a reliable means for …
Continue reading at repository.rit.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
US12231403B2 (en) Cloud-based intrusion prevention system, multi-tenant firewall, and stream scanner
US11811809B2 (en) Rule-based network-threat detection for encrypted communications
US10931797B2 (en) Correlating packets in communications networks
US7797411B1 (en) Detection and prevention of encapsulated network attacks using an intermediate device
US10498618B2 (en) Attributing network address translation device processed traffic to individual hosts
WO2007073971A1 (en) Distributed network protection
Mukkamala et al. A survey on the different firewall technologies
WO2020214660A1 (en) Efficient protection for a virtual private network
Abdulla Survey of security issues in IPv4 to IPv6 tunnel transition mechanisms
Stokes et al. ICMP covert channel resiliency
Cisco Command Reference
Cisco Command Reference
Johnson et al. ICMP covert channel resiliency
Herrera How secure is the next-generation internet? An examination of IPv6
van Oorschot Firewalls and tunnels
Pahlevan Signaling and Policy Enforcement for Cooperative Firewalls
Bahnasse et al. Security of Dynamic and Multipoint Virtual Private Network
Hoagland et al. Windows vista network attack surface analysis
Trabelsi Switched network sniffers detection technique based on IP packet routing
McGann IPv6 packet filtering
Jayaraman A Study on the Network Security Aspects in IPv6
Parameswari et al. ARP Protocol Sequence Analysis for Intrusion Detection System
Sharma et al. Network Security and Networking Protocols
Luomala A tool for generating protocol dissectors for Wireshark in Lua
Zhou Comparing Dedicated and Integrated Firewall Performance