首页> 外文会议>Information Security and Privacy >Malicious ICMP Tunneling: Defense against the Vulnerability
【24h】

Malicious ICMP Tunneling: Defense against the Vulnerability

机译:恶意的ICMP隧道:防御漏洞

获取原文

摘要

This paper presents a systematic solution to the problem of using ICMP tunneling for covert channel. ICMP is not multiplexed via port numbers and the data part of the ICMP packet provides considerable bandwidth for malicious covert channels. These factors make it an integral part of many malicious software like remote access and denial of service attack tools. These tools use ICMP to establish covert communication channels. In this paper a stateless model is proposed to prevent ICMP tunneling. A Linux kernel module was implemented to demonstrate the proposed stateless solution. The module enforces a fixed pay-load policy for ICMP packets and virtually eliminates ICMP tunneling which arises due to the data carrying capability of ICMP. The performance impact on end hosts and routers due to the stateless monitoring model is described.
机译:本文针对使用ICMP隧道进行隐蔽信道的问题提出了一种系统的解决方案。 ICMP没有通过端口号进行多路复用,并且ICMP数据包的数据部分为恶意隐蔽通道提供了相当大的带宽。这些因素使它成为许多恶意软件不可或缺的一部分,例如远程访问和拒绝服务攻击工具。这些工具使用ICMP建立秘密通信渠道。本文提出了一种无状态模型来防止ICMP隧道传输。实施了Linux内核模块以演示所提出的无状态解决方案。该模块对ICMP数据包执行固定的有效负载策略,并实际上消除了由于ICMP的数据承载能力而引起的ICMP隧道传输。描述了由于无状态监视模型而对最终主机和路由器的性能影响。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号