The ICMP protocol has been widely used and accepted as a covert channel. While the ICMP protocol is very simple to use, modern security approaches such as firewalls, deep-packet inspection and intrusion detection systems threaten the use of ICMP for a reliable means for a covert channel. This study explores the modern usefulness of ICMP with typical security measures in place. Existing ICMP covert channel solutions are examined for compliance with standard RFCs and resiliency with modern security approaches.
Date of creation, presentation, or exhibit
Department, Program, or Center
Department of Computing Security (GCCIS)
Stokes K., Yuan B., Johnson D., Lutz P. (2010) ICMP Covert Channel Resiliency. In: Elleithy K., Sobh T., Iskander M., Kapila V., Karim M., Mahmood A. (eds) Technological Developments in Networking, Education and Automation. Springer, Dordrecht
RIT – Main Campus