Abstract
This paper presents a systematic solution to the problem of using ICMP tunneling for covert channel. ICMP is not multiplexed via port numbers and the data part of the ICMP packet provides considerable bandwidth for malicious covert channels. These factors make it an integral part of many malicious software like remote access and denial of service attack tools. These tools use ICMP to establish covert communication channels. In this paper a stateless model is proposed to prevent ICMP tunneling. A Linux kernel module was implemented to demonstrate the proposed stateless solution. The module enforces a fixed payload policy for ICMP packets and virtually eliminates ICMP tunneling which arises due to the data carrying capability of ICMP. The performance impact on end hosts and routers due to the stateless monitoring model is described.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
CERT Advisory. Denial of service attack tools. http://www.cert.org/advisories/CA-1999-17.html.
Backorifice SDK Documents. http://bo2k.sourceforge.net/indexnews.html.
Root Exploit and Dos in the Linux Kernel. http://linux.oreillynet.com/pub/a/linux/2001/10/22/insecurities.html.
ISS. Loki icmp tunneling back door. http://www.iss.net/securitycenter/static/1452.php.
Postel J. Internet control mesage protocol — darpa internet program protocol specification. RFC 792, September 1981.
Postel J. Internet protocol — darpa internet program protocol specification. RFC 791, September 1981.
Phrack. Loki 2(the implementation). http://www.phrack.com/show.php?p=51&a=6.
Phrack. Project loki. http://www.phrack.com/show.php?p=49&a=6.
Guido Van Rooji. Real stateful tcp packet filtering. In 10th USENIX Secutrity Symposium, August 2001.
Craig H. Rowland. Covert channels in the tcp/ip protocol suite. http://www.firstmonday.dk/issues/issue25/rowland.
Sans. Icmp attacks illustrated. http://www.sans.org/rr/threats/ICMP attacks.php.
Sans. Intrusion detection faqs. http://www.sans.org/resources/dfaq/icmp misuses.php.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Singh, A., Nordström, O., Lu, C., dos Santos, A.L.M. (2003). Malicious ICMP Tunneling: Defense against the Vulnerability. In: Safavi-Naini, R., Seberry, J. (eds) Information Security and Privacy. ACISP 2003. Lecture Notes in Computer Science, vol 2727. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45067-X_20
Download citation
DOI: https://doi.org/10.1007/3-540-45067-X_20
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40515-3
Online ISBN: 978-3-540-45067-2
eBook Packages: Springer Book Archive