From: The role and security of firewalls in cyber-physical cloud computing
ID | Name |
---|---|
A | IP |
1 | Valid ICMP Request |
2 | Checksum invalid |
3 | Invalid packet length |
4 | Invalid header length |
5 | Reserved flag unequal zero |
6 | IP protocol number unequal ICMP, TCP, or UDP |
B | Fragmentation |
7 | Benign fragmentation |
8 | Overlapping fragmentation |
9 | Overlapping fragmentation without terminating fragment |
10 | Overlapping fragmentation in reverse order |
11 | Tiny fragments |
C | Transport layer protocols |
12 | Invalid source port (TCP) |
13 | Invalid source port (UDP) |
14 | Invalid destination port (TCP) |
15 | Invalid destination port (UDP) |
16 | Invalid checksum (TCP) |
17 | Invalid checksum (UDP) |
D | TCP flags |
18 | Null packet (no flags) |
19 | SYN, FIN |
20 | SYN, FIN, PSH |
21 | SYN, FIN, RST |
22 | SYN, FIN, RST, PSH |
23 | FIN |
E | Stateful behavior |
24 | SYN in established connection |
25 | ACK without ACK number |
F | Application layer |
26 | Improper HTTP request |