共 22 条
[1]
WANG H B, WANG J H, WANG J L, Et al., Squeezing the gap: an empirical study on DHCP performance in a large-scale wireless network, IEEE/ACM Transactions on Networking, 28, 2, pp. 832-845, (2020)
[2]
AL-ANI A, ANBAR M, HASBULLAH I H, Et al., Authentication and privacy approach for DHCPv6, IEEE Access, 7, pp. 73144-73156, (2019)
[3]
CONTI M, DRAGONI N, LESYK V., A survey of man in the middle attacks, IEEE Communications Surveys & Tutorials, 18, 3, pp. 2027-2051, (2016)
[4]
DROMS R., Authentication for DHCP messages, (2001)
[5]
YOUNES O S., A secure DHCP protocol to mitigate LAN attacks, Journal of Computer and Communications, 4, 1, pp. 39-50, (2016)
[6]
YOO K J, KIM E G., Design and implementation of DHCP supporting network attack prevention, Journal of the Korea Institute of Information & Communication Engineering, 20, 4, pp. 747-754, (2016)
[7]
ZHANG F Q, CHEN L., OTP_SAM: DHCP security authentication model based on OTP, 2016 IEEE 20th International Conference on Computer Supported Cooperative Work in Design, pp. 346-350, (2016)
[8]
DINU D D, TOGAN M., DHCP server authentication using digital certificates, 2014 10th International Conference on Communications, pp. 1-6, (2014)
[9]
TRIPATHI N, HUBBALLI N., A probabilistic anomaly detection scheme to detect DHCP starvation attacks, 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems, pp. 1-6, (2016)
[10]
CALVERT C, KHOSHGOFTAAR T M, NAJAFABADI M M, Et al., A procedure for collecting and labeling man-in-the-middle attack traffic, Inter-national Journal of Reliability, Quality and Safety Engineering, 24, 1, (2017)