An Analysis of DHCP Vulnerabilities, Attacks, and Countermeasures

被引:2
作者
AbdulGhaffar, AbdulAziz [1 ]
Paul, Sumit Kumar [2 ]
Matrawy, Ashraf [3 ]
机构
[1] Carleton Univ, Dept Syst & Comp Engn, Ottawa, ON, Canada
[2] Univ Ottawa, Dept Elect & Comp Engn, Ottawa, ON, Canada
[3] Carleton Univ, Sch Informat Technol, Ottawa, ON, Canada
来源
2023 BIENNIAL SYMPOSIUM ON COMMUNICATIONS, BSC | 2023年
关键词
DHCP; Starvation Attack; DoS Attack; Rogue server; Spoofing; Phishing attack; Replay attack; Man-in-themiddle attack;
D O I
10.1109/BSC57238.2023.10201458
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A large number of devices use the Dynamic Host Control Protocol (DHCP) protocol to obtain network configurations like IP address, gateway, Domain Name System (DNS) address, etc. However, the security aspect was not considered thoroughly during its design phase. As a result, it has several very lucrative vulnerabilities to many attackers. In this analysis, we discuss the major vulnerabilities of the DHCP protocol that can result in different attacks. These vulnerabilities include a lack of authentication, confidentiality, and integrity. We also explain different attacks that can be performed by exploiting these vulnerabilities, like rogue DHCP server attacks, DHCP starvation attacks, or replay attacks. Furthermore, we summarize the countermeasures proposed by the researchers to nullify and mitigate these attacks. Moreover, the advantages and drawbacks of the countermeasures are also discussed in this paper.
引用
收藏
页码:119 / 124
页数:6
相关论文
共 34 条
[21]  
Prabadevi B, 2018, Indonesian Journal of Electrical Engineering and Computer Science, V12, P1117, DOI 10.11591/ijeecs.v12.i3.pp1117-1125
[22]   An SDN-Based Approach to Ward Off LAN Attacks [J].
Rietz, Rene ;
Cwalinski, Radoslaw ;
Koenig, Hartmut ;
Brinner, Andreas .
JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2018, 2018
[23]  
Shete Aishwarya, 2018, 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI). Proceedings, P136, DOI 10.1109/ICOEI.2018.8553753
[24]  
Simpson W., 1996, Ppp challenge handshake authentication protocol chap
[25]   Security analysis of SDN controller-based DHCP services and attack mitigation with DHCPguard [J].
Tok, Mevlut Serkan ;
Demirci, Mehmet .
COMPUTERS & SECURITY, 2021, 109
[26]  
Tong Y., 2019, P 2019 2 INT C DATA, P267
[27]  
Toprak C, 2018, 2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), P636, DOI 10.1109/UBMK.2018.8566268
[28]  
Tripathi N., 2017, 2016 IEEE INT C ADV, DOI 10.1109/ANTS.2016.7947848
[29]  
Tripathi N, 2015, IEEE I C ADV NETW TE
[30]  
Wang JL, 2017, 2017 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING, P529, DOI 10.1109/DESEC.2017.8073876