DHCP attacking tools: an analysis

被引:11
作者
Aldaoud, Manar [1 ]
Al-Abri, Dawood [1 ]
Al Maashri, Ahmed [1 ]
Kausar, Firdous [1 ]
机构
[1] Sultan Qaboos Univ, Dept Elect & Comp Engn, POB 33, Al Khoud 123, Oman
关键词
DHCP; DHCP attacking tools; Attack classification; Attack signature; Attack analysis;
D O I
10.1007/s11416-020-00374-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, many new devices with network capabilities are constantly being connected to existing networks. Consequently, the need for an automatic and dynamic approach to supply critical network settings to these new nodes is indispensable in large networks, which is mainly provided by the dynamic host configuration protocol (DHCP). Unfortunately, the vulnerabilities of this protocol can be exploited to attack such large networks. This paper conducts the first detailed, systematic, and thorough study of the publicly known DHCP attacking tools that target the DHCP service. The study analyses DHCP packet traces to scrutinise the DHCP attacking tools, analyse their raw packets, and identify their characteristics. It also classifies DHCP attacking tools by their characteristics, impact on DHCP service, and signatures. Furthermore, a detection mechanism is proposed that is based on both fingerprint and behavioural signatures. The findings of this study will be very useful to enhance DHCP implementations and to develop efficient detection and mitigation methods.
引用
收藏
页码:119 / 129
页数:11
相关论文
共 26 条
[1]  
Abri D.A, 2015, 2015 IEEE INT C IND
[2]  
Akashi S., 2019, CLASSIFICATION DHCP, P233
[3]  
Alexander S., 1997, DHCP OPTIONS BOOTP V
[4]  
Arun R.K.P., 2009, 2009 IEEE INT ADV CO
[5]  
Bargot B., 2019, 2019 6 INT C COMP SU
[6]  
Bhaiji Y, 2006, SANOG8
[7]   Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions [J].
Bhuyan, Monowar H. ;
Kashyap, H. J. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
COMPUTER JOURNAL, 2014, 57 (04) :537-556
[8]  
Cisco, CAT 4500 SER SWITCH, V12.2
[9]  
Conti G., 2004, PASSIVE VISUAL FINGE
[10]  
Demerjian J., 2004, SECURITY PROTECTION