Abstract

DHCP is an important aspect in small and large networks, since it facilitates the IP configuration of computers. However, DHCP is vulnerable to different attacks; therefore, the essential objective of this paper is to propose solutions against DHCP attacks. The paper gives an explanation about how DHCP works and understand the handshake mechanism and give a brief summary about DHCP attack, how they occur and how they affect the security of the enterprise since a leakage of sensitive Information could happen, which threatens the enterprise's security or a denial of service that immobilizes the network. Three effective countermeasures are looked up and tested against DHCP attacks, and each one successfully prevented the attack.

Highlights

  • Nowadays everything has changed, thousands, if not tens of thousands, of devices, are connected to a network using the traditional DHCP protocol

  • DHCP handshake is transmitted in clear text and there is no mechanism for authentication which means clients are not sure if they got the network configuration parameters from a trusted DHCP server; it makes the DHCP protocol susceptible to DoS attacks

  • DHCP was first described as a policy protocol at RFC 1531 in October 1993, as an extension of the Bootstrap Protocol (BOOTP), a network protocol used by a network client to obtain an IP address in a server configuration [3]

Read more

Summary

Introduction

Thousands, if not tens of thousands, of devices, are connected to a network using the traditional DHCP protocol. DHCP handshake is transmitted in clear text and there is no mechanism for authentication which means clients are not sure if they got the network configuration parameters from a trusted DHCP server; it makes the DHCP protocol susceptible to DoS attacks. DHCPACK or DHCPNACK, the intended server will note that its lease has been chosen It checks its databases if this lease is still available if so, it creates an entry in the database for that client and sends back a DHCPACK message that contains network configurations parameters and the allocated IP address to the client. If the lease is no longer available it sends back a DHCPNACK and the client will initiate a new handshake with the server [1] [6]

Objectives
Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.