An Analysis of DHCP Vulnerabilities, Attacks, and Countermeasures

被引:1
|
作者
AbdulGhaffar, AbdulAziz [1 ]
Paul, Sumit Kumar [2 ]
Matrawy, Ashraf [3 ]
机构
[1] Carleton Univ, Dept Syst & Comp Engn, Ottawa, ON, Canada
[2] Univ Ottawa, Dept Elect & Comp Engn, Ottawa, ON, Canada
[3] Carleton Univ, Sch Informat Technol, Ottawa, ON, Canada
关键词
DHCP; Starvation Attack; DoS Attack; Rogue server; Spoofing; Phishing attack; Replay attack; Man-in-themiddle attack;
D O I
10.1109/BSC57238.2023.10201458
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A large number of devices use the Dynamic Host Control Protocol (DHCP) protocol to obtain network configurations like IP address, gateway, Domain Name System (DNS) address, etc. However, the security aspect was not considered thoroughly during its design phase. As a result, it has several very lucrative vulnerabilities to many attackers. In this analysis, we discuss the major vulnerabilities of the DHCP protocol that can result in different attacks. These vulnerabilities include a lack of authentication, confidentiality, and integrity. We also explain different attacks that can be performed by exploiting these vulnerabilities, like rogue DHCP server attacks, DHCP starvation attacks, or replay attacks. Furthermore, we summarize the countermeasures proposed by the researchers to nullify and mitigate these attacks. Moreover, the advantages and drawbacks of the countermeasures are also discussed in this paper.
引用
收藏
页码:119 / 124
页数:6
相关论文
共 50 条
  • [1] Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures
    Butun, Ismail
    Osterberg, Patrik
    Song, Houbing
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01): : 616 - 644
  • [2] Vulnerabilities and attacks assessments in blockchain 1.0, 2.0 and 3.0: tools, analysis and countermeasures
    Hamdi, Ahlem
    Fourati, Lamia
    Ayed, Samiha
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (02) : 713 - 757
  • [3] Vulnerabilities and attacks assessments in blockchain 1.0, 2.0 and 3.0: tools, analysis and countermeasures
    Ahlem Hamdi
    Lamia Fourati
    Samiha Ayed
    International Journal of Information Security, 2024, 23 : 713 - 757
  • [4] Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations
    Yaacoub, Jean-Paul A.
    Noura, Hassan N.
    Salman, Ola
    Chehab, Ali
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (01) : 115 - 158
  • [5] Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations
    Jean-Paul A. Yaacoub
    Hassan N. Noura
    Ola Salman
    Ali Chehab
    International Journal of Information Security, 2022, 21 : 115 - 158
  • [6] Analysis of Security Vulnerabilities and Countermeasures
    Son, Hyun-Min
    Joo, Nak-Keun
    Choi, Hyun-Taek
    Lee, Hyun-Cheol
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (02): : 200 - 206
  • [7] BLOCKCHAIN APPROACH TO CYBER SECURITY VULNERABILITIES ATTACKS AND POTENTIAL COUNTERMEASURES
    Sambana, Bosubabu
    Ramesh, Yegireddi
    Rao, Molli Srinivasa
    Rao, T. Chalapathi
    Patnaik, N. P. M.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2020, 14 (01): : 1 - 14
  • [8] Vulnerabilities in SDN Topology Discovery Mechanism: Novel Attacks and Countermeasures
    Deng, Shuhua
    Dai, Wenjie
    Qing, Xian
    Gao, Xieping
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 2541 - 2551
  • [9] The Insecurity of Home Digital Voice Assistants - Vulnerabilities, Attacks and Countermeasures
    Lei, Xinyu
    Tu, Guan-Hua
    Liu, Alex X.
    Li, Chi-Yu
    Xie, Tian
    2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,
  • [10] Insecurity of Operational IMS Call Systems: Vulnerabilities, Attacks, and Countermeasures
    Lu, Yu-Han
    Hsiao, Sandy Hsin-Yu
    Li, Chi-Yu
    Hsieh, Yi-Chen
    Chou, Po-Yi
    Li, Yao-Yu
    Xie, Tian
    Tu, Guan-Hua
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2023, 31 (02) : 800 - 815