DHCP attacking tools: an analysis

被引:11
|
作者
Aldaoud, Manar [1 ]
Al-Abri, Dawood [1 ]
Al Maashri, Ahmed [1 ]
Kausar, Firdous [1 ]
机构
[1] Sultan Qaboos Univ, Dept Elect & Comp Engn, POB 33, Al Khoud 123, Oman
关键词
DHCP; DHCP attacking tools; Attack classification; Attack signature; Attack analysis;
D O I
10.1007/s11416-020-00374-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, many new devices with network capabilities are constantly being connected to existing networks. Consequently, the need for an automatic and dynamic approach to supply critical network settings to these new nodes is indispensable in large networks, which is mainly provided by the dynamic host configuration protocol (DHCP). Unfortunately, the vulnerabilities of this protocol can be exploited to attack such large networks. This paper conducts the first detailed, systematic, and thorough study of the publicly known DHCP attacking tools that target the DHCP service. The study analyses DHCP packet traces to scrutinise the DHCP attacking tools, analyse their raw packets, and identify their characteristics. It also classifies DHCP attacking tools by their characteristics, impact on DHCP service, and signatures. Furthermore, a detection mechanism is proposed that is based on both fingerprint and behavioural signatures. The findings of this study will be very useful to enhance DHCP implementations and to develop efficient detection and mitigation methods.
引用
收藏
页码:119 / 129
页数:11
相关论文
共 50 条
  • [1] DHCP attacking tools: an analysis
    Manar Aldaoud
    Dawood Al-Abri
    Ahmed Al Maashri
    Firdous Kausar
    Journal of Computer Virology and Hacking Techniques, 2021, 17 : 119 - 129
  • [2] Tools for Attacking Tumors
    Mohtashami, Yahya
    Hung Luyen
    Sawicki, James F.
    Shea, Jacob D.
    Behdad, Nader
    Hagness, Susan C.
    IEEE ANTENNAS AND PROPAGATION MAGAZINE, 2018, 60 (06) : 52 - 57
  • [3] Tools for attacking layer 2 network infrastructure
    Yeung, Kai-Hau
    Fung, Dereck
    Wong, Kin-Yeung
    IMECS 2008: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2008, : 1143 - 1148
  • [5] An Analysis of DHCP Vulnerabilities, Attacks, and Countermeasures
    AbdulGhaffar, AbdulAziz
    Paul, Sumit Kumar
    Matrawy, Ashraf
    2023 BIENNIAL SYMPOSIUM ON COMMUNICATIONS, BSC, 2023, : 119 - 124
  • [6] Mules, Seals, and Attacking Tools: Analyzing 12 Online Marketplaces
    Zhao, Ziming
    Sankaran, Mukund
    Ahn, Gail-Joon
    Holt, Thomas J.
    Jing, Yiming
    Hu, Hongxin
    IEEE SECURITY & PRIVACY, 2016, 14 (03) : 32 - 43
  • [7] DHCP协议及DHCP RELAY
    梁金
    科技资讯, 2010, (12) : 29 - 29
  • [8] Some tools for attacking secure communication systems employing chaotic carriers
    Ogorzalek, MJ
    Dedieu, H
    ISCAS '98 - PROCEEDINGS OF THE 1998 INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-6, 1998, : C522 - C525
  • [9] 基于DHCP SNOOPING的DHCP网络部署
    孙雁杰
    刘良
    科技风, 2017, (06) : 93+114 - 93
  • [10] NDS and DHCP: configuring the DHCP service in NetWare 5
    NetWare Connection, 1999, 10 (04): : 18 - 26