MITIGATING DHCP STARVATION ATTACK USING SNOOPING TECHNIQUE

  • Abdulhafiz A. Nuhu
  • Faith O. Echobu
  • Oyenike M. Olanrewaju
Keywords: DHCP, DHCP Starvation Attack, DHCP Snooping, GNS3

Abstract

Over the years, devices and the use of networks has grown by leaps and bounds thereby making the Dynamic Host Configuration Protocol (DHCP) a very important network management tool. Initially, the protocol focused more on ease of use rather than security, which made it vulnerable to attacks like DHCP starvation among others. There are techniques which have been developed over the years to mitigate attacks to the DHCP server. This research used DHCP snooping to mitigate the attack to achieve a more secured network. The experiment was done in a virtual environment using GNS3. Due to the type of malicious packets that was generated during attack, the LAN was isolated from the Internet to avoid any destruction. The experiment demonstrated how easy it was to attack and exhaust DHCP pool of address thereby prohibited the legitimate client from getting IP address. The research also demonstrated the mitigation of DHCP starvation attack by using DHCP snooping.

References

Atul, K., & Jevitha, K. (2017). Prevention of PAC File Based Attack Using DHCP Snooping. Security in Computing Communications (pp. 195–204. DOI: 10.1007/978-981-10-6898-0_16). Springer Nature Singapore Pte Ltd.

Harris, M. (2016, February 9). DHCP Snooping: Basic Concepts and Configuration. Retrieved from Pearson IT Certification: https://www.pearsonitcertification.com/articles/printerfriendly/2474170

Hubballi, N., & Tripathi, N. (2016). A Closer Look into DHCP Starvation Attack in Wireless Networks. Computers & Security, DOI: 10.1016/j.cose.2016.10.002.

Mitra, A. (2019, October 25). What is DHCP Starvation attack and how does it work? Retrieved from The Security Buddy: https://www.thesecuritybuddy.com/network-security/what-is-dhcp-starvation-attack-and-how-does-it-work/

Mukhtar, H., Salah, K., & Iraqi, Y. (2012). Mitigation of DHCP starvation attack. Computers and Electrical Engineering 338(5), 1115–1128; DOI: 10.1016/j.compeleceng.2012.06.005.

Neumann, J. C (2015). The book of GNS3: build virtual network labs using Cisco, Jupiter, and more. San Francisco: No Starch press.

Rooney, T. (2011). Introduction to IP Address Management. John Wiley & Sons; pp55.

Tripathi, N., & Hubballi, N. (2017). Detecting Stealth DHCP Starvation Attack using Machine. Journal of Computer Virology and Hacking Technique, 1-12; DOI: 10.1007/s11416-017-0310-x.

Younes, O. S. (2016). A Secure DHCP Protocol to Mitigate LAN Attacks. Journal of Computer and Communications, 4, 39-50. . http://dx.doi.org/10.4236/jcc.2016.41005.

Published
2020-04-14
How to Cite
NuhuA. A., EchobuF. O., & OlanrewajuO. M. (2020). MITIGATING DHCP STARVATION ATTACK USING SNOOPING TECHNIQUE. FUDMA JOURNAL OF SCIENCES, 4(1), 560 - 566. Retrieved from https://fjs.fudutsinma.edu.ng/index.php/fjs/article/view/82