• Abdulhafiz A. Nuhu
  • Faith O. Echobu
  • Oyenike M. Olanrewaju
Keywords: DHCP, DHCP Starvation Attack, DHCP Snooping, GNS3


Over the years, devices and the use of networks has grown by leaps and bounds thereby making the Dynamic Host Configuration Protocol (DHCP) a very important network management tool. Initially, the protocol focused more on ease of use rather than security, which made it vulnerable to attacks like DHCP starvation among others. There are techniques which have been developed over the years to mitigate attacks to the DHCP server. This research used DHCP snooping to mitigate the attack to achieve a more secured network. The experiment was done in a virtual environment using GNS3. Due to the type of malicious packets that was generated during attack, the LAN was isolated from the Internet to avoid any destruction. The experiment demonstrated how easy it was to attack and exhaust DHCP pool of address thereby prohibited the legitimate client from getting IP address. The research also demonstrated the mitigation of DHCP starvation attack by using DHCP snooping.


Atul, K., & Jevitha, K. (2017). Prevention of PAC File Based Attack Using DHCP Snooping. Security in Computing Communications (pp. 195–204. DOI: 10.1007/978-981-10-6898-0_16). Springer Nature Singapore Pte Ltd.

Harris, M. (2016, February 9). DHCP Snooping: Basic Concepts and Configuration. Retrieved from Pearson IT Certification:

Hubballi, N., & Tripathi, N. (2016). A Closer Look into DHCP Starvation Attack in Wireless Networks. Computers & Security, DOI: 10.1016/j.cose.2016.10.002.

Mitra, A. (2019, October 25). What is DHCP Starvation attack and how does it work? Retrieved from The Security Buddy:

Mukhtar, H., Salah, K., & Iraqi, Y. (2012). Mitigation of DHCP starvation attack. Computers and Electrical Engineering 338(5), 1115–1128; DOI: 10.1016/j.compeleceng.2012.06.005.

Neumann, J. C (2015). The book of GNS3: build virtual network labs using Cisco, Jupiter, and more. San Francisco: No Starch press.

Rooney, T. (2011). Introduction to IP Address Management. John Wiley & Sons; pp55.

Tripathi, N., & Hubballi, N. (2017). Detecting Stealth DHCP Starvation Attack using Machine. Journal of Computer Virology and Hacking Technique, 1-12; DOI: 10.1007/s11416-017-0310-x.

Younes, O. S. (2016). A Secure DHCP Protocol to Mitigate LAN Attacks. Journal of Computer and Communications, 4, 39-50. .
How to Cite
NuhuA. A., EchobuF. O., & OlanrewajuO. M. (2020). MITIGATING DHCP STARVATION ATTACK USING SNOOPING TECHNIQUE. FUDMA JOURNAL OF SCIENCES, 4(1), 560 - 566. Retrieved from