Open Access Open Access  Restricted Access Subscription or Fee Access

Automated IP Address Allocation and Recovery Using DHCP: Implementation Strategies

Shreya Kadu, Sushil Bakhtar

Abstract


The term for Dynamic Host Configuration Protocol is DHCP. It is an application layer protocol that servers use to learn about the network configuration. A DHCP server, under the supervision of the DHCP protocol, manages the dynamic distribution of network configuration elements like IP addresses, subnet masks, and gateway addresses. Without DHCP, a network administrator would have to take extra time and make uncomfortable efforts to manually send such parameters to client devices. The ability of each device to connect to the network and other technical components may also be impacted by incorrect configuration. A variety of attacks have constantly posed a danger to DHCP servers. One technique that is frequently employed to destroy a server‘s availability is DHCP starvation, which involves consuming all available IP numbers. The use of ICMP has been suggested as a technique for recovering IP addresses held by the attacker to recover the DHCP service from starvation assault.


Full Text:

PDF

References


Lin C, Su T, Wang Z. Summary of high-availability DHCP service solutions. 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology, Shenzhen, China. 2011; 12–17. doi: 10.1109/ICBNMT.2011.6155886.

Senecal L. Understanding and preventing attacks at layer 2 of the OSI reference model. 4th Annual Communication Networks and Services Research Conference (CNSR‘06), Moncton, NB, Canada. 2006; 1., doi: 10.1109/CNSR.2006.57.

Duangphasuk S, Kungpisdan S, Hankla S. Design and implementation of improved security protocols for DHCP using digital certificates. 2011 17th IEEE International Conference on Networks, Singapore. 2011; 287–292. doi: 10.1109/ICON.2011.6168490.

Yaibuates M, Upra R, Chaisricharoen R. ICMP Based IP Address Recovery Method for DHCP. In Global Wireless Summit 2016 (GWS2016), Aarhus. 2016; 267–271.

Droms R. Automated configuration of TCP/IP with DHCP. IEEE Internet Comput. 1999; 3(4): 45– 53.

Yaibuates M, Chaisricharoen R. ICMP-based Malicious Attack Identification Method for DHCP. The 4th Joint International Conference on Information and Communication Technology, Electronic and Electrical Engineering (JICTEE), Chiang Rai, Thailand. 2014; 1–5. doi: 10.1109/JICTEE.2014.6804073.

Diwan D, Narang VK, Singh AK. Security Mechanism in RIPv2, EIGRP, and OSPF for Campus Network - A Review. Int J Comput Sci Trends Technol. 2017; 5(2): 399–404.

Yaibuates M, Chaisricharoen R. Starvation Delayed DHCP Service for Enabling Pool Recovery. Technol Electr Eng. 2019; (Spl Iss 2/2019): 15–34. doi: 10.22452/mjcs.sp2019no2.2.

Naaz S, Badroo FA. Investigating DHCP and DNS Protocols Using Wireshark. IOSR J Comput Eng. 2016 May–Jun; 18(3): 1–8. doi: 10.9790/0661-1803020108.

Younes OS. A Secure DHCP Protocol to Mitigate LAN Attacks. J Comput Commun. 2016; 04(01): 39–50. doi: 10.4236/jcc.2016.41005.

Odom W. Cisco CCNA: Routing and Switching 200-120 Official Cert Guide Library, April 2013. Indianapolis, USA: Cisco Press; 2013.


Refbacks

  • There are currently no refbacks.