Visible to the public Analysis of Dynamic Host Control Protocol Implementation to Assess DoS Attacks

TitleAnalysis of Dynamic Host Control Protocol Implementation to Assess DoS Attacks
Publication TypeConference Paper
Year of Publication2022
AuthorsSyed, Shameel, Khuhawar, Faheem, Talpur, Shahnawaz, Memon, Aftab Ahmed, Luque-Nieto, Miquel-Angel, Narejo, Sanam
Conference Name2022 Global Conference on Wireless and Optical Technologies (GCWOT)
Keywordsdhcp, DHCP Flooding, DHCP Security, DHCP Snooping, DHCP Starvation, Integrated optics, IP networks, Network security, Organizations, performance evaluation, Port Security, Protocols, pubcrawl, resilience, Resiliency, Scalability, security, Security by Default, Wireless communication
AbstractDynamic Host Control Protocol (DHCP) is a protocol which provides IP addresses and network configuration parameters to the hosts present in the network. This protocol is deployed in small, medium, and large size organizations which removes the burden from network administrator to manually assign network parameters to every host in the network for establishing communication. Every vendor who plans to incorporate DHCP service in its device follows the working flow defined in Request for Comments (RFC). DHCP Starvation and DHCP Flooding attack are Denial of Service (DoS) attacks to prevents provision of IP addresses by DHCP. Port Security and DHCP snooping are built-in security features which prevents these DoS attacks. However, novel techniques have been devised to bypass these security features which uses ARP and ICMP protocol to perform the attack. The purpose of this research is to analyze implementation of DHCP in multiple devices to verify the involvement of both ARP and ICMP in the address acquisition process of DHCP as per RFC and to validate the results of prior research which assumes ARP or ICMP are used by default in all of devices.
DOI10.1109/GCWOT53057.2022.9772887
Citation Keysyed_analysis_2022