skip to main content
10.1145/3352411.3356103acmotherconferencesArticle/Chapter ViewAbstractPublication PagesdsitConference Proceedingsconference-collections
research-article

A Feasible Method for Realizing Leakage of DHCP Transactions under the Implementation of DHCP Snooping: To what extent can DHCP snooping protect clients from the cyberattack based on DHCP spoofing

Published: 19 July 2019 Publication History

Abstract

It is well known that DHCP snooping is a famous countermeasure against DHCP spoofing. Actually, to what extent DHCP snooping can protect the DHCP clients from being injected malicious DHCP transactions running over the network segment where the DHCP clients and the malicious DHCP servers co-exist? The answer to this question is that DHCP snooping can protect DHCP spoofing to a certain extent. In other words, DHCP snooping cannot protect DHCP spoofing completely. In the former half of this paper, it is shown that DHCP spoofing can be classified into two cases, namely DHCP spoofing from inside and DHCP spoofing from outside, and in the latter half of this paper, it is shown that a more sophisticated method of solving the problem which remains to be solved by the malicious wiretapper for the purpose of realizing DHCP spoofing from outside. As for the concrete method of implementing DHCP spoofing from outside, we can refer to Tong and Akashi [1] explaining how to apply the longest matching prefix rule to the artificial leakage of the DHCP transactions beforehand.

References

[1]
S. Akashi and Y. Tong, Classification of DHCP Spoofing and Effectiveness of DHCP Snooping, Proceedings on 2018 International Conference on Advances in Computer Technology, Information Science and Communication(Edited by Wen-Bing Horng and Yong Yue), ISBN:978-989-758-357-5, 2019, pp.233--238.
[2]
G. Ferrari, G. Colavolpe and R. Raheli, Detection Algorithms for Wireless Communications, John Wiley and Sons Ltd., West Sussex, 1st edition, 2004.
[3]
J. G. Gersting, Mathematical Structures for Computer Science, W. H. Freeman and Company, New York, 1st edition, 1982.
[4]
C. Hopps, Analysis of an Equal-Cost Multi-Path Algorithm, RFC 2992, 2000.
[5]
D. E. Knuth, The Art of Computer Programming, Addison-Wesley Publishing Company, Massachusetts, 2nd edition, 1973.
[6]
O. Santos and J. Muniz, CCNA Cyber Ops Secfnd 210--250, Cisco Press, Indianapolis, 1st edition, 2017.
[7]
O. Santos and J. Muniz, CCNA Cyber Ops Secops 210--255, Cisco Press, Indianapolis, 1st edition, 2017.
[8]
Cisco Systems, Inc., Catalyst 3750-X and Catalyst 3560-X Switch Software Configuration Guide, Cisco IOS Release 15.0(2)SE and Later, 2013.

Cited By

View all
  • (2023)An Analysis of DHCP Vulnerabilities, Attacks, and Countermeasures2023 Biennial Symposium on Communications (BSC)10.1109/BSC57238.2023.10201458(119-124)Online publication date: 4-Jul-2023
  • (2021)A Vulnerability of Dynamic Network Address Translation to Denial-of-Service Attacks2021 4th International Conference on Data Science and Information Technology10.1145/3478905.3478950(226-230)Online publication date: 23-Jul-2021

Index Terms

  1. A Feasible Method for Realizing Leakage of DHCP Transactions under the Implementation of DHCP Snooping: To what extent can DHCP snooping protect clients from the cyberattack based on DHCP spoofing

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      DSIT 2019: Proceedings of the 2019 2nd International Conference on Data Science and Information Technology
      July 2019
      280 pages
      ISBN:9781450371414
      DOI:10.1145/3352411
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      In-Cooperation

      • The Hong Kong Polytechnic: The Hong Kong Polytechnic University
      • Natl University of Singapore: National University of Singapore

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 19 July 2019

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. DHCP acknowledge packet
      2. DHCP discover packet
      3. DHCP offer packet
      4. DHCP relay agent
      5. DHCP request packet
      6. DHCP snooping
      7. DHCP spoofing

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      DSIT 2019

      Acceptance Rates

      DSIT 2019 Paper Acceptance Rate 43 of 95 submissions, 45%;
      Overall Acceptance Rate 114 of 277 submissions, 41%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)16
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 15 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)An Analysis of DHCP Vulnerabilities, Attacks, and Countermeasures2023 Biennial Symposium on Communications (BSC)10.1109/BSC57238.2023.10201458(119-124)Online publication date: 4-Jul-2023
      • (2021)A Vulnerability of Dynamic Network Address Translation to Denial-of-Service Attacks2021 4th International Conference on Data Science and Information Technology10.1145/3478905.3478950(226-230)Online publication date: 23-Jul-2021

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media