Data Mining in DHCP Security
ثبت نشده
چکیده
A dynamic IP address is an IP address that is dynamically assigned to your computer by your Internet service provider (ISP). Once your computer or router is refreshed, your ISP dynamically assigns an IP address to your networking device using DHCP protocol. DHCP follows sequence in assigning an IP address to the host. If a particular host find its IP address it can easily know another host’s ip address through random search. This paper concentrates on giving an insight about DHCP security.
منابع مشابه
Data Mining in DHCP Security
A dynamic IP address is an IP address that is dynamically assigned to your computer by your Internet service provider (ISP). Once your computer or router is refreshed, your ISP dynamically assigns an IP address to your networking device using DHCP protocol. DHCP follows sequence in assigning an IP address to the host. If a particular host find its IP address it can easily know another host’s ip...
متن کاملA Secure DHCP Protocol to Mitigate LAN Attacks
Network security has become more of a concern with the rapid growth and expansion of the Internet. While there are several ways to provide security in the application, transport, or network layers of a network, the data link layer (Layer 2) security has not yet been adequately addressed. Data link layer protocols used in local area networks (LANs) are not designed with security features. Dynami...
متن کاملKeywords: intranet management, network security, wireless LAN, DHCP, MAC bridges, IP spoofing
DHCP (Dynamic Host Configuration Protocol) [1, 2] is widely deployed in resource allocation and intranet management. However, DHCP mechanism is not mandatory, and DHCP server can neither force DHCP clients to release their leases, nor enforce cooperation from externally configured hosts that are DHCP-unaware. Although new DHCP options such as DHCP reconfigure extension [3] have been proposed, t...
متن کاملDHCPAuth - A DHCP message authentication module
DHCP is one of the most used network protocols, despite the security issues it has. Our work is motivated by the numerous attacks that can be launched against DHCP and the impact that they can have. Firstly, we formulate the constraints and design principles for a DHCP message authentication module that is flexible and easy to integrate with current DHCP implementations, while providing the nec...
متن کاملUnderstanding and Preventing Attacks at Layer 2 of the OSI Reference Model
This session focuses on the security issues surrounding Layer 2, the data-link layer. With a significant percentage of network attacks originating inside the corporate firewall, exploring this soft underbelly of data networking is critical for any secure network design. Security issues addressed in this session include ARP spoofing, MAC flooding, VLAN hopping, DHCP attacks, and Spanning Tree Pr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2018