Classification of DHCP Spoofing and Effectiveness of DHCP Snooping

Shigeo Akashi, Yao Tong

2019

Abstract

It is well known that DHCP snooping is a famous countermeasure against DHCP spoo ng. Actu- ally, To what extent DHCP snooping can protect the authenticated DHCP clients from being given malicious DHCP transactions through the network where the authenticated DHCP clients and the malicious DHCP servers share with each other ? The answer to this question is that DHCP snooping can protect DHCP spoo ng to a certain extent. In the former half of this paper, it is shown that DHCP spoo ng can be classi ed into two cases, namely DHCP spoo ng from inside and DHCP spoo ng from outside, and in the latter half of this paper, it is shown that DHCP snooping can pro- tect the former spoo ng from being implemented but cannot protect the latter spoo ng from being implemented. more exactly speaking, that DHCP snooping cannot prevent DHCP spoo ng from outside from being implemented by applying the longest matching pre x rule to leading a malicious network segment which is constructed on the basis of the leaked DHCP transactions.

Download


Paper Citation


in Harvard Style

Akashi S. and Tong Y. (2019). Classification of DHCP Spoofing and Effectiveness of DHCP Snooping.In Proceedings of the International Conference on Advances in Computer Technology, Information Science and Communications - Volume 1: CTISC, ISBN 978-989-758-357-5, pages 233-238. DOI: 10.5220/0008099002330238


in Bibtex Style

@conference{ctisc19,
author={Shigeo Akashi and Yao Tong},
title={Classification of DHCP Spoofing and Effectiveness of DHCP Snooping},
booktitle={Proceedings of the International Conference on Advances in Computer Technology, Information Science and Communications - Volume 1: CTISC,},
year={2019},
pages={233-238},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0008099002330238},
isbn={978-989-758-357-5},
}


in EndNote Style

TY - CONF

JO - Proceedings of the International Conference on Advances in Computer Technology, Information Science and Communications - Volume 1: CTISC,
TI - Classification of DHCP Spoofing and Effectiveness of DHCP Snooping
SN - 978-989-758-357-5
AU - Akashi S.
AU - Tong Y.
PY - 2019
SP - 233
EP - 238
DO - 10.5220/0008099002330238