The DHCP Snooping and DHCP Alert Method in Securing DHCP Server from DHCP Rogue Attack
DHCP Server as part of the network infrastructure in charge of distributing host configurations to all devices has the potential to be controlled. If the DHCP Server is successfully controlled, all network devices connected to the server can potentially be controlled. From the observations made at P...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
State Islamic University Sunan Kalijaga
2021-06-01
|
| Series: | IJID (International Journal on Informatics for Development) |
| Subjects: | |
| Online Access: | https://ejournal.uin-suka.ac.id/saintek/ijid/article/view/2287 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850182976990609408 |
|---|---|
| author | Dio Aditya Pradana Ade Surya Budiman |
| author_facet | Dio Aditya Pradana Ade Surya Budiman |
| author_sort | Dio Aditya Pradana |
| collection | DOAJ |
| description | DHCP Server as part of the network infrastructure in charge of distributing host configurations to all devices has the potential to be controlled. If the DHCP Server is successfully controlled, all network devices connected to the server can potentially be controlled. From the observations made at PT. Rekayasa Engineering found a vulnerability in the DHCP Server that has the potential to experience DHCP Rogue or DHCP Spoofing, where the client will fail to communicate with the authorized DHCP Server, as well as open the door for attackers to enter the network. For this reason, DHCP Snooping and DHCP Alert methods are implemented. DHCP Snooping will ensure that every data traffic has been filtered and directed to the registered interface. Meanwhile, the use of DHCP Alert is required in monitoring data traffic during the Discover, Offer, Request, and Acknowledge (DORA) process. In the tests performed, DHCP Snooping and DHCP Alert managed to anticipate attacks that tried to placed DHCP Rogue on the network infrastructure. DHCP Alert, configured on the proxy router, ensures that the DORA process can only occur between an authorized DHCP server and a client. DHCP Snooping test also shows that communication from clients can only be replied to by Trusted DHCP Server. The existence of DHCP Snooping and DHCP Alert makes the host configuration fully controlled by the authorized DHCP Server. |
| format | Article |
| id | doaj-art-fded2a3c6e97433ca506d12ea9fc9caa |
| institution | OA Journals |
| issn | 2252-7834 2549-7448 |
| language | English |
| publishDate | 2021-06-01 |
| publisher | State Islamic University Sunan Kalijaga |
| record_format | Article |
| series | IJID (International Journal on Informatics for Development) |
| spelling | doaj-art-fded2a3c6e97433ca506d12ea9fc9caa2025-08-20T02:17:28ZengState Islamic University Sunan KalijagaIJID (International Journal on Informatics for Development)2252-78342549-74482021-06-01101384610.14421/ijid.2021.22871067The DHCP Snooping and DHCP Alert Method in Securing DHCP Server from DHCP Rogue AttackDio Aditya Pradana0Ade Surya Budiman1University of Bina Sarana InformatikaUniversity of Bina Sarana InformatikaDHCP Server as part of the network infrastructure in charge of distributing host configurations to all devices has the potential to be controlled. If the DHCP Server is successfully controlled, all network devices connected to the server can potentially be controlled. From the observations made at PT. Rekayasa Engineering found a vulnerability in the DHCP Server that has the potential to experience DHCP Rogue or DHCP Spoofing, where the client will fail to communicate with the authorized DHCP Server, as well as open the door for attackers to enter the network. For this reason, DHCP Snooping and DHCP Alert methods are implemented. DHCP Snooping will ensure that every data traffic has been filtered and directed to the registered interface. Meanwhile, the use of DHCP Alert is required in monitoring data traffic during the Discover, Offer, Request, and Acknowledge (DORA) process. In the tests performed, DHCP Snooping and DHCP Alert managed to anticipate attacks that tried to placed DHCP Rogue on the network infrastructure. DHCP Alert, configured on the proxy router, ensures that the DORA process can only occur between an authorized DHCP server and a client. DHCP Snooping test also shows that communication from clients can only be replied to by Trusted DHCP Server. The existence of DHCP Snooping and DHCP Alert makes the host configuration fully controlled by the authorized DHCP Server.https://ejournal.uin-suka.ac.id/saintek/ijid/article/view/2287network securitycomputer networksip addressclientconfiguration |
| spellingShingle | Dio Aditya Pradana Ade Surya Budiman The DHCP Snooping and DHCP Alert Method in Securing DHCP Server from DHCP Rogue Attack IJID (International Journal on Informatics for Development) network security computer networks ip address client configuration |
| title | The DHCP Snooping and DHCP Alert Method in Securing DHCP Server from DHCP Rogue Attack |
| title_full | The DHCP Snooping and DHCP Alert Method in Securing DHCP Server from DHCP Rogue Attack |
| title_fullStr | The DHCP Snooping and DHCP Alert Method in Securing DHCP Server from DHCP Rogue Attack |
| title_full_unstemmed | The DHCP Snooping and DHCP Alert Method in Securing DHCP Server from DHCP Rogue Attack |
| title_short | The DHCP Snooping and DHCP Alert Method in Securing DHCP Server from DHCP Rogue Attack |
| title_sort | dhcp snooping and dhcp alert method in securing dhcp server from dhcp rogue attack |
| topic | network security computer networks ip address client configuration |
| url | https://ejournal.uin-suka.ac.id/saintek/ijid/article/view/2287 |
| work_keys_str_mv | AT dioadityapradana thedhcpsnoopinganddhcpalertmethodinsecuringdhcpserverfromdhcprogueattack AT adesuryabudiman thedhcpsnoopinganddhcpalertmethodinsecuringdhcpserverfromdhcprogueattack AT dioadityapradana dhcpsnoopinganddhcpalertmethodinsecuringdhcpserverfromdhcprogueattack AT adesuryabudiman dhcpsnoopinganddhcpalertmethodinsecuringdhcpserverfromdhcprogueattack |