Abstract
Nowadays, many new devices with network capabilities are constantly being connected to existing networks. Consequently, the need for an automatic and dynamic approach to supply critical network settings to these new nodes is indispensable in large networks, which is mainly provided by the dynamic host configuration protocol (DHCP). Unfortunately, the vulnerabilities of this protocol can be exploited to attack such large networks. This paper conducts the first detailed, systematic, and thorough study of the publicly known DHCP attacking tools that target the DHCP service. The study analyses DHCP packet traces to scrutinise the DHCP attacking tools, analyse their raw packets, and identify their characteristics. It also classifies DHCP attacking tools by their characteristics, impact on DHCP service, and signatures. Furthermore, a detection mechanism is proposed that is based on both fingerprint and behavioural signatures. The findings of this study will be very useful to enhance DHCP implementations and to develop efficient detection and mitigation methods.
Similar content being viewed by others
References
Abri, D.A.: Detection of MITM attack in LAN environment using payload matching. In: 2015 IEEE International Conference on Industrial Technology (ICIT) (2015)
Akashi, S., Tong, Y.: Classification of DHCP spoofing and effectiveness of DHCP Snooping, pp. 233–238. (2019)
Alexander, S., Droms, R.: DHCP options and BOOTP vendor extensions. In: Network Working Group. RFC Editor: Internet Request for Comments (1997)
Arun, R.K.P., Selvakumar, S.: Distributed denial-of-service (DDoS) threat in collaborative environment—a survey on DDoS attack tools and traceback mechanisms. In: 2009 IEEE International Advance Computing Conference (2009)
Bargot, B., Kulkarni, U.: A survey of different tools and approaches for ALDDoS attack. In: 2019 6th International Conference on Computing for Sustainable Global Development (INDIACom) (2019)
Bhaiji, Y.: Layer 2 attacks and mitigation techniques. In: SANOG8. Cisco Publisher, Karachi (2006)
Bhuyan, M.H., et al.: Detecting distributed denial of service attacks: methods, tools and future directions. Comput. J. 57(4), 537–556 (2014)
Cisco: Configuring DHCP snooping, IP source guard, and IPSG for static hosts. In: Catalyst 4500 Series Switch Software Configuration Guide, 12.2(53), SG, Cisco
Cisco: Configuring port security. In: Catalyst 4500 Series Switch Cisco IOS Software Configuration Guide, 12.2(25)EW, Cisco
Conti, G., Abdullah, K.: Passive Visual Fingerprinting of Network Attack Tools (2004)
Demerjian, J., Serhrouchni, A.: DHCP authentication using certificates. In: Security and Protection in Information Processing Systems. Springer, Boston (2004)
dhcpstarv. cited 16 Feb 2019. http://manpages.ubuntu.com/manpages/cosmic/man1/dhcpstarv.1.html
dhcpwn. cited 16 Feb 2019. https://github.com/mschwager/dhcpwn
Dinu, D.D., Togan, M.: DHCPAuth—a DHCP message authentication module. In: 2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics (2015)
Download Ubuntu Desktop. cited 17 Feb 2019. https://www.ubuntu.com/download/desktop
Droms, R.: Dynamic host configuration protocol. In: Network Working Group. Internet Requests for Comments, RFC Editor (1997)
Droms, R., Arbaugh, W.: Authentication for DHCP messages. In: Network Working Group. Internet Requests for Comments, RFC Editor (2001)
dstar. cited 16 Feb 2019. https://github.com/jacopodl/dstar
Ettercap. Cited 20 Mar 2019. https://www.ettercap-project.org/
Glazer, G., Hussey, C.,, Shea. R.: Certificate-Based Authentication for DHCP (2003). https://scholar.google.com/scholar_lookup?title=Certificate-Based%20Authentication%20for%20DHCP&author=G.%20Glazer&publication_year=2003. Cited 25 Mar 2019
Hoque, N., et al.: Network attacks: taxonomy, tools and systems. J. Netw. Comput. Appl. 40, 307–324 (2014)
Hornstein, K., et al.: DHCP authentication via kerberos V. In: DHC working group. Internet Requests for Comments, R. Editor, RFC Editor (2000)
Hyenae. cited 16 Feb 2019. https://sourceforge.net/projects/hyenae/
Kamene, Download and Installation. cited 16 Feb 2019. https://github.com/phaethon/kamene/blob/master/doc/kamene/installation.rst
Kaur, H., Behal, S., Kumar, K.: Characterization and comparison of distributed denial of service attack tools. In: 2015 International Conference on Green Computing and Internet of Things (ICGCIoT) (2015)
Mahadev, V., Kumar, Kumar, K.: Classification of DDoS attack tools and its handling techniques and strategy at application layer. In: 2016 2nd International Conference on Advances in Computing, Communication, and Automation (ICACCA) (Fall) (2016)
Microsoft. Dynamic host configuration protocol (DHCP). Cited 17 Feb 2019. https://docs.microsoft.com/en-us/windows-server/networking/technologies/dhcp/dhcp-top
Patrick, M.: DHCP relay agent information option. In: Network Working Group. Internet Requests for Comments, RFC Editor (2001)
Pilli, E.S., Joshi, R.C., Niyogi, R.: Network forensic frameworks: survey and research challenges. Digital Invest 7(1), 14–27 (2010)
Scapy, Download and Installation. cited 16 Feb 2019. https://github.com/secdev/scapy/blob/master/doc/scapy/installation.rst
Specht, S., Lee, R.: Distributed denial of service: taxonomies of attacks, tools, and countermeasures, pp. 543–550 (2004)
Team, D.D.: DHCPig. Cited 16 Feb 2019. https://github.com/kamorin/DHCPig
Tripathi, N., Hubballi, N.: Detecting stealth DHCP starvation attack using machine learning approach. J. Comput. Virol. Hack. Tech. 14, 233–244 (2017)
Vyncke, E., Paggen, C.: LAN Switch Security: What Hackers Know About Your Switches. Cisco Press, Indianapolis (2007)
WIRESHARK. cited 5 Feb 2019. https://www.wireshark.org/index.html#aboutWS
Yaibuates, M., Chaisricharoen, R.: A combination of ICMP and ARP for DHCP malicious attack identification. In: 2020 Joint International Conference on Digital Arts, Media and Technology with ECTI Northern Section Conference on Electrical, Electronics, Computer and Telecommunications Engineering (ECTI DAMT and NCON) (2020)
Yersinia multiattack network tool. https://sourceforge.net/projects/yersinia/
Younes, O.S.: Securing ARP and DHCP for mitigating link layer attacks. Sādhanā 42(12), 2041–2053 (2017)
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Aldaoud, M., Al-Abri, D., Al Maashri, A. et al. DHCP attacking tools: an analysis. J Comput Virol Hack Tech 17, 119–129 (2021). https://doi.org/10.1007/s11416-020-00374-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11416-020-00374-8