首页> 外文期刊>Computers & Security >A closer look into DHCP starvation attack in wireless networks
【24h】

A closer look into DHCP starvation attack in wireless networks

机译:仔细研究无线网络中的DHCP饥饿攻击

获取原文
获取原文并翻译 | 示例

摘要

Dynamic Host Configuration Protocol (DHCP) is used by clients in a network to configure their interface with IP address and other network configuration parameters such as Default Gateway and DNS server IP addresses. This protocol is vulnerable to a Denial of Service (DoS) attack popularly known as classic DHCP starvation attack. In this paper, we make threefold contribution. First, we highlight the practical difficulty in generating classic DHCP starvation attack in wireless networks. Secondly, we propose a stealth starvation attack which is effective in wireless networks, easier to launch, requires fewer number of messages to be transmitted and difficult to detect by known detection methods. We also show a structurally similar attack in IPv6 networks which can affect address configuration protocols such as DHCPv6 and StateLess Address Autoconfiguration (SLAAC). Subsequently, we also describe an anomaly detection method to detect the proposed attack. We design and generate the attacks in a real network setup and report the results. The proposed detection method uses the Hellinger distance between two probability distributions generated from training and testing data to detect starvation.
机译:网络中的客户端使用动态主机配置协议(DHCP)来为其接口配置IP地址和其他网络配置参数,例如默认网关和DNS服务器IP地址。该协议容易遭受拒绝服务(DoS)攻击,这种攻击通常称为经典DHCP饥饿攻击。在本文中,我们做出了三方面的贡献。首先,我们强调了在无线网络中生成经典DHCP饥饿攻击的实际困难。其次,我们提出了一种隐身饥饿攻击,这种攻击在无线网络中有效,更容易启动,需要传输的消息数量更少并且难以通过已知的检测方法进行检测。我们还展示了IPv6网络中结构上类似的攻击,该攻击可能会影响地址配置协议,例如DHCPv6和StateLess地址自动配置(SLAAC)。随后,我们还描述了一种异常检测方法来检测所提出的攻击。我们在真实的网络设置中设计并生成攻击,并报告结果。所提出的检测方法使用从训练和测试数据生成的两个概率分布之间的Hellinger距离来检测饥饿。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号