Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4673
Full metadata record
DC FieldValueLanguage
dc.contributor.authorHubballi, Neminathen_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:35:08Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:35:08Z-
dc.date.issued2016-
dc.identifier.citationTripathi, N., & Hubballi, N. (2016). Exploiting DHCP server-side IP address conflict detection: A DHCP starvation attack. Paper presented at the International Symposium on Advanced Networks and Telecommunication Systems, ANTS, , 2016-February doi:10.1109/ANTS.2015.7413661en_US
dc.identifier.isbn9781509002931-
dc.identifier.issn2153-1684-
dc.identifier.otherEID(2-s2.0-84962141554)-
dc.identifier.urihttps://doi.org/10.1109/ANTS.2015.7413661-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4673-
dc.description.abstractDynamic Host Configuration Protocol (DHCP) starvation is an insider attack which prevents legitimate DHCP clients from acquiring network configuration parameters from DHCP server. The classical methods of creating starvation attack has a practical difficulty in wireless networks where an Access Point (AP) mandates a client to associate with unique MAC address before it can transmit such requests. This limits the effectiveness of starvation in wireless networks. In this paper, we describe a new method of creating starvation which is effective in both wired and wireless networks. This new method exploits a precautionary probing done by a DHCP server as described in RFC 2131. This probing verifies the to be offered IP address for accidental usage by other clients in the network. We show that a malicious insider can just send spoofed replies to these probes to create the effect of starvation in both wired and wireless networks. © 2015 IEEE.en_US
dc.language.isoenen_US
dc.publisherIEEE Computer Societyen_US
dc.sourceInternational Symposium on Advanced Networks and Telecommunication Systems, ANTSen_US
dc.subjectWireless networksen_US
dc.subjectAccess pointsen_US
dc.subjectClassical methodsen_US
dc.subjectConflict detectionen_US
dc.subjectDynamic host configuration protocolsen_US
dc.subjectInsider attacken_US
dc.subjectMalicious insidersen_US
dc.subjectNetwork configurationen_US
dc.subjectWired and wirelessen_US
dc.subjectInternet protocolsen_US
dc.titleExploiting DHCP server-side IP address conflict detection: A DHCP starvation attacken_US
dc.typeConference Paperen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: