Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4943
Full metadata record
DC FieldValueLanguage
dc.contributor.authorHubballi, Neminathen_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:36:09Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:36:09Z-
dc.date.issued2018-
dc.identifier.citationTripathi, N., & Hubballi, N. (2018). Detecting stealth DHCP starvation attack using machine learning approach. Journal of Computer Virology and Hacking Techniques, 14(3), 233-244. doi:10.1007/s11416-017-0310-xen_US
dc.identifier.issn2263-8733-
dc.identifier.otherEID(2-s2.0-85035119000)-
dc.identifier.urihttps://doi.org/10.1007/s11416-017-0310-x-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4943-
dc.description.abstractDynamic Host Configuration Protocol (DHCP) is used to automatically configure clients with IP address and other network configuration parameters. Due to absence of any in-built authentication, the protocol is vulnerable to a class of Denial-of-Service (DoS) attacks, popularly known as DHCP starvation attacks. However, known DHCP starvation attacks are either ineffective in wireless networks or not stealthy in some of the network topologies. In this paper, we first propose a stealth DHCP starvation attack which is effective in both wired and wireless networks and can not be detected by known detection mechanisms. We test the effectiveness of proposed attack in both IPv4 and IPv6 networks and show that it can successfully prevent other clients from obtaining IP address, thereby, causing DoS scenario. In order to detect the proposed attack, we also propose a Machine Learning (ML) based anomaly detection framework. In particular, we use some popular one-class classifiers for the detection purpose. We capture IPv4 and IPv6 traffic from a real network with thousands of devices and evaluate the detection capability of different machine learning algorithms. Our experiments show that the machine learning algorithms can detect the attack with high accuracy in both IPv4 and IPv6 networks. © 2017, Springer-Verlag France SAS.en_US
dc.language.isoenen_US
dc.publisherSpringer-Verlag Franceen_US
dc.sourceJournal of Computer Virology and Hacking Techniquesen_US
dc.subjectArtificial intelligenceen_US
dc.subjectDenial-of-service attacken_US
dc.subjectLearning algorithmsen_US
dc.subjectLearning systemsen_US
dc.subjectWireless networksen_US
dc.subjectAnomaly detectionen_US
dc.subjectDHCPen_US
dc.subjectDHCP starvation attacken_US
dc.subjectDHCPv6en_US
dc.subjectOne-class classifieren_US
dc.subjectInternet protocolsen_US
dc.titleDetecting stealth DHCP starvation attack using machine learning approachen_US
dc.typeJournal Articleen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: