|
1. Ralph Droms. Dynamic Host Configuration Protocol. RFC 2131, RFC Editor,March 1997.
2. D. D. Dinu and M. Togan. DHCP Server Authentication Using Digital Certificates. In 2014 10th International Conference on Communications (COMM), pages 1–6, May 2014.
3. Ju, HongIl and Han, Jong-Wook. DHCP Message Authentication with an Effective Key Management. 05 2019.
4. Ashutosh Satapathy and Jenila Livingston. A denial of Service Attack on DHCP Server and its Countermeasures. ARPN Journal of Engineering and Applied Sciences, 13:3983–3987, 06 2018.
5. Felix Lindner. Exploiting DORA–Attacks on the DHCP protocol.
6. P. Satam, H. Alipour, Y. Al-Nashif, and S. Hariri. DNS-IDS: Securing DNS in the Cloud Era. In 2015 International Conference on Cloud and Autonomic Computing, pages 296–301, Sep. 2015.
7. Mann T. Mogul J. Finlayson, R. and M. Theimer. A Reverse Address Resolution Protocol. RFC 903, Jun 1984.
8. W. Croft and J. Gilmore. Bootstrap Protocol. RFC 951, Sept 1985.
9. N. Tripathi and N. Hubballi. Exploiting DHCP server-side IP address conflict detection: A DHCP starvation attack. In 2015 IEEE International 28 Conference on Advanced Networks and Telecommunications Systems (ANTS), pages 1–3, Dec 2015.
10. S. Duangphasuk, S. Kungpisdan, and S. Hankla. Design and implementation of improved security protocols for DHCP using digital certificates. In 2011 17th IEEE International Conference on Networks, pages 287–292, Dec 2011.
11. DNS Hijacking. https://pdfs.semanticscholar.org/e1e1/adfa9752ed7d a5ae2b1559b4df2811953e5a.pdf.
12. L. Senecal. Understanding and preventing attacks at layer 2 of the OSI reference model. In 4th Annual Communication Networks and Services Research Conference (CNSR’06), pages 1 pp.–, May 2006.
13. Configuring DHCP snooping. https: //www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/4_1/nx-os/ security/configuration/guide/sec_nx-os-cfg/sec_dhcpsnoop.pdf.
14. R. Droms and W. Arbaugh. Authentication for DHCP messages. RFC 3118, RFC Editor, June 2001.
15. Osama Younes. A Secure DHCP Protocol to Mitigate LAN Attacks. Journal of Computer and Communications, 04:39–50, 01 2016.
16. Whitfield Diffie and Martin Hellman. New Directions in Cryptography. Information Theory, IEEE Transactions on, 22:644 – 654, 12 1976.
17. Chou-Chen Yang, Ren-Chiun Wang, and Wei-Ting Liu. Secure authentication Scheme for Session Initiation Protocol. Computers and Security, 24:381–386,08 2005.
18. Jhen-Li Wang and Yen-Chung Chen. An SDN-based defensive solution against DHCP attacks in the virtualization environment. pages 529–530, 08 2017.
19. Vmware: Downloads. https://my.vmware.com/web/vmware/downloads.
20. Internet System Consortium. https://www.isc.org/.
21. Kali Linux. https://www.kali.org/.
22. Wireshark. https://www.wireshark.org/.
|