Investigating DHCP and DNS Protocols Using Wireshark
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 3
Abstract
For different computers to communicate on the same network or on different networks they need to know one another’s IP address or MAC address. Involving the IP address and MAC address has led to a challenging task for a network analyst to secure the communication. There are various ways to mitigate the attacks in application, transport and network layers of a network. Mitigating the attacks in data link layer is a challenging task for a network analyst as adequate security is not assigned to a data link layer. DHCP and DNS are the most widely used in host configuration and they work in data link layer. Mostly these protocols are vulnerable to number of attacks like in DHCP the attacks are DHCP Starvation attack and Rogue DHCP attackwhile in DNS the attacks are DNS Hijacking Attack and DNS Cache Poisoning Attack. These protocols have been investigated in this research where DHCP and DNS packets have been captured and analysed them with the help of Wireshark. Mainly we have analysed how IP address is assigned to a client from a DHCP Server and how packets are exchanged between the DHCP client and DHCP Server and DNS is used for resolution of URL into IP address.
Authors and Affiliations
Sameena Naaz , Firdoos Ahmad Badroo
Watermarking Relational Database Using Hindi Phonemes and Hill Cipher Technique
Abstract : Digital watermarking now-a-days become more and more important due to tremendous availability of digital data on internet. The use of databases in various internet base applications has increased tremend...
Decision Tree Classification of Students Placement Factors Using R Data Miner
Student campus placement attitudes have largely been assessed using college students are relatively small samples. In addition, no systematic framework has been used to investigate the origins or influencing social facto...
Finger Vein Based Licensing And Authentication Scheme Using GSM
Finger vein authentication scheme is a non imitable biometric authentication scheme. By using this biometric authentication, we can prevent the non license from driving. So we will avoid accidents. The proposed &...
Dynamic Passwords Using Graphics
Abstract:Textual passwords are most common method used for authentication. But textual passwords are vulnerable to eves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords are intro...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Routing In Wireless Sensor Networks For Energy Efficient Data Collection
In Wireless sensor network sensor nodes have a limited battery life and their efficient utilization is a very much importent task. Their are many ways are proposed for efficient utilization of energy.For efficie...