A Research Paper Presented To

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 17

San Isidro National High School

Catanauan, Quezon

Problems Encountered by the Information and Communication Technology Students on


the Dynamic Host Configuration Protocol

A Research Paper
Presented to
THE FACULTY
Of San Isidro National High School
SENIOR HIGH SCHOOL PROGRAM
Catanauan, Quezon

In Partial Fulfillment
Of the Requirements for
PRACTICAL RESEARCH 2

By:
DONNALYN T. RODELAS
C-JAY LIWANAGAN
CHARLENE ANNE PASTRANA
SANDY AVILES
LYKA CRUZADO

January 2024
Chapter l
Introduction
DHCP (Dynamic Host Configuration Protocol) is a network management protocol used
to dynamically assign an IP address to any device, or node, on a network so it can
communicate using IP. DHCP automates and centrally manages these configurations rather
than requiring network administrators to manually assign IP addresses to all network devices.
DHCP can be implemented on small local networks, as well as large enterprise networks,
According Alexander S. Gillis.(2023).DHCP assigns new IP addresses in each location when
devices are moved from place to place, which means network administrators do not have to
manually configure each device with a valid IP address or reconfigure the device with a new IP
address if it moves to a new location on the network.
There are a couple of reasons that a server that will not give out addresses. The most
obvious of these is that the server is not configured. On a Cisco DHCP device, this can be
verified by viewing the current DHCP pool configuration using the go to command because it
show ip the correct IP address. The second reason is that the DHCP pool configured does not
match any of the interfaces that are currently configured on the Cisco device. An example of this
is example, R1 only has a single interface (f0/0) that is configured with an IP address of
19.18.09.1 and a single DHCP pool that is configured to give out the addresses from the
10.12.20.24 network
In the digital age, Information and Communication Technology (ICT) plays an
indispensable role in our daily lives and across industries. As the world becomes increasingly
interconnected, the need for proficient network administrators and IT professionals grows
exponentially. One fundamental aspect of network management is the configuration of the
Dynamic Host Configuration Protocol (DHCP), a protocol that automates the assignment of IP
addresses and network parameters to devices within a network.
DHCP configuration is a critical skill for ICT students, equipping them with the knowledge
and expertise to manage and maintain network infrastructures effectively. However, the journey
to mastering DHCP configuration is often paved with challenges and obstacles. This study
delves into the intricacies of these challenges, aiming to shed light on the problems encountered
by ICT students as they grapple with DHCP configuration.
The Importance of DHCP in modern networking environments cannot be overstated. It
underpins the seamless connectivity that is the lifeblood of today’s digital world. When
functioning correctly, DHCP ensures that devices can seamlessly communicate and access
network resources. Yet, despite its significance, the process of DHCP configuration remains a
formidable hurdle for many ICT students.
This study seeks to uncover the root causes of these challenges. It explores the
multifaceted issues that hinder students’ understanding, implementation, and troubleshooting of
DHCP configurations. These issues may range from the complex and evolving nature of DHCP
itself to variations in teaching methodologies, resources, and support systems across
educational institutions. By identifying and addressing these problems, this study aspires to
make a valuable contribution to the field of ICT education. Its findings have the potential to drive
improvements in curriculum design, teaching practices, and support mechanisms. Ultimately,
this research endeavours to better equip ICT students with the skills and knowledge necessary
to excel in DHCP configuration, thereby empowering them to become adept network
administrators and IT professionals capable of meeting the demands of our interconnected
world.
Background of the Study
The study titled “Problems Encountered by ICT Students on DHCP Configuration
investigates the challenges and difficulties faced by students pursuing Information and
Communication Technology (ICT) courses when it comes to configuring Dynamic Host
Configuration Protocol (DHCP). DHCP is a fundamental networking protocol used to automate
the assignment of IP addresses and other network configuration parameters to devices within a
network.
The background of this study from the increasing importance of DHCP in modern
network environments and the crucial role it plays in ensuring seamless connectivity. As ICT
students are expected to develop expertise in network administration and configuration,
mastering DHCP is essential. However, it has been observed that many students encounter
various obstacles in understanding, implementing, and troubleshooting DHCP configurations.
These problems may arise from factors such as the complexity of DHCP, the rapid
evolution of networking technologies, the diversity of DHCP server software and hardware, and
the need for hands-on experience. Additionally, variations in teaching methods, resources, and
support mechanisms can influence students’ ability to grasp DHCP concepts effectively.
Understanding the specific challenges faced by ICT students in DHCP Configuration is
vital for educational institutions, instructors, and curriculum developers. By identifying these
challenges, appropriate strategies, teaching materials, and support systems can be tailored to
enhance students’ learning experiences and better prepare them for real-world networking
scenarios.
The study aims to shed light on these Issues through empirical research, surveys,
interviews, or other data collection methods. Ultimately, its findings may contribute to the
refinement of ICT curriculum, instructional methods, and resources to facilitate a smoother
learning journey for students in mastering DHCP configuration.

Theoretical/Conceptual Framework
The present study is anchored on the theory of network configuration. The theory states
the importance of Dynamic Host Configuration Protocol (DHCP) in modern network
environments and the crucial role it plays in ensuring seamless connectivity. As ICT students are
expected to develop expertise in network administration and configuration, mastering DHCP is
essential. This theory is the researchers guide in determining the problems encountered in
DHCP configuration because this theory explain and discussed the Understanding the specific
challenges faced by ICT students in DHCP configuration.

Statement of the Problem


The study was conducted to determine the problems Encountered by the Information
and Communication Technically Students on the DHCP Configuration performance of selected
students of SAN ISIDRO NATIONAL HIGH SCHOOL, CATANAUAN, QUEZON.
Specifically, the study aimed to provide answers to the following:
Questions:
1.What is the demographic profile of the respondents in terms of:
1.1 Gender
1.2 Sex
1.3 Track
2.What are the problems encountered of Grade 12 Information and Communication Technology
students in performing DHCP Configuration?
3. What are the effects of problem that they encountered in performing DHCP Configuration?
4. What are the possible solutions that con be recommend?
CHAPTER ll
Review of Related Literature
The TCP/IP suite has various protocols that must be carefully configured so that
networked devices operate efficiently. Setting values by hand is time-consuming and error-
prone; moreover, several trends are adding to the need for automated parameter configuration
and administration. The Dynamic Host Configuration Protocol, accepted as a proposed standard
by the Internet Engineering Task Force, offers a way to automatically configure network devices
that use TCP/IP. These devices use DHCP to locate and contact servers, which return the
appropriate configuration information as data. The DHCP servers act as agents for network
administrators and automate the process of network address allocation and parameter
configuration. Addresses can be assigned and individual addresses can be reassigned to new
DHCP clients without explicit intervention by a network administrator. The IETF’s Dynamic Host
Configuration (DHC) working group is now at work adding new features to DHCP. The author
describes the group’s work on DHCP in detail, outlines the management of a DHCP service,
and discusses new DHCP features, including the version being developed for IPv6. (Pradana,
Dio.,(2021), The Dhcp Snooping and DHCP Alert Method in Securing DHCP Server from DHCP
Rogue Attack, 38-46)
Dynamic Host Configuration Protocol (DHCP) is widely used to dynamically assign IP
addresses to users. However, due to little knowledge on the behavior and performance of
DHCP, it is challenging to configure lease time and divide IP addresses for address pools
properly in large-scale wireless networks. In this paper, we conduct the largest known
measurement on the behavior and performance of DHCP in the wireless network of T University
(TWLAN). We find the performance of DHCP is far from satisfactory: (1) The non-authenticated
devices lead to a waste of 25% of addresses at the rush hour. (2) Address pool utilization varies
greatly under the current address division strategy. (3) A device does not generate traffic for
67% of the lease time on average. Meanwhile, we observe devices of different locations and
operating systems show diverse online patterns. A unified lease time setting could result in an
inefficient usage of addresses. To address the problems, taking account of authentication
information and online patterns, we propose a new leasing strategy. The results show it
outperforms three state-of-the-art baselines and reduces the number of assigned addresses by
24% and the average total lease time by 17% without significantly increasing the DHCP server
load. Besides, we further propose an adaptive address division strategy to balance the address
utilization of pools, which can be deployed in parallel with the new leasing strategy and reduce
the risk of address exhaustion. (Wang, H.,(2020), Squeezing the gap: An empirical study on
DHCP performance in a large-scale wireless network, IEEE/ACM Transactions on Networking,
832-845)
The requirement for a computer that Is physically connected to a computer network is to
be able to access existing resources on a computer network in the form of an IP address
obtained statically or dynamically. On a static IP address, there are not many problems that
arise because it is loaded directly into the computer, while for a dynamic IP address, security
problems arise in the form of a dynamic IP address sharing server in the form of DHCP Rogue.
The contribution of this research is to detect attacks on a computer network and specifically to
find out which computer networks are affected by DHCP rouge-type attacks. The configuration
that is added to the first router when the network is hit by a DHCP rogue attack is to configure
the main route’, in this case, the first router, and the switch used as a connecting device
between computers. Configuration on both switches is done by snooping trust which is useful
for securing IP addresses to avoid IP attackers. This research was conducted to find out if a
computer network with a dynamic IP address was attacked by sending files between computers.
Files with the longest sending time indicate an attack on the computer network. The method
used in this study is the ANOVA test with descriptive-based analysis. Based on the results of the
analysis, it is known that the average file transfer time on networks affected by DHCP Rogue is
higher than the average file transfer time on normal and mitigated networks, and the significant
value of the ANOVA test results has a value of 0.004. In general, it can be concluded that there
are differences in data transfer when the network is normal, the network is subject to DHCP
Rogue, and the network has been mitigated with DHCP Rogue. (Wintolo, H.,(2023)Descriptive
Analysis and ANOVA Test with File Sending on Computer Networks Attacked with Rogue’s
Dynamic Host Configuration Protocol (DHCP), Jurnal Ilmiah Teknik Elektro Komputer dan
Informatika, 375-384)
Enterprise or campus networks are usually large in size and are difficult to manage.
Network administrators are required to frequently perform deliberate changes according to the
organizational needs. VLANs are broadly used in enterprise or campus networks to improve
scalability, flexibility, ease of management, and to reduce broadcast. Therefore it’s providing
layer_2 security as it limits the number of the broadcast domains. Nowadays in this fast-growing
industrial age, every company needs the speed of data transfer from one network to another
network in manufacturing to cope up with the customer’s requirements. The basic objective of
our project is to develop a versatile and low-cost INTER-VLAN-ROUTING which can be utilized
in any industry or campus to eliminate this problem. INTER VLAN increases the performance of
the network by providing flexibility to the users to log in to any network within the same group
without changing their IP address. This also reduces complexity and it also cost-effective.
(Ahmad, Lqbal.,(2020), Design and Implementation of Network Security using Inter-VLAN-
Routing and DHCP, Asian Journal of Applied Science and Technology, 37-44)
Software defined networking (SDN) presents opportunities for improving network
management, mainly thanks to the centralized controller separated from forwarding devices. On
the other hand, security in SDN is a complicated issue: SDN both inherits vulnerabilities from
traditional networks through common protocols and introduces new problems due to the risks
associated with softwarization. Dynamic host configuration protocol (DHCP) is an essential
protocol in SDNs as well and the security risks of DHCP also menace SDNs. In this study, we
have analyzed the security of the built-in DHCP services on three popular SDN controllers:
POX, ONOS and Floodlight. Our results indicate that they are vulnerable to starvation attacks,
and DHCP discovery message floods can also be used to launch denial-of-service attacks,
slowing down networks and overloading controllers. To counter these issues, we examined
state-of-the-art DHCP security methodologies and assessed their applicability to the built-in
DHCP servers of SDN controllers. Considering our assessment, we have designed and
implemented a DHCP security module on the POX controller, DHCPguard, utilizing DHCP
snooping, rate limiting, and IP pool recovery functions. Our findings show that DHCPguard
successfully blocks malicious DHCP messages, recovers the IP address pool, and alleviates the
negative effects of DHCP related attacks on the network without significant overhead.
DHCPguard is able to increase throughput by up to 94% and decrease CPU usage by up to
92% compared to plain POX under DHCP attack scenarios performed on simple and complex
topologies. (Tok, M.C.,(2021) Security analysis of SDN controller-based DHCP services and
attack mitigation with DHCP guard, Computers & Security 109, 102394)
Potential problems in a wireless router are the number of connected clients to DHCP
(Dynamic Host Configuration Protocol) services and the durability of connectivity. Practically,
some of the wireless router limits the number of the client to 15 clients due to bandwidth
consumption management. DHCP is one of the services needed by wireless router, but it might
be interrupted when the memory or CPU is full. This article proposes a modification of the
backup algorithm in DHCP relay to overcome this situation when the memory or CPU in the
wireless router is limited. The proposed backup algorithm will automatically switch the main
router to the backup router every time the main router’s memory is busy. Two main scenarios
are conducted in this research to examine the proposed backup algorithm. First, Cisco DHCP
relay services combined with OpenWRT wireless router. Second, Mikrotik original “Capsman”
protocol DHCP relay combined alternatively with wireless-enabled and OpenWRT wireless
router. Run test results show that the proposed backup algorithm with DHCP relay which are
configured in OpenWRT wireless router can extend the number of connected clients and the
durability of the wireless router when run its services as DHCP forwarder to DHCP relay and
DHCP server. These combinations slightly affect the IP release time compared to regular DHCP
which employs a direct connection. (Syafei, W.A,. Smart agent and modified master-backup
algorithm for auto switching dynamic host configuration protocol relay through wireless router,
International Journal of Communication Networks and Information Security, 248-255)
An Inherit problem exists in the small office home office (SOHO) wireless router is the
connectivity issue, specially when dynamic host configuration protocol (DHCP)’s pool is running
out. SOHO wireless router is designed to serve a small number of wireless clients. The
modification of the OS is possible with some restrictions, especially the size. This research has
modified the wireless router OS using simple smart algorithm to enhance the flexibility of
dynamic allocation in DHCP server for SOHO wireless router. It switches the selection process
of DHCP server that considering resource allocation of each joined DHCP relays. The modified
wirelesss router is able to serve more than 10 times connected clients compared to using the
original firmware with more than twice longer service time duration. This paper deals with the
examination of the proposed simple smart algorithm in real SOHO wireless router. (Syafei, W.A.,
(2020), Simple Smart Algorithm for Flexibility of Dynamic Allocation in DHCP Server for SOHO
Wireless Router, International Conference on Computer Engineering, Network, and Intelligent
Multimedia, 321-325)
In the continuously evolving environment, computer security has become a convenient
challenge because of the rapid rise and expansion of the Internet. One of the most significant
challenges to networks is attacks on network resources caused by inadequate network security.
DHCP is defenseless to a number of attacks, such as DHCP rogue server attacks. This work is
focused on developing a method of detecting these attacks and granting active host protection
on GNU/Linux operating systems. Unauthorized DHCP servers can be easily arranged and
compete with the legitimate server on the local network that can be the result of distributing
incorrect IP addresses, malicious DNS server addresses, invalid routing information to
unsuspecting clients, intercepting and eavesdropping on communications, and so on. The goal
is to prevent the situations described above by recognizing untrusted DHCP servers and
providing active host protection on the local network. (Makarova, M.S,.(2021), Methods of
Detecting and Neutralizing Potential DHCP Rogue Servers, Conference of Russian Young
Researchers in Electrical and Electronic Engineering, 522-525)
Network Security has called for more concern with the growing scale of internet usage
and cyberattacks thus making the DHCP (Dynamic Host Configuration Protocol) a vital tool for
managing a network. However, few concerns have been channeled towards DHCP as the
protocol was initially designed with the convenience of use instead of security, which left it open
to attacks including DHCP starvation which is a threat to the operation of a network. DHCP
starvation attack is one of the problems that has occurred over network communication and
several techniques have been established to solve this problem. However, the issue of users’
denial of service (DOS) for both wired and wireless networks persists. Thus, this paper
proposes an SDN plus cryptographic-based solution to lessen the impact of the attack and
create a more secure network. The proposed model authenticates the DHCP DISCOVER
request sent by any client connected to the switch (be it the attacker or the victim) thus leading
to a more secure starvation mitigation. The proposed approach further suggests a novel
approach to DORA activity which is based on BROADCAST-UNICAST-BROADCASTUNICAST
to a UNICAST-UNICASTBROADCAST-UNICAST. The proposed approach is proven
mathematically as represented via a python code to be effective and deployable in a real-time
scenario.(Urama, G. C.,(2022), SDN-Based Cryptographic Client Authentication: A New
Approach to DHCP Starvation Mitigation. In International Conference on Innovations in Data
Analytics,519-532)
Network Intrusion Detection System (NIDS) is used to detect anomalous activities that
occur in the network, whether the activity arises from outside or from inside. An extensive
amount of studies have been done in the domain of NIDS using Machine Learning, Deep
Learning, and Reinforcement Learning based techniques on publicly available datasets. The
main problem lies in publicly available datasets as the datasets are un-realistic and too general
for real-life events and attacks and thus the models trained may produce better results during
the training and testing phase but once it is deployed in the real network, most of the attacks
may go undetected. This research focuses on a specific protocol “Dynamic Host Control
Protocol” which is enabled in most of networks whether the network is small, medium or large.
In this research, DHCP specific dataset was generated and trained with different classifiers to
analyze their performance. Random Forest classifier presented better results among other
classifiers. Syed, S., (2021)Classification of DHCP DoS Attacks in NIDS. In 2021 IEEE 18 th
International Conference on Smart Communities: Improving Quality of Life Using ICT, IoT and
AI, 143-146).
For different computers to communicate on the same network or on different networks
they need to know one another’s IP address or MAC address. Involving the IP address and
MAC address has led to a challenging task for a network analyst to secure the communication.
There are various ways to mitigate the attacks in application, transport and network layers of a
network. Mitigating the attacks in data link layer is a challenging task for a network analyst as
adequate security is not assigned to a data link layer. DHCP and DNS are the most widely used
in host configuration and they work in data link layer. Mostly these protocols are vulnerable to
number of attacks like in DHCP the attacks are DHCP Starvation attack and Rogue DHCP
attack while in DNS the attacks are DNS Hijacking Attack and DNS Cache Poisoning Attack.
These protocols have been investigated in this research where DHCP and DNS packets have
been captured and analysed them with the help of Wireshark. Mainly we have analysed how IP
address is assigned to a client from a DHCP Server and how packets are exchanged between
the DHCP client and DHCP Server and DNS is used for resolution of URL into IP address.
(Naaz, S., & Badroo, F. A. (2016). Investigating DHCP and DNS Protocols using Wireshark.
IOSR Journal of Computer Engineering (IOSR-JCE), 3-18)
Network security has become more of a concern with the rapid growth and expansion of
the Internet. While there are several ways to provide security in the application, transport, or
network layers of a network, the data link layer (Layer 2) security has not yet been adequately
addressed. Data link layer protocols used in local area networks (LANs) are not designed with
security features. Dynamic host configuration protocol (DHCP) is one of the most used network
protocols for host configuration that works in data link layer. DHCP is vulnerable to a number of
attacks, such as the DHCP rouge server attack, DHCP starvation attack, and malicious DHCP
client attack. This work introduces a new scheme called Secure DHCP (S-DHCP) to secure
DHCP protocol. The proposed solution consists of two techniques. The first is the authentication
and key management technique that is used for entities authentication and management of
security key. It is based on using Diffie-Hellman key exchange algorithm supported by the
difficulty of Elliptic Curve Discrete Logarithm Problem (ECDLP) and a strong cryptographic one-
way hash function. The second technique is the message authentication technique, which uses
the digital signature to authenticate the DHCP messages exchanged between the clients and
server. (Younes, O. S. (2016). A Secure DHCP Protocol to Mitigate LAN Attacks. Journal of
Computer and Communications, 39-50)
The sniffing attack or sniffer att”ck, in the context of network security, corresponds to
data theft or interception by capturing network traffic using a sniffer (an application that aims to
capture network packets). When data is transmitted over networks, if data packets are not
encrypted, data in the network packet can be read using a sniffer. Using a sniffer application, an
attacker can analyze the network and obtain information so that it can eventually crash or
corrupt the network or read the communications that occur in the network. Sniffing attacks can
be compared to touching wires and getting to know the conversation, and for this reason it is
also called” wiretapping” applied to computer networks. In this paper, a sniffing attack is shared
which can significantly damage the computer networks as well as methods of combating such
attacks. Sniffing is usually performed to analyze network usage, troubleshoot network problems,
monitor session for development and testing purposes.(Glăvan, D., (2020). Sniffing Attacks on
Computer Networks. Scientific Bulletin “Mircea cel Batran” Naval Academ, 202-207)
Over the years, devices and the use of networks has grown by leaps and bounds
thereby making the Dynamic Host Configuration Protocol (DHCP) a very important network
management tool. Initially, the protocol focused more on ease of use rather than security, which
made it vulnerable to attacks like DHCP starvation among others. There are techniques which
have been developed over the years to mitigate attacks to the DHCP server. This research used
DHCP snooping to mitigate the attack to achieve a more secured network. The experiment was
done in a virtual environment using GNS3. Due to the type of malicious packets that was
generated during attack, the LAN was isolated from the Internet to avoid any destruction. The
experiment demonstrated how easy it was to attack and exhaust DHCP pool of address thereby
prohibited the legitimate client from getting IP address. The research also demonstrated the
mitigation of DHCP starvation attack by using DHCP snooping.(Nuhu, A. A. (2020). Mitigating
DHCP Starvation Attack Using Snooping Technique. Fudma Journal of Sciences, 4(1), 560-
566.)
With the advancement of network technology, more electronic devices have begun to
connect to the Internet. The era of IoE (Internet of Everything) is coming. However, the number
of serious incidents of cyberattacks on important facilities has gradually increased at the same
time. Security becomes an important issue when setting up plenty of network devices in an
environment. Thus, we propose an innovative mechanism of the Moving Target Defense (MTD)
to solve the problems happening to other MTD mechanisms in the past. This method applies
Dynamic Host Configuration Protocol (DHCP) to dynamically change the IPv4 address of
information equipment in the medical environment. In other words, each of the nodes performs
IP-Hopping and effectively avoids malicious attacks. Communication between devices relies on
DNS lookup. The mechanism avoids problems such as time synchronization and IP conflict.
Also, it greatly reduces the costs of large-scale deployment. All of these problems are
encountered by other MTD mechanisms in the past. Not only can the mechanism be applied to
the medical and information equipment, it can also be applied to various devices connected to
the Internet, including Industrial Control System (ICS). The mechanism is implemented in
existing technologies and prevents other problems, which makes it easy to build a system.
(Huang, C.-W. (2021). A Legacy Infrastructure-based Mechanism for Moving Target Defense. In
2021 IEEE Eurasia Conference on Biomedical Engineering, Healthcare and Sustainability , 80-
83)
The modern era demands greater speed, effici”ncy, and quality in every aspect of life.
Smart technologies, particularly the Internet of Things (IoT), have revolutionized the way people
live and work. In this research paper, we explore the implementation of smart office technology,
which includes connectivity and collaboration solutions, to enhance the productivity and safety
of employees. For instance, smart parking systems enable employees to plan their commutes
ahead of time, while smart meeting room solutions facilitate the selection of the most suitable
meeting room for a team based on specific criteria. Furthermore, we discuss the use of IoT
devices to limit natural pollution and adopt renewable energy in the office, such as air, sun, and
rainwater harvesting. We also consider the implementation of a firewall in our server to ensure
the security of our smart office network. By combining these smart concepts and systems, we
can create a more efficient, secure, and eco-friendly workplace.(Kumar, B. (2023). Design And
Implementation Of A Smart Office Network Module Using Visual Simulation Tool. Journal of
Namibian Studies: History Politics Culture, 34, 2664-2676.)
The Internet network is important because now it has entered the 4.0 era, where all
community activities are primarily carried out with the help of the Internet. Therefore, the internet
network can also connect. One example of using the Internet is currently needed in the school
environment. Teachers and students must carry out learning transformations that are usually
paper-based and are presently changing through the Internet. As is the case with all teachers
and students in private vocational schools. From the results of observations that have been
made, not all teachers and students get good internet service. Then, when checking on the
server side, it turned out that the internet network management was not following the standards
in the field, so the three ISPs (internet service providers) were not being utilized optimally. One
solution emerges from presenting these problems: combining and dividing the burden evenly
among the three ISPs. The process of distributing the ISP load evenly is called load balancing.
In this study, the load balancing method used is the Per Connection Classifier (PCC) method,
which can work optimally. This study’s findings indicate that the inefficiencies in internet service
provision within private vocational schools are due to suboptimal internet network management
practices, leading to the need for more utilization of the available internet service providers
(ISPs), and proposes the implementation of load balancing as a solution. (Mustofa, D. (2023).
Implementation of Load Balancing Per Connection Classifier on Mikrotik for Internet Services at
Private Vocational Schools. SAGA: Journal of Technology and Information System, 104-113.)
Nowadays, many new devices with network capabilities are constantly being connected
to existing networks. Consequently, the need for an automatic and dynamic approach to supply
critical network settings to these new nodes is indispensable in large networks, which is mainly
provided by the dynamic host configuration protocol (DHCP). Unfortunately, the vulnerabilities of
this protocol can be exploited to attack such large networks. This paper conducts the first
detailed, systematic, and thorough study of the publicly known DHCP attacking tools that target
the DHCP service. The study analyses DHCP packet traces to scrutinise the DHCP attacking
tools, analyse their raw packets, and identify their characteristics. It also classifies DHCP
attacking tools by their characteristics, impact on DHCP service, and signatures. Furthermore, a
detection mechanism is proposed that is based on both fingerprint and behavioural signatures.
The findings of this study will be very useful to enhance DHCP implementations and to develop
efficient detection and mitigation methods.( Aldaoud, M. (2021). DHCP Attacking Tools: An
Analysis. Journal of Computer Virology and Hacking Techniques, 17, 119-129.)
Internet Control Message Protocol (ICMP) is very useful when diagnostic network
problem. ICMP is being used and turns on automatically by an Operating System. For security
reason, this protocol can be at ease turn off temporary or permanently by security
administrators such as an event of preventing, delaying attackers from incorrectly identifying
devices. The ICMP disabling leads to a fundamental problem in the previous model- identifying
Dynamic Host Configuration Protocol (DHCP) malicious request by implementing ICMP. To
overcome this specific problem, the proposed model will be implementing Address Resolution
Protocol (ARP) in conjunction with ICMP for identifying malicious IP address request through
DHCP.( Yaibuates, M., & Chaisricharoen, R. (2020). A Combination of ICMP and ARP for DHCP
Malicious Attack Identification. In 2020 Joint International Conference on Digital Arts, Media and
Technology with ECTI Northern Section Conference on Electrical, Electronics, Computer and
Telecommunications, 10-17)
Detecting and preventing network attacks are necessary for network solidity as any
disruption in the network performance resulting from an attack can lead to loss of resources.
Though ARP plays a vital role in successful local area network (LAN) communication, its
vulnerabilities are used by attackers every day and by far have made it the leading point for
refined LAN attacks such as; denial-of-service (DoS) and man-in-the-middle (MITM). This paper
proposes a technique to mitigate an Address Resolution Protocol (ARP) spoofing-based Secure
Socket Layer Stripping (SSL) in a Local Area Network (LAN) using both dynamic host
configuration protocol (DHCP) snooping and ARP inspection technique. This mitigation
technique includes a detection and prevention module. The detection module uses an analyzing
tool and an algorithm that captures ARP packets. It identifies suspicious activity in the network,
and once detected, a DHCP snooping, and ARP inspection technique is used to mitigate the
attack to achieve a more secure network. ( Adjei, H. A. S. (2021). SSL Stripping Technique
(DHCP Snooping and ARP Spoofing Inspection). In 2021 23rd International Conference on
Advanced Communication Technology, 187-193)
References
Pradana, D. A., Budiman, A. S. (2021). DHCP Snooping and DHCP Alert Methods in Securing
DHCP Server from DHCP Rogue Attacks. International Journal on Informatics for
Development, 10(1), 38-46.
https://ejournal.uin-suka.ac.id/saintek/ijid/article/view/2287
Wang, H., Wang, J. H., Wang, J., Dang, W., Li, F., Shan, J. (2020). Squeezing the Gap: An
Empirical Study on DHCP Performance in a Large-Scale Wireless Network. IEEE/ACM
Transactions on Networking, 28(2), 832-845
. https://ieeexplore.ieee.org/abstract/document/9027913
Howser, G., Howser, G. (2020). Dynamic Host Configuration. In Computer Networks and the
Internet: A Hands-On Approach, 217-229.
https://link.springer.com/chapter/10.1007/978-3-030-34496-2_14
Wintolo, H., Indrianingsih, Y., Hamdani, W., Abdie, S. (2023). Descriptive Analysis and ANOVA
Test with File Sending on Computer Networks Attacked with Rogue’s Dynamic Host
Configuration Protocol (DHCP). Jurnal Ilmiah Teknik Elektro Komputer dan Informatika
(JITEKI), 9(2), 375-384.
http://eprints.uad.ac.id/43224/1/13
Ahmad, I. (2020). Design and Implementation of Network Security using Inter-VLAN-Routing
and DHCP. Asian Journal of Applied Science and Technology, 4(3), 37-44.
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3712916
Tok, M. S., Demirci, M. (2021). Security Analysis of SDN Controller-Based DHCP Services and
Attack Mitigation with DHCPguard. Computers & Security, 102394.
https://www.sciencedirect.com/science/article/abs/pii/S0167404821002182
Syafei, W. A., Soetrisno, Y. A. A., Prasetijo, A. B. (2020). Smart Agent and Modified Master-
Backup Algorithm for Auto-Switching Dynamic Host Configuration Protocol Relay
through Wireless Router. International Journal of Communication Networks and
Information Security, 12(2), 248-255. https://doc-pak.undip.ac.id/7969/1/4478-9113-1.
Syafei, W. A., Soetrisno, Y. A. A., Prasetijo, A. B. (2020). Simple Smart Algorithm for Flexibility of
Dynamic Allocation in DHCP Server for SOHO Wireless Router. 2020 International
Conference on Computer Engineering, Network, and Intelligent Multimedia (CENIM)
321-325. https://ieeexplore.ieee.org/abstract/document/9297852
Makarova, M. S., Maksutov, A. A. (2021). Methods of Detecting and Neutralizing Potential
DHCP Rogue Servers. 2021 IEEE Conference of Russian Young Researchers in
Electrical and Electronic Engineering (ElConRus), 522-525.
https://ieeexplore.ieee.org/abstract/document/9396106
Urama, G. C., Ukwuoma, C. C., Bin Heyat, M. B., Agbesi, V. K., Akhtar, F., Abdullah, M. A.,
Pathak, N., Sharma, N., Dutta, S. (2022). SDN-Based Cryptographic Client
Authentication: A New Approach to DHCP Starvation Mitigation. International
Conference on Innovations in Data Analytics, 519-532.
https://link.springer.com/chapter/10.1007/978-981-99-0550-8_41
Syed, S., Khuhawar, F., Talpur, S. (2021). Machine Learning Approach for Classification of
DHCP DoS Attacks in NIDS. 2021 IEEE 18th International Conference on Smart
Communities: Improving Quality of Life Using ICT, IoT and AI (HONET), 143-146.
https://ieeexplore.ieee.org/abstract/document/9615392
Naaz, S., Badroo, F. A. (2016). Investigating DHCP and DNS Protocols Using Wireshark. IOSR
Journal of Computer Engineering (IOSR-JCE),
18(3).https://ieeexplore.ieee.org/abstract/document/9396106/
Younes, O. S. (2016). A Secure DHCP Protocol to Mitigate LAN Attacks. Journal of Computer
and Communications, 4(1), 39-50.
https://www.sciencedirect.com/science/article/abs/pii/S0167404821002182
Glăvan, D., Răcuciu, C., Moinescu, R., Eftimie, S. (2020). Sniffing Attacks on Computer
Networks. Scientific Bulletin” Mircea cel Batran” Naval Academy, 23(1), 202A-
207.https://www.proquest.com/openview/b63d0016193
Huang, C. W., Liu, I. H., Li, J. S., Wu, C. C., Li, C. F., Liu, C. G. (2021). A Legacy Infrastructure-
based Mechanism for Moving Target Defense. 2021 IEEE 3rd Eurasia Conference on
Biomedical Engineering, Healthcare and Sustainability (ECBIOS), 80-83.
https://ieeexplore.ieee.org/abstract/document/9510261
Mustofa, D., Wirasto, A., Muttakin, A., Astrida, D. N., Saputra, D. I. S. (2023). Implementation of
Load Balancing Per Connection Classifier on Mikrotik for Internet Services at Private
Vocational Schools. SAGA: Journal of Technology and Information System, 1(3), 104
-113. https://journal.mediadigitalpublikasi.com/index.php/saga/article/view/169
Aldaoud, M., Al-Abri, D., Al Maashri, A., Kausar, F. (2021). DHCP Attacking Tools: An Analysis.
Journal of Computer Virology and Hacking Techniques, 17, 119-129.
https://link.springer.com/article/10.1007/s11416-020-00374-8
Yaibuates, M., Chaisricharoen, R. (2020). A Combination of ICMP and ARP for DHCP Malicious
Attack Identification. 2020 Joint International Conference on Digital Arts, Media and
Technology with ECTI Northern Section Conference on Electrical, Electronics,
Computer and Telecommunications, 10
-17.https://ieeexplore.ieee.org/abstract/document/9090760/
Adjei, H. A. S., Shunhua, M. T., Agordzo, G. K., Li, Y., Peprah, G., Gyarteng, E. S. A. (2021).
SSL Stripping Technique (DHCP Snooping and ARP Spoofing Inspection). 2021 23rd
International Conference on Advanced Communication Technology (ICACT), 187-193.
https://ieeexplore.ieee.org/abstract/document/9370460
Definition of Terms

Dynamic Host Configuration Protocol. Is a network management protocol used on Internet


Protocol (IP) networks for automatically assigning IP addresses and other communication
parameters to devices connected to the network using a client–server architecture.
IP Address. is the unique identifying number assigned to every device connected to the
internet. An IP address definition is a numeric label assigned to devices that use the internet to
communicate.
Server. Allows servers to communicate with other devices and servers and, unlike most IP
addresses, is static – meaning it remains the same forever and doesn’t change with each new
session or connection.
Network. A network consists of two or more computers that are linked in order to share
resources (such as printers and CDs), exchange files, or allow electronic communications.
Network Protocol. are a set of rules outlining how connected devices communicate across a
network to exchange information easily and safely
DNS. The Domain Name System (DNS) is a hierarchical and distributed naming system for
computers, services, and other resources in the Internet or other Internet Protocol (IP) networks.
It associates various information with domain names (identification strings) assigned to each of
the associated entities.
CPU.A central processing unit (CPU)—also called a central processor or main processor—is the
most important processor in a given computer. Its electronic circuitry executes instructions of a
computer program, such as arithmetic, logic, controlling, and input/output (I/O) operations
Network Administrator. A network administrator is a person designated in an organization
whose responsibility includes maintaining computer infrastructures with emphasis on local area
networks (LANs) up to wide area networks (WANs).
Configuration. Generally, a configuration is the arrangement – or the process of making the
arrangement – of the parts that make up a whole.
IP Attackers. Internet Protocol (IP) spoofing is a type of malicious attack where the threat actor
hides the true source of IP packets to make it difficult to know where they came from
VLAN’s. A virtual LAN (VLAN) is a logical overlay network that groups together a subset of
devices that share a physical LAN, isolating the traffic for each group.
Wireless Router. A wireless router or Wi-Fi router is a device that performs the functions of a
router and also includes the functions of a wireless access point. It is used to provide access to
the Internet or a private computer network. Depending on the manufacturer and model, it can
function in a wired local area network, in a wireless-only LAN, or in a mixed wired and wireless
network.
Chapter lll
METHODOLOGY
This chapter will presents the research method. It will be Focused the method used in
conducting this study which covers Research Design, Respondents of the Study, Sampling
Procedures, Research Instruments, and Data Gathering Procedures that will be explained in
this chapter.
Researcher Design
This study will employ quantitative research to identify the Problems Encountered by the
Information and Communication Technology Students on the Dynamic Host Configuration
Protocol.
Research Instrument
The researcher will be need survey questionnaire this technique is for gathering
statistical information about the attributes, attitudes actions of population by a structured set of
questions. The purpose of survey questionnaire is to gather data from a target respondents. The
survey will consist of statements that will determine the Problem encountered in DHCP
configuration of Grade-12 Information and communication Technology students.
Respondent of the Study
The respondents of this study will be the Grade 12 Information and Communication
Technology students of San Isidro National High School. The researcher will be informed the
respondents of the purposes and importance of study.
Population and Sample of the Study
This study will be conducted in San Isidro National High School in school year of 2023-
2024. The respondents of this study will be grade 12 students From Information and
communication Technology Strand.
Data Gathering Procedure
After having permitted by the Practical Research 2 and the School Principal, the
conducting Research will be start each respondents will be prevent with similar set of questioner
relating the Problem Encountered in Dynamic Host Configuration Protocol. The survey
Questionnaires will be distributed only to grade 12 Information and Communication Technology
students of San Isidro National High School.

You might also like