Sistemy i Sredstva Informatiki [Systems and Means of Informatics]
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Impact factor

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Sistemy i Sredstva Inform.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Sistemy i Sredstva Informatiki [Systems and Means of Informatics], 2014, Volume 24, Issue 4, Pages 100–110
DOI: https://doi.org/10.14357/08696527140406
(Mi ssi377)
 

The propagation method by means of an attack of the “man-in-the-middle” type in the DHCP protocol

M. V. Levykina, M. I. Tronenkoa, I. V. Shidlovsky-Moskvinb

a Institute of Informatics Problems, Russian Academy of Sciences, 44-2 Vavilov Str., Moscow 119333, Russian Federation
b Closed Joint Stock Company RNT, 6, 2nd Ostankinskaya Str., Moscow 129515, Russian Federation
References:
Abstract: The research of the up-to-date malicious software conducted by the authors detected that one of the main methods of their expansion is the attack to the Dynamic Host Configuration Protocol (DHCP) made in order to organize the “man-in-the-middle” scheme. However, the result of such attack is of probabilistic nature and it depends on the difference between the speeds of response of antagonistic and legal (licensed) DHCP servers. The present paper describes the concept of expansion by means of the “man-in-the-middle” attack in the DHCP protocol and its limitations, imposed by the DHCP protocol. Examination of the DHCP protocol and limitations imposed on the expansion concept in it leads to creation of the new method which executes the attack of the “man-in-the-middle” type. This new method of unavoidable attack on the DHCP protocol excludes the probability of its failure and is the main result of the present research.
Keywords: DHCP protocol; man-in-the-middle; local area net (LAN); guaranteed method of propagation; malicious code.
Received: 02.09.2014
Bibliographic databases:
Document Type: Article
Language: Russian
Citation: M. V. Levykin, M. I. Tronenko, I. V. Shidlovsky-Moskvin, “The propagation method by means of an attack of the “man-in-the-middle” type in the DHCP protocol”, Sistemy i Sredstva Inform., 24:4 (2014), 100–110
Citation in format AMSBIB
\Bibitem{LevTroShi14}
\by M.~V.~Levykin, M.~I.~Tronenko, I.~V.~Shidlovsky-Moskvin
\paper The propagation method by means of~an~attack of~the~``man-in-the-middle'' type in~the~DHCP protocol
\jour Sistemy i Sredstva Inform.
\yr 2014
\vol 24
\issue 4
\pages 100--110
\mathnet{http://mi.mathnet.ru/ssi377}
\crossref{https://doi.org/10.14357/08696527140406}
\elib{https://elibrary.ru/item.asp?id=22996792}
Linking options:
  • https://www.mathnet.ru/eng/ssi377
  • https://www.mathnet.ru/eng/ssi/v24/i4/p100
  • Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Системы и средства информатики
    Statistics & downloads:
    Abstract page:265
    Full-text PDF :192
    References:26
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024