RUS  ENG
Full version
JOURNALS // Sistemy i Sredstva Informatiki [Systems and Means of Informatics] // Archive

Sistemy i Sredstva Inform., 2014 Volume 24, Issue 4, Pages 100–110 (Mi ssi377)

The propagation method by means of an attack of the “man-in-the-middle” type in the DHCP protocol

M. V. Levykina, M. I. Tronenkoa, I. V. Shidlovsky-Moskvinb

a Institute of Informatics Problems, Russian Academy of Sciences, 44-2 Vavilov Str., Moscow 119333, Russian Federation
b Closed Joint Stock Company RNT, 6, 2nd Ostankinskaya Str., Moscow 129515, Russian Federation

Abstract: The research of the up-to-date malicious software conducted by the authors detected that one of the main methods of their expansion is the attack to the Dynamic Host Configuration Protocol (DHCP) made in order to organize the “man-in-the-middle” scheme. However, the result of such attack is of probabilistic nature and it depends on the difference between the speeds of response of antagonistic and legal (licensed) DHCP servers. The present paper describes the concept of expansion by means of the “man-in-the-middle” attack in the DHCP protocol and its limitations, imposed by the DHCP protocol. Examination of the DHCP protocol and limitations imposed on the expansion concept in it leads to creation of the new method which executes the attack of the “man-in-the-middle” type. This new method of unavoidable attack on the DHCP protocol excludes the probability of its failure and is the main result of the present research.

Keywords: DHCP protocol; man-in-the-middle; local area net (LAN); guaranteed method of propagation; malicious code.

Received: 02.09.2014

DOI: 10.14357/08696527140406



Bibliographic databases:


© Steklov Math. Inst. of RAS, 2024