DHCP origin traceback

  • Authors:
  • Saugat Majumdar;Dhananjay Kulkarni;Chinya V. Ravishankar

  • Affiliations:
  • Cisco Systems, Inc.;Boston University;University of California - Riverside

  • Venue:
  • ICDCN'11 Proceedings of the 12th international conference on Distributed computing and networking
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Imagine that the DHCP server is under attack from malicious hosts in your network. How would you know where these DHCP packets are coming from, or which path they took in the network? This paper investigates the problem of determining the origin of a DHCP packet in a network. We propose a practical method for adding a new option field that does not violate any RFC's, which we believe should be a crucial requirement while proposing any related solution. The new DHCP option will contain the ingress port and the switch MAC address. We recommend that this new option be added at the edge so that we can use the recorded value for performing traceback. The computational overhead of our solution is low, and the related network management tasks are low as well. We also address issues related to securing the field in order to maintain privacy of switch MAC addresses, fragmentation of packets, and possible attack scenarios. Our study shows that the traceback scheme is effective and practical to use in most network environments.