ANALISIS SERANGAN DHCP STARVATION ATTACK PADA ROUTER OS MIKROTIK
DOI:
https://doi.org/10.33884/jif.v11i01.7162Keywords:
Mikrotik, DHCP, Starvation attack, Teknologi informasiAbstract
Dynamic Host Configuration Protocol (DHCP) is a client-server protocol that functions to provide IP addresses to client computers/network devices automatically. In using the Mikrotik OS, do further analysis regarding the attack on the DHCP starvation attack. Where the attacker will become a host on one of the computers and request an IP to the proxy OS to obtain the client's personal information which will then be recorded and analyzed for the Man in the Middle attack. Of course, this can be prevented by the filtering techniques available on the miktorik OS. Of course this can be prevented by the filtering techniques that exist on the proxy OS. The key can be seen on the hostname computer that is registered on the proxy, so that in the DHCP Discover process which asks for an IP on the proxy DHCP Server, if the hostname is not registered, it will be listed as Dynamic Host Configuration Protocol (DHCP), which is a client-server protocol that functions to provide IP addresses to client computer/network device automatically. In using the Mikrotik OS, do further analysis regarding the attack on the DHCP starvation attack. Where the attacker will become a host on one of the computers and request an IP to the proxy OS to obtain the client's personal information which will then be recorded and analyzed for the Man in the Middle attack. Of course, this can be prevented by the filtering techniques available on the miktorik OS. Of course this can be prevented by the filtering techniques that exist on the proxy OS. The key can be seen on the hostname computer that is registered on the proxy, so that in the DHCP Discover process which asks for an IP on the proxy DHCP Server, if the hostname is not registered, it will be listed for blocking.
References
D. Kurnia. (2020). Analisis serangan DHCP starvation attack pada router OS Mikrotik”. Jurnal Ilmiah Coret IT Vol. 8, No. 5
T. Ariyadi. (2018). Mitigasi Keamanan Dynamic Host Control Protocol (DHCP) Untuk Mengurangi Serangan Pada Local Area Network (LAN). Jurnal Inovtek Polbeng, Vol. 3 No. 2
Bundet. (2020). Pengertian DHCP Starvation Attack. Diperoleh 30 Desember 2022 pada https://bundet.com/d/923-pengertian-dhcp-starvation-attacks
Maneka, A. D dan Kahewu, M. L. L. (2021). Analisis Keamanan Jaringan Local Area Network Perpustakaan Universitas Kristen Wira Wancana Sumba Menggunakan DHCP Server Berbasis Cisco Packet Tracer. Reputasi Jurnal Rekayasa Perangkat, Vol 2 No 1
Saputra, B. R dan Chandra, D. W. (2022). Simulasi Keamanan Jaringan Dengan Metode DHCP Snooping Dan VLAN Mengggunakan CISCO. Jurnal Teknik Informatika dan Sistem Informasi. Vol 9 No 4
Sarip dan A. Setyanto, “Filter Paket Berdasarkan Differentiated Services Code Point untuk Pencegahan Serangan DHCP Starvation,” Jurnal Pekommas, Vol. 4, No. 2, pp. 137–146, 2019
N. Abdulhafiz A., E. Faith O. dan O. Oyenike M., " Mitigating DHCP Starvation Attack Using Snooping Technique", FUDMA Journal of Sciences (FJS), Vol. 4 No. 1, pp. 560-566, 2020
R. Adipranata dan I. Gunawan, “Penggunaan DHCP Relay Agent untuk Mengoptimalkan Penggunaan DHCP Serverp pada Jaringan dengan Banyak Subnet,” Prosiding Seminar Nasional Aplikasi Teknologi Informasi (SNATI), pp. H99-H103, 2005
Komputer, Wahana. 2003. Konsep Jaringan Komputer dan
Pengembangannya, Penerbit Salemba Infotek, Jakarta
Sukmaaji, Anjik dan Rianto. 2008. Jaringan Komputer, Penerbit Andi, Yogyakarta.
T. Ariyadi & A.T. Maulana.(2021). Penerapan Web Proxy dan Manajemen Bandwidth Menggunakan Mikrotik Router Board pada kantor Pos Palembang 30000. Jurnal Ilmiah(JIF) F.Vol. 9. No. 02.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 JURNAL ILMIAH INFORMATIKA
This work is licensed under a Creative Commons Attribution 4.0 International License.