SERANGAN ARP DAN DHCP PADA JARINGAN IPV4 DAN IPV6

Husni Husni

Abstract


Protokol ARP berperan memetakan IP address ke MAC address dan sebaliknya pada komunikasi antar node di dalam jaringan lokal. DHCP bertugas memberikan IP address serta konfigurasi lain ke suatu interface jaringan. Berbagai bentuk serangan dapat terjadi terhadap dua protokol ini dimulai dari ARP spoofing. IPv6 memperbaiki banyak kelemahan pada IPv4 tetapi tidak terhadap ARP dan DHCP. IPv6 menggunakan protokol Neighbor Discovery dalam penanganan komunikasi jaringan lokal (local link). Hampir semua teknik serangan ARP dan DHCP pada IPv4 dapat diberlakukan pada IPv6, bahkan terbuka kemungkinan hadirnya jenis serangan baru. Teknik SEcure Neighbor Discovery (SEND) sebagai solusi yang diperkenalkan pada IPv6 sangat sulit diaplikasikan terutama terkait dengan pembangkitan alamat terkriptografi. Teknik pengamanan yang dilakukan terhadap jaringan IPv4 dapat diterapkan pada IPv6.

References


Fewer, S. (2007) : ARP Poisoning – An Investigation Into Spoofing the Address Resolution Protocol. [online] http://www.harmonysecurity.com/files/HS-P004 _ARPPoisoning.pdf

Thuc N.D. dkk. (2006) : A Software Solution for Defending Against Man-in-the-Middle Attacks on WLAN. [online] http://www.utdallas.edu/~htv041000/files/MiMA.pdf

H3C (2008) : DHCP Security Features Technology White Paper. Hangzhou H3C Technologies. [online] http://www.h3c.com/portal/res /200802 /03/20080203_320314_DHCP Security Features Technology White Paper(V1.00)_333753_57_0.pdf

Issac B. (2009) : Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks. International Journal of Network Security, Vol. 8 No. 1, PP.102-113. [online] http://ijns.femto.com.tw/contents/ijns-v8-n2/ijns-v8-n2.html

Peterson, D.C. (1982) : Ethernet Address Resolution Protocol, RFC-826. [online] http://www.faqs.org/rfcs/rfc826.html.

Nachreiner, C (2003) : Anatomy of an ARP Poisoning Attack. [online] http://www. Watchguard.com/infocenter/editorial/135324.asp

Ramachandran V. dan Nandi S. (2004) : Detecting ARP Spoofing: An Active Techniques. [online] http://www.springerlink.com/index/l421371736251342.pdf

Bruschi B., Ornaghi, A., dan Rosti E. (2003) : S-ARP: a Secure Address Resolution Protocol, 19th Annual Computer Security Applications Conference. [online] http://www.acsac.org/2003/papers/111.pd

f

Barnaba, M. (2003) : Anticap. [online] http://cvs.antifork.org/cvsweb.cgi/anticap, 2003

Teterin (2003) : Antidote [online] http://online.securityfocus.com/archive/1/299929

Ju, H.I, dan Han, J.W. (2005) : DHCP Message Authentication with an Effective Key Management, Proceedings of World Academy of Science, Engineering and Technology Vol. 8. [online] http://www.waset.org /pwaset/v8/v8-25.pdf

Droms, R. (1997) : Dynamis Host Configuration Protocol, RFC-2131. [online] http://www.ietf.org/rfc/rfc2131.txt

Droms, R., dan Arbaugh, W. (2001): Authentication for DHCP messages, RFC-3118. [online] http://tools.ietf.org/html/rfc3118

Wikipedia (2008) : IPv4. [online] http://en.wikipedia.org/wiki/IPv4

Hines, A. (2004) : Neighbor Discovery in IPv6. [online] http://wwwcs.unipaderborn.de/cs/ag-madh/WWW/Teaching/2004SS

/AlgInternet /Submissions/17-neighbour-discovery-protocol-in-IPv6.pdf.

Thomson, S., dan Narten, T. (1998) : IPv6 Stateless Address Autoconfiguration, RFC-2462. [online] http://www.ietf.org/rfc/rfc2462.txt

Arkko J., dkk. (2002) : Securing IPv6 Neighbor and Router Discovery. [online] http://www.tml.tkk.fi/~pnr/publications/WiSe2002-Arkko.pdf

Majstor, F. (2003) : Does IPv6 Protocol Solve All Security Problems of IPv4?, Information Security Solutons Europe, Vienna Austria. [online] http://www.6journal.org/archive/00000183/01/IPv6_security_paper.pdf

Beck, F. (2007) : Monitoring the Neighbor Discovery Protocol, The 2nd International Workshop on IPv6 Today – Technology and Deployment, Guadeloupe.

Droms, R. (2003) : Dynamic Host Configuration Protocol for IPv6 (DHCPv6), RFC-3315. [online] http://tools.ietf.org/html/rfc3315T.

Narten, T. dkk. (2007) : Neighbor Discovery for IP version 6 (IPv6), RFC– 4861. [online] http://tools.ietf.org/html/rfc4861

Conta, A., Deering, S., dan Gupta, M. (2006) : Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification, RFC-4443. [online] http://tools.ietf.org/html/rfc4443

Convery, S., dan Miller, D. (2004) : IPv6 and IPv4 Threat Comparison and BestPractice Evaluation (v1.0). [online] http://www.seanconvery.com/v6-v4-threats.pdf

Arkko, J., dkk. ((2005) :SEcure Neighbor Discovery (SEND), RFC-3971. [Online] Available: http://www.ietf.org/rfc/rfc397




DOI: https://doi.org/10.21107/simantec.v1i3.13371

Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 Husni Husni

Presidenslot

bonus new member

QQ188

slot

batmantoto

slot gacor

slot gacor

slot gacor

slot olympus

slot demo

slot deposit 1000

slot gacor

slot88

rokokbet

slot88

slot gacor

rokokbet

slot resmi

rokokbet

https://sandiegohills.org/

Situs Toto

Situs Toto

Dana4d

Situs Toto

Pan4D

Toto 4d

slot777

https://lppm.stba-jia.ac.id/

slot88

https://ppki.stba-jia.ac.id/

https://pmb.iainkudus.id/

https://jim.iainkudus.id/

slot777

Situs Toto

Slot777

SITUS TOTO

PAN4D

PAN4D

Slot88

Toto 4d

situs toto

slot88

https://iboninternational.org/about-us

https://jurnalkommas.com/docs/Jurnal

https://www.wulaguda.com.au/gallery

slot thailand

bonus new member

togelin

situs toto

hokijp168

paris88

slot gacor

vegas123

situs slot

miya4d

slot gacor

mahjong ways 2

DPRBET

dollar4d

levis4d

buku mimpi

laetoto

Slot Gacor

slot pulsa

slot777

slot gacor gampang menang

Indexed By

slot

slot777

slot gacor maxwin

slot777

slot gacor

slot gacor

slot777

merahtoto

merahtoto

slot777

hijautoto

kuningtoto

game slot

kuningtoto slot

kuningtoto

link kuningtoto

birutoto

birutoto

slot gacor

ungutoto

link ungutoto

slot gacor

ungutoto

togel online 4d

tototogel

bandar togel

game online

slot gacor

situs gacor

merahtoto

kuningtoto

kuningtoto

merahtoto

hijautoto

hijautoto

hijautoto

hijautoto

birutoto

slot88

merahtoto

merahtoto