SERANGAN ARP DAN DHCP PADA JARINGAN IPV4 DAN IPV6

Husni Husni

Abstract


Protokol ARP berperan memetakan IP address ke MAC address dan sebaliknya pada komunikasi antar node di dalam jaringan lokal. DHCP bertugas memberikan IP address serta konfigurasi lain ke suatu interface jaringan. Berbagai bentuk serangan dapat terjadi terhadap dua protokol ini dimulai dari ARP spoofing. IPv6 memperbaiki banyak kelemahan pada IPv4 tetapi tidak terhadap ARP dan DHCP. IPv6 menggunakan protokol Neighbor Discovery dalam penanganan komunikasi jaringan lokal (local link). Hampir semua teknik serangan ARP dan DHCP pada IPv4 dapat diberlakukan pada IPv6, bahkan terbuka kemungkinan hadirnya jenis serangan baru. Teknik SEcure Neighbor Discovery (SEND) sebagai solusi yang diperkenalkan pada IPv6 sangat sulit diaplikasikan terutama terkait dengan pembangkitan alamat terkriptografi. Teknik pengamanan yang dilakukan terhadap jaringan IPv4 dapat diterapkan pada IPv6.

References


Fewer, S. (2007) : ARP Poisoning – An Investigation Into Spoofing the Address Resolution Protocol. [online] http://www.harmonysecurity.com/files/HS-P004 _ARPPoisoning.pdf

Thuc N.D. dkk. (2006) : A Software Solution for Defending Against Man-in-the-Middle Attacks on WLAN. [online] http://www.utdallas.edu/~htv041000/files/MiMA.pdf

H3C (2008) : DHCP Security Features Technology White Paper. Hangzhou H3C Technologies. [online] http://www.h3c.com/portal/res /200802 /03/20080203_320314_DHCP Security Features Technology White Paper(V1.00)_333753_57_0.pdf

Issac B. (2009) : Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks. International Journal of Network Security, Vol. 8 No. 1, PP.102-113. [online] http://ijns.femto.com.tw/contents/ijns-v8-n2/ijns-v8-n2.html

Peterson, D.C. (1982) : Ethernet Address Resolution Protocol, RFC-826. [online] http://www.faqs.org/rfcs/rfc826.html.

Nachreiner, C (2003) : Anatomy of an ARP Poisoning Attack. [online] http://www. Watchguard.com/infocenter/editorial/135324.asp

Ramachandran V. dan Nandi S. (2004) : Detecting ARP Spoofing: An Active Techniques. [online] http://www.springerlink.com/index/l421371736251342.pdf

Bruschi B., Ornaghi, A., dan Rosti E. (2003) : S-ARP: a Secure Address Resolution Protocol, 19th Annual Computer Security Applications Conference. [online] http://www.acsac.org/2003/papers/111.pd

f

Barnaba, M. (2003) : Anticap. [online] http://cvs.antifork.org/cvsweb.cgi/anticap, 2003

Teterin (2003) : Antidote [online] http://online.securityfocus.com/archive/1/299929

Ju, H.I, dan Han, J.W. (2005) : DHCP Message Authentication with an Effective Key Management, Proceedings of World Academy of Science, Engineering and Technology Vol. 8. [online] http://www.waset.org /pwaset/v8/v8-25.pdf

Droms, R. (1997) : Dynamis Host Configuration Protocol, RFC-2131. [online] http://www.ietf.org/rfc/rfc2131.txt

Droms, R., dan Arbaugh, W. (2001): Authentication for DHCP messages, RFC-3118. [online] http://tools.ietf.org/html/rfc3118

Wikipedia (2008) : IPv4. [online] http://en.wikipedia.org/wiki/IPv4

Hines, A. (2004) : Neighbor Discovery in IPv6. [online] http://wwwcs.unipaderborn.de/cs/ag-madh/WWW/Teaching/2004SS

/AlgInternet /Submissions/17-neighbour-discovery-protocol-in-IPv6.pdf.

Thomson, S., dan Narten, T. (1998) : IPv6 Stateless Address Autoconfiguration, RFC-2462. [online] http://www.ietf.org/rfc/rfc2462.txt

Arkko J., dkk. (2002) : Securing IPv6 Neighbor and Router Discovery. [online] http://www.tml.tkk.fi/~pnr/publications/WiSe2002-Arkko.pdf

Majstor, F. (2003) : Does IPv6 Protocol Solve All Security Problems of IPv4?, Information Security Solutons Europe, Vienna Austria. [online] http://www.6journal.org/archive/00000183/01/IPv6_security_paper.pdf

Beck, F. (2007) : Monitoring the Neighbor Discovery Protocol, The 2nd International Workshop on IPv6 Today – Technology and Deployment, Guadeloupe.

Droms, R. (2003) : Dynamic Host Configuration Protocol for IPv6 (DHCPv6), RFC-3315. [online] http://tools.ietf.org/html/rfc3315T.

Narten, T. dkk. (2007) : Neighbor Discovery for IP version 6 (IPv6), RFC– 4861. [online] http://tools.ietf.org/html/rfc4861

Conta, A., Deering, S., dan Gupta, M. (2006) : Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification, RFC-4443. [online] http://tools.ietf.org/html/rfc4443

Convery, S., dan Miller, D. (2004) : IPv6 and IPv4 Threat Comparison and BestPractice Evaluation (v1.0). [online] http://www.seanconvery.com/v6-v4-threats.pdf

Arkko, J., dkk. ((2005) :SEcure Neighbor Discovery (SEND), RFC-3971. [Online] Available: http://www.ietf.org/rfc/rfc397




DOI: https://doi.org/10.21107/simantec.v1i3.13371

Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 Husni Husni

Indexed By