SERANGAN ARP DAN DHCP PADA JARINGAN IPV4 DAN IPV6
Abstract
Full Text:
PDF (Bahasa Indonesia)References
Fewer, S. (2007) : ARP Poisoning – An Investigation Into Spoofing the Address Resolution Protocol. [online] http://www.harmonysecurity.com/files/HS-P004 _ARPPoisoning.pdf
Thuc N.D. dkk. (2006) : A Software Solution for Defending Against Man-in-the-Middle Attacks on WLAN. [online] http://www.utdallas.edu/~htv041000/files/MiMA.pdf
H3C (2008) : DHCP Security Features Technology White Paper. Hangzhou H3C Technologies. [online] http://www.h3c.com/portal/res /200802 /03/20080203_320314_DHCP Security Features Technology White Paper(V1.00)_333753_57_0.pdf
Issac B. (2009) : Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks. International Journal of Network Security, Vol. 8 No. 1, PP.102-113. [online] http://ijns.femto.com.tw/contents/ijns-v8-n2/ijns-v8-n2.html
Peterson, D.C. (1982) : Ethernet Address Resolution Protocol, RFC-826. [online] http://www.faqs.org/rfcs/rfc826.html.
Nachreiner, C (2003) : Anatomy of an ARP Poisoning Attack. [online] http://www. Watchguard.com/infocenter/editorial/135324.asp
Ramachandran V. dan Nandi S. (2004) : Detecting ARP Spoofing: An Active Techniques. [online] http://www.springerlink.com/index/l421371736251342.pdf
Bruschi B., Ornaghi, A., dan Rosti E. (2003) : S-ARP: a Secure Address Resolution Protocol, 19th Annual Computer Security Applications Conference. [online] http://www.acsac.org/2003/papers/111.pd
f
Barnaba, M. (2003) : Anticap. [online] http://cvs.antifork.org/cvsweb.cgi/anticap, 2003
Teterin (2003) : Antidote [online] http://online.securityfocus.com/archive/1/299929
Ju, H.I, dan Han, J.W. (2005) : DHCP Message Authentication with an Effective Key Management, Proceedings of World Academy of Science, Engineering and Technology Vol. 8. [online] http://www.waset.org /pwaset/v8/v8-25.pdf
Droms, R. (1997) : Dynamis Host Configuration Protocol, RFC-2131. [online] http://www.ietf.org/rfc/rfc2131.txt
Droms, R., dan Arbaugh, W. (2001): Authentication for DHCP messages, RFC-3118. [online] http://tools.ietf.org/html/rfc3118
Wikipedia (2008) : IPv4. [online] http://en.wikipedia.org/wiki/IPv4
Hines, A. (2004) : Neighbor Discovery in IPv6. [online] http://wwwcs.unipaderborn.de/cs/ag-madh/WWW/Teaching/2004SS
/AlgInternet /Submissions/17-neighbour-discovery-protocol-in-IPv6.pdf.
Thomson, S., dan Narten, T. (1998) : IPv6 Stateless Address Autoconfiguration, RFC-2462. [online] http://www.ietf.org/rfc/rfc2462.txt
Arkko J., dkk. (2002) : Securing IPv6 Neighbor and Router Discovery. [online] http://www.tml.tkk.fi/~pnr/publications/WiSe2002-Arkko.pdf
Majstor, F. (2003) : Does IPv6 Protocol Solve All Security Problems of IPv4?, Information Security Solutons Europe, Vienna Austria. [online] http://www.6journal.org/archive/00000183/01/IPv6_security_paper.pdf
Beck, F. (2007) : Monitoring the Neighbor Discovery Protocol, The 2nd International Workshop on IPv6 Today – Technology and Deployment, Guadeloupe.
Droms, R. (2003) : Dynamic Host Configuration Protocol for IPv6 (DHCPv6), RFC-3315. [online] http://tools.ietf.org/html/rfc3315T.
Narten, T. dkk. (2007) : Neighbor Discovery for IP version 6 (IPv6), RFC– 4861. [online] http://tools.ietf.org/html/rfc4861
Conta, A., Deering, S., dan Gupta, M. (2006) : Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification, RFC-4443. [online] http://tools.ietf.org/html/rfc4443
Convery, S., dan Miller, D. (2004) : IPv6 and IPv4 Threat Comparison and BestPractice Evaluation (v1.0). [online] http://www.seanconvery.com/v6-v4-threats.pdf
Arkko, J., dkk. ((2005) :SEcure Neighbor Discovery (SEND), RFC-3971. [Online] Available: http://www.ietf.org/rfc/rfc397
DOI: https://doi.org/10.21107/simantec.v1i3.13371
Refbacks
- There are currently no refbacks.
Copyright (c) 2022 Husni Husni
Indexed By