Implementation of DHCP Snooping Method to Improve Security on Computer Networks
DOI:
https://doi.org/10.32877/bt.v6i3.1174
Keywords:
Computer Network, DHCP Snooping, Network Security, Trusted Port, Untrusted Port
Abstract
This research proposes the DHCP Snooping method which is used to increase security on computer networks because Dynamic Host Configuration Protocol (DHCP) is a potential target for computer network attacks, one of the attack gaps that can occur in DHCP is the DHCP Rogue attack which is the simplest hacking method in which the attacker creates a fake DHCP connected to the core network allowing the hacker to set up a fake DHCP Server with full access to distribute IP addresses to clients. To address security gaps in computer networks in this research, researchers applied the DHCP Snooping method, which is a series of techniques to improve DHCP network security. When the DHCP server allocates IP addresses to clients on the LAN, DHCP Snooping can be configured on the LAN switch to allow only clients with certain IP and MAC addresses to have access to the network. By implementing the DHCP Snooping method you can increase security on computer networks where DHCP Snooping can distinguish which ports can be trusted (Trusted Port) and which ports cannot be trusted (Untrusted Port) so that the security of data and information in the computer network is maintained properly. Based on the results of this research, DHCP Snooping can prevent clients from getting DHCP IPs from DHCP Rouge because it has determined Trusted Port and Untrusted Port.
Downloads
References
Dara YC, Hariadi F, Lede PA. Analisis Penerapan Sistem Keamanan Jaringan Menggunakan Metode Dhcp Snooping Dan Switch Port Security. JURNAL TEKNIK INFORMATIKA INOVATIF WIRA WACANA. 2023 May 16;1(3):187-96.
Ariyadi T, Riyansyah AN, Agung M, Ikrar MA. Analisis ANALISIS SERANGAN DHCP STARVATION ATTACK PADA ROUTER OS MIKROTIK. JURNAL ILMIAH INFORMATIKA. 2023 Mar 10;11(01):85-93.
Sulaiman OK. Analisis Sistem Keamanan Jaringan Dengan Menggunakan Switch Port Security. CESS (Journal Of Computer Engineering, System And Science). 2016 Jan;1(1):9-14.
Tamsir Ariyadi T. Desain keamanan DHCP snooping untuk mengurangi serangan Local Area Network (LAN). Jurnal Sistem Komputer Musi Rawas (JUSIKOM). 2017;2(01):28-36.
ANOM, I. G. K. SISTEM AUTENTIKASI PROVISIONING JARINGAN WIRELESS MELALUI DHCP SERVER DENGAN MENGGUNAKAN LAYANAN PESAN.
Tarkaa NS, Iannah PI, Iber IT. Design and simulation of local area network using cisco packet tracer. The International Journal of Engineering and Science. 2017;6(10):63-77.
Marcus RD, Rosyadi HE, Pamuji FY, No JT, Klojen PC. Prototype Sistem Administrasi Dan Keamanan Jaringan Komputer Berbasis DHCP Server Mikrotik. Briliant: Jurnal Riset dan Konseptual. 2021 Aug 31;6(3):685-95.
Puspasari L, Rasmila R. IMPLEMENTASI DHCP SNOOPING TRUST DAN LIMIT RATE DENGAN METODE ACTION RESEARCH. InProsiding Seminar Hasil Penelitian Vokasi (Semhavok) 2019 (Vol. 1, No. 1, pp. 87-94).
Miftah Z. Simulasi keamanan jaringan dengan metode DHCP SNOOPING dan VLAN. Faktor Exacta. 2018;11(2):167.
Pradana DA, Budiman AS. The DHCP Snooping and DHCP Alert Method in Securing DHCP Server from DHCP Rogue Attack. IJID (International Journal on Informatics for Development). 2021;10(1):38-46.
Medianto, Medianto. "Analisis Keamanan Jaringan Local Area Network yang Menggunakan DHCP Server Berbasis Cisco dengan metode Penetration Testing." Journal of Information System and Technology (JOINT) 1.1 (2020): 100-124.
Buamona, Nur Qamar, Mustamin Hamid, and Erwin Gunawan. "Analisis Dan Implmentasi Keamanan Jaringan Menggunakan Metode DHCP Snooping dan Swirch Port Security." Jurnal Teknik Informatika (J-Tifa) 6.1 (2023): 23-31.
Akashi, Shigeo, and Yao Tong. "Classification of DHCP spoofing and effectiveness of DHCP Snooping." Proceedings on 2018 International Conference on Advances in Computer Technology, Information Science and Communication, edited by Wen-Bing Horng and Yong Yue. 2019.
Alsaadi, Rawya Raed, and Dalael Saad Abdul-Zahra. "SECURITY DHCP SERVER ON LAN NETWORK." Turkish Journal of Physiotherapy and Rehabilitation 32: 3.
Bayu, Teguh Indra, and Nurhanif Nurhanif. "Model Keamanan pada Virtual Local Area Network (VLAN) untuk Mengatasi DHCP Rogue." Indonesian Journal of Computing and Modeling 1.2 (2018): 55-60.
Rominton, Muhamad Agung, Ahmad Heryanto, and Adi Hermansyah. "Perancangan Inter Vlan Routing Pada Juniper Switch: Perancangan Inter Vlan Routing Pada Juniper Switch." Journal of Network and Computer Applications (ISSN: 2964-6669) 1.2 (2022): 1-12.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 bit-Tech : Binary Digital - Technology
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
I hereby assign and transfer to bit-Tech all exclusive copyright ownership rights to the above work. This includes, but is not limited to, the right to publish, republish, downgrade, distribute, transmit, sell, or use the work and other related materials worldwide, in whole, or in part, in all languages, in electronic, printed, or any other form of media, now known or hereafter developed and reserves the right to permit or license a third party to do any of the above. I understand that this exclusive right will belong to bit-Tech from the date the article is accepted for publication. I also understand that bit-Tech, as the copyright owner, has sole authority to license and permit reproduction of the article. I understand that, except for copyright, any other proprietary rights associated with the work (e.g. patents or other rights to any process or procedure) must be retained by the author. In addition, I understand that bit-Tech permits authors to use their papers in any way permitted by the applied Creative Commons license.