Font Size: a A A

Security Project Analysis And Investigation Based On DHCP

Posted on:2009-07-07Degree:MasterType:Thesis
Country:ChinaCandidate:L J ChenFull Text:PDF
GTID:2178360245970291Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the prevalence of Internet, the relations of people's work, study, life and network are more and more tightness. And various networks are being built. For example: enterprise network, campus network and public network etc. And we know in application of TCP/IP network, when a network user only obtains a network address, he can communicate with other network users. In the practical application of Internet ,we often need face some matter: for example the collision of IP address, the mistake of gateway or DNS Server's setting result in we can not communicate with other host computer in network, IP address have to continually modify due to change of computer's location. Especially now with the popularization of notebook PC the mobility of network users are more and more increased. Based on the various questions in administration of networks we need to introduce the service of Dynamic Host Configuration Protocol (DHCP) and then we can solve these existential problems.DHCP Server and DHCP technology to configure network parameters can solute the problems of shortage of IP addresses and mobility of wireless network user, greatly lighten the work of network administrator, reduce mistakes from manual configuration and fast build a large-scale network or modify its parameters. So DHCP technology will be applied more and more largely in network. Now research about DHCP only focuses on configuration of DHCP Server and DHCP protocol and seldom does something deeply. There are holes commonly in network protocols designed, so does DHCP protocol when it was designed, people hardly took account for security. During the procedure of using DHCP Server to configure network addresses and parameters for clients, there are many threats and some can lead the whole network to disorder. So it is meaningful to research DHCP technology and its security.Based on secure threats of DHCP, the paper researches DHCP technology and its security. The contribution in the paper includes:(1) It will introduce DHCP protocol and work principles, the exchange between DHCP Server and Client and the content of Database and configuration file of DHCP Server.(2) It will research the holes of DHCP protocol; analyze DHCP threats in network applying DHCP technology.(3)Aim at the reason of threats, the harmed degree of network and its theory; we can design the solution to eliminate the threats according to the characteristic work of DHCP Serve and practical circs.(4) It wills Research Disaster Recovery of DHCP Server, including its designs.
Keywords/Search Tags:network-security, dynamic host configuration protocol, leak, threats, authentication
PDF Full Text Request
Related items