{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T20:15:49Z","timestamp":1767212149885},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,11,18]],"date-time":"2017-11-18T00:00:00Z","timestamp":1510963200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1007\/s11416-017-0310-x","type":"journal-article","created":{"date-parts":[[2017,11,18]],"date-time":"2017-11-18T05:59:22Z","timestamp":1510984762000},"page":"233-244","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Detecting stealth DHCP starvation attack using machine learning approach"],"prefix":"10.1007","volume":"14","author":[{"given":"Nikhil","family":"Tripathi","sequence":"first","affiliation":[]},{"given":"Neminath","family":"Hubballi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,18]]},"reference":[{"key":"310_CR1","unstructured":"Dynamic ARP Inspection. http:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/switches\/lan\/catalyst6500\/ios\/12-2SX\/configuration\/guide\/book\/dynarp.html . Accessed 23 Sept 2017"},{"key":"310_CR2","doi-asserted-by":"crossref","unstructured":"Droms, R.: RFC2131: Dynamic Host Configuration Protocol. Internet Engineering Task Force (1997)","DOI":"10.17487\/rfc2131"},{"key":"310_CR3","doi-asserted-by":"crossref","unstructured":"Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C., Carney, M.: RFC3315: Dynamic Host Configuration Protocol for IPv6 (DHCPv6). Internet Engineering Task Force (2003)","DOI":"10.17487\/rfc3315"},{"key":"310_CR4","unstructured":"Gobbler. http:\/\/gobbler.sourceforge.net\/ . Accessed 23 Sept 2017"},{"key":"310_CR5","unstructured":"DHCPIG. https:\/\/github.com\/kamorin\/DHCPig . Accessed 23 Sept 2017"},{"key":"310_CR6","doi-asserted-by":"crossref","unstructured":"Tripathi, N., Hubballi, N.: Exploiting DHCP server-side IP address conflict detection: A DHCP starvation attack. In: International Conference on Advanced Networks and Telecommunication Systems (ANTS), pp. 1\u20133 (2015)","DOI":"10.1109\/ANTS.2015.7413661"},{"key":"310_CR7","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1016\/j.cose.2016.11.004","volume":"65","author":"AA Aburomman","year":"2017","unstructured":"Aburomman, A.A., Reaz, M.B.I.: A survey of intrusion detection systems based on ensemble and hybrid classifiers. Comput. Secur. 65, 135\u2013152 (2017)","journal-title":"Comput. Secur."},{"key":"310_CR8","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1016\/j.eswa.2016.09.041","volume":"67","author":"WL Al-Yaseen","year":"2017","unstructured":"Al-Yaseen, W.L., Othman, Z.A., Nazri, Z.A.: Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system. Expert Syst. Appl. 67, 296\u2013303 (2017)","journal-title":"Expert Syst. Appl."},{"key":"310_CR9","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1016\/j.eswa.2016.10.026","volume":"69","author":"L Liu","year":"2017","unstructured":"Liu, L., Zuo, W.L., Peng, T.: Detecting outlier pairs in complex network based on link structure and semantic relationship. Expert Syst. Appl. 69, 40\u201349 (2017)","journal-title":"Expert Syst. Appl."},{"key":"310_CR10","unstructured":"DHCP Snooping. http:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/switches\/lan\/catalyst6500\/ios\/12-2SX\/configuration\/guide\/book\/snoodhcp.html . Accessed 23 Sept 2017"},{"key":"310_CR11","doi-asserted-by":"crossref","unstructured":"Xing, X., Shakshuki, E., Benoit, D., Sheltami, T.: Security analysis and authentication improvement for IEEE 802.11i specification. In: Global Telecommunications Conference (GLOBECOM), pp. 1\u20135 (2008)","DOI":"10.1109\/GLOCOM.2008.ECP.365"},{"key":"310_CR12","unstructured":"JNetPcap. http:\/\/jnetpcap.com\/docs\/javadocs\/jnetpcap-1.4\/index.html . Accessed 23 Sept 2017"},{"key":"310_CR13","unstructured":"Scapy. http:\/\/www.secdev.org\/projects\/scapy\/ . Accessed 23 Sept 2017"},{"issue":"2","key":"310_CR14","first-page":"107","volume":"8","author":"B Issac","year":"2009","unstructured":"Issac, B.: Secure ARP and secure DHCP protocols to mitigate security attacks. Int. J. Netw. Secur. 8(2), 107\u2013118 (2009)","journal-title":"Int. J. Netw. Secur."},{"key":"310_CR15","doi-asserted-by":"crossref","unstructured":"Droms, R., Arbaugh, W.: RFC3118: Authentication for DHCP Messages. Internet Engineering Task Force (2001)","DOI":"10.17487\/rfc3118"},{"key":"310_CR16","doi-asserted-by":"crossref","unstructured":"Jerschow, Y. I., Lochert, C., Scheuermann, B., Mauve, M.: CLL: A cryptographic link layer for local area networks. In: International Conference on Security and Cryptography for Networks (SCN), pp. 21\u201338 (2008)","DOI":"10.1007\/978-3-540-85855-3_3"},{"key":"310_CR17","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1016\/j.cose.2016.10.002","volume":"65","author":"N Hubballi","year":"2017","unstructured":"Hubballi, N., Tripathi, N.: A closer look into DHCP starvation attack in wireless networks. Comput. Secur. 65, 387\u2013404 (2017)","journal-title":"Comput. Secur."},{"key":"310_CR18","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198538493.001.0001","volume-title":"Neural Networks for Pattern Recognition","author":"CM Bishop","year":"1995","unstructured":"Bishop, C.M.: Neural Networks for Pattern Recognition. Oxford University Press, Inc., Oxford (1995)"},{"issue":"4","key":"310_CR19","doi-asserted-by":"crossref","first-page":"462","DOI":"10.1109\/TAC.1974.1100577","volume":"19","author":"Y Chien","year":"1974","unstructured":"Chien, Y.: Pattern classification and scene analysis. IEEE Trans. Autom. Control 19(4), 462\u2013463 (1974)","journal-title":"IEEE Trans. Autom. Control"},{"issue":"2\u20133","key":"310_CR20","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1023\/A:1007465528199","volume":"29","author":"N Friedman","year":"1997","unstructured":"Friedman, N., Geiger, D., Goldszmidt, M.: Bayesian network classifiers. Mach. Learn. 29(2\u20133), 131\u2013163 (1997)","journal-title":"Mach. Learn."},{"key":"310_CR21","unstructured":"Martinus, D., Tax, J.: One-Class Classification: Concept-Learning in the Absence of Counterexamples. Ph.D. Thesis, Delft University of Technology (2001)"},{"key":"310_CR22","doi-asserted-by":"crossref","unstructured":"Demerjian, J., Serhrouchni, A.: DHCP authentication using certificates. In: Security and Protection in Information Processing Systems, pp. 456\u2013472. Springer (2004)","DOI":"10.1007\/1-4020-8143-X_30"},{"key":"310_CR23","unstructured":"OConnor, T.: Detecting and responding to data link layer attacks. http:\/\/www.sans.org\/reading-room\/whitepapers\/intrusion\/detecting-responding-data-link-layer-attacks-33513 . Accessed 23 Sept 2017"},{"key":"310_CR24","unstructured":"de Graaf, K., Liddy, J., Raison, P., Scano, J., Wadhwa, S.: Dynamic Host Configuration Protocol (DHCP) Authentication using Challenge Handshake Authentication Protocol (CHAP) Challenge. US Patent 8,555,347 (2013)"},{"key":"310_CR25","unstructured":"Port Security. http:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/switches\/lan\/catalyst6500\/ios\/12-2SX\/configuration\/guide\/book\/port_sec.html . Accessed 23 Sept 2017"},{"key":"310_CR26","doi-asserted-by":"crossref","unstructured":"Patrick, M.: RFC3046: DHCP Relay Agent Information Option. Internet Engineering Task Force (2001)","DOI":"10.17487\/rfc3046"},{"issue":"5","key":"310_CR27","doi-asserted-by":"crossref","first-page":"1115","DOI":"10.1016\/j.compeleceng.2012.06.005","volume":"38","author":"H Mukhtar","year":"2012","unstructured":"Mukhtar, H., Salah, K., Iraqi, Y.: Mitigation of DHCP starvation attack. Comput. Electr. Eng. 38(5), 1115\u20131128 (2012)","journal-title":"Comput. Electr. Eng."},{"key":"310_CR28","doi-asserted-by":"crossref","unstructured":"Tax, D.M.J., Muller, K.R.: A consistency-based model selection for one-class classification. In: International Conference on Pattern Recognition (ICPR), pp. 363\u2013366 (2004)","DOI":"10.1109\/ICPR.2004.1334542"},{"key":"310_CR29","unstructured":"Tax, D.M.J.: DDtools, the Data Description Toolbox for Matlab, version 2.1.2 (2015)"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-017-0310-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-017-0310-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-017-0310-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T19:34:05Z","timestamp":1719603245000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-017-0310-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,18]]},"references-count":29,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["310"],"URL":"https:\/\/doi.org\/10.1007\/s11416-017-0310-x","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,11,18]]}}}