IAD Index of Academic Documents
  • Home Page
  • About
    • About Izmir Academy Association
    • About IAD Index
    • IAD Team
    • IAD Logos and Links
    • Policies
    • Contact
  • Submit A Journal
  • Submit A Conference
  • Submit Paper/Book
    • Submit a Preprint
    • Submit a Book
  • Contact
  • Uluslararası Yönetim Bilişim Sistemleri ve Bilgisayar Bilimleri Dergisi
  • Cilt: 9 Sayı: 2
  • Improving Switch Security Against MITM Attacks Using DHCP Snooping and Port Security

Improving Switch Security Against MITM Attacks Using DHCP Snooping and Port Security

Authors : Bashar Alhajahmad
Pages : 157-174
Doi:10.33461/uybisbbd.1766477
View : 38 | Download : 113
Publication Date : 2025-12-31
Article Type : Research Paper
Abstract :This study investigates security vulnerabilities in the Dynamic Host Configuration Protocol (DHCP), focusing on the limitations of DHCP Snooping when attackers exploit trusted ports. We propose an enhanced detection and prevention mechanism that integrates DHCP Snooping with Port Security to counter DHCP spoofing attacks. Unlike approaches based on Software-Defined Networking (SDN) or machine learning which require advanced infrastructure our method is lightweight, cost-effective, and deployable on conventional Layer 2 switches commonly used in enterprise and educational networks. DHCP Snooping was configured to classify switch ports as trusted or untrusted, while Port Security restricted access through MAC address verification. This integration effectively mitigated DHCP spoofing attempts, including those launched through trusted ports, where traditional DHCP Snooping alone is insufficient. Simulation results show that combining DHCP Snooping with Port Security significantly strengthens network security by enforcing MAC-based authentication at the switch port level. The method ensures that only legitimate DHCP servers can respond to client requests, prevents the exploitation of trusted ports, and maintains network performance without introducing instability. The findings demonstrate the practicality and effectiveness of the proposed approach in enhancing network integrity without additional hardware or complex detection systems.
Keywords : MITM, DHCP Snooping, Port Güvenliği, DHCP Spoofing, Ağ Güvenliği

ORIGINAL ARTICLE URL

* There may have been changes in the journal, article,conference, book, preprint etc. informations. Therefore, it would be appropriate to follow the information on the official page of the source. The information here is shared for informational purposes. IAD is not responsible for incorrect or missing information.


Index of Academic Documents
İzmir Academy Association
CopyRight © 2023-2026