999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

A Denial of Service Attack for IoT System

2018-04-19 10:36:58MingChengYichaoXuKaiZhengXinHuang
科學與財富 2018年3期

Ming Cheng Yichao Xu Kai Zheng Xin Huang

Abstract—Denial of Services (DoS) attack, as the most widely used attack method, attacks victim host by invading a number of other hosts in the Internet of Things (IoT) system. In this paper,ICMP, UDP and NTP attack methods were used to imitate DoS attack. The data produced in this process were analyzedand the result shows ICMP DoS attack with hping3 had the best performance.

Keywords—DoS attack, Internet of Things, Raspberry Pi.

I.INTRODUCTION

As IoT system becomes popular and has a little protective measure, DoSattack becomes the most widely used attack method recently. ICMP NTP and UDP are three different types of protocol, which can be used in it. ICMP attack attacks devices by sending a number of ICMP Echo Reply data packages in high speed. NTP replies flood attack by the vulnerability of NTP servers in the network. It uses short instructions to return huge instructions based on UDP transmission. Since the beginning of DoS attack, UDP attack method has been used. It sends a great deal of UDP small packages to attack DNS server.

Some related work about IoTplatform and DoS attack is introduced in [1-2]. Some previous works about DoS are listed in [3-5]. In this paper,DoS attack will be simulated, data will be analyzed and experiment result will be compared. The contribution of this paper is shown as below:

The data produced in this experiment will be analyzed, such as package loss rate and message transfer time.

Comparison between the data will be given to evaluate the performance of different attack methods.

II.IMPLEMENTATION

A.Preparation

IoT remote reprogramming system represented the communication between a sensor and Raspberry Pi in our experiment. The components weresensor, Raspberry Pi, router, PC and attacker. A continued connection between PC and Raspberry Pi were set up in Linux.These programs could also test message transfer time and loss percent. The connecting condition between PC and Raspberry Pi with no attack was tested and the test result had been analyzed.

B.Attack

Three different DoS attack methods were simulated separately. ICMP attack method was executed by inputting the command “hping3 –i u40 –d 4 –p 6632 --rand-source 192.168.1.101 -1” in terminal of Kali. NTP attack was executed in Scapy by entering the command “send (IP (dst = ‘192.168.1.101) / UDP (dport = 6632) / NTP () / (“Data”), inter = 0.0004, loop=1)”. UDP DoS attack was done by using LOIC in Win 10.

C.Comparison of 3 DoS Attack Methods

The package loss rate and message transfer time varying with package size in a fixedtransmit frequencywere first comparedseparately. Then, package size was set to a proper valueto compare the package loss rate and message transfer time varying with transmitting frequency.

It could be concluded from the data that ICMP attack method had both the longest message transfer time and highest package loss rate among three different DoS attack methods. UDP and NTP attack methods had short message transfer time and low package loss rate overall.

III.CONCLUSION

In this paper, 3 different methods for DoS attack based on IoT system has been introduced and compared. In conclusion, ICMPDoS attack with hping3 had the best performance. UDP DoS attack using LOIC had better performance than NTPDoS attack using Scapy. Furthermore, the larger packages size and higher transmit frequency, longer message transfer time and higher package loss rate, better performance.

References:

[1]N. Xue, X. Huang and J. Zhang. “S2Net: A Security Framework for Software Defined Intelligent Building Networks”. The IEEE International Conference on Trust, Security and Privacy in Computing and Communications. Tianjin, China, 2016.

[2]X. Huang, P. Craig, H. Lin and Z. Yan. “SecIoT: a security framework for the Internet of Things”. Security and Communication Networks, 2015.

[3]Gao, Yuan, H. Wang, and X. Huang. "Applying Docker Swarm Cluster into Software Defined Internet of Things." International Conference on Information Technology in Medicine and Education IEEE, 2017:445-449.

[4]Wang, Haoxuan, et al. "Bluetooth Based Software Defined Function in Internet of Things." The, Conference on Emerging Topics in Interactive Systems 2016.

[5]Czyz, Jakub, et al. "Taming the 800 Pound Gorilla: The Rise and Decline of NTP DDoS Attacks." internet measurement conference(2014): 435-448.

主站蜘蛛池模板: 亚洲欧美综合在线观看| 在线毛片免费| 91在线中文| 91国语视频| 狠狠色综合网| 国产新AV天堂| 国产精品国产主播在线观看| 精品少妇人妻av无码久久| 成人小视频网| 亚洲婷婷丁香| 91无码人妻精品一区二区蜜桃 | 99热最新网址| 亚洲最大福利网站| 日韩在线网址| 一级成人a毛片免费播放| 亚洲三级片在线看| 九九久久精品免费观看| 婷婷丁香色| 一本一道波多野结衣av黑人在线 | 国产美女精品人人做人人爽| 亚洲VA中文字幕| 亚洲天堂免费在线视频| 亚洲天堂自拍| 免费中文字幕在在线不卡| 国产流白浆视频| 色悠久久久| 97国产精品视频自在拍| www.精品国产| 幺女国产一级毛片| 国产精品亚洲片在线va| 九色综合视频网| 免费人成在线观看成人片| 四虎综合网| 欧美亚洲第一页| 中文字幕免费视频| 国产一区成人| 日本亚洲成高清一区二区三区| 欧美成人精品一区二区| 熟女成人国产精品视频| 啪啪啪亚洲无码| 91麻豆国产在线| a毛片免费看| 久久大香香蕉国产免费网站| 精品国产免费观看一区| 91精品国产91久无码网站| 无码电影在线观看| 热re99久久精品国99热| 5555国产在线观看| jizz在线观看| 久草青青在线视频| 国产一区二区三区在线无码| 中文字幕无码制服中字| 天堂成人av| 黄色网页在线播放| 老司机久久精品视频| 又爽又大又光又色的午夜视频| www.91在线播放| 99精品高清在线播放 | 国产清纯在线一区二区WWW| 色婷婷亚洲十月十月色天| 日韩国产精品无码一区二区三区| 国产91熟女高潮一区二区| 久久国产精品国产自线拍| 亚洲侵犯无码网址在线观看| 日本尹人综合香蕉在线观看| 国产精品妖精视频| 老司机精品99在线播放| 欧美日韩亚洲综合在线观看| 亚洲精品欧美日本中文字幕| 特黄日韩免费一区二区三区| 精品久久久久成人码免费动漫 | 五月激情婷婷综合| 亚洲第一中文字幕| 久久人妻系列无码一区| 97国产在线播放| 亚洲精品视频免费| 亚洲午夜综合网| 国产成人a毛片在线| 亚洲中字无码AV电影在线观看| 91丨九色丨首页在线播放| 在线免费无码视频| 亚洲日韩精品伊甸|