999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

A Denial of Service Attack for IoT System

2018-04-19 10:36:58MingChengYichaoXuKaiZhengXinHuang
科學與財富 2018年3期

Ming Cheng Yichao Xu Kai Zheng Xin Huang

Abstract—Denial of Services (DoS) attack, as the most widely used attack method, attacks victim host by invading a number of other hosts in the Internet of Things (IoT) system. In this paper,ICMP, UDP and NTP attack methods were used to imitate DoS attack. The data produced in this process were analyzedand the result shows ICMP DoS attack with hping3 had the best performance.

Keywords—DoS attack, Internet of Things, Raspberry Pi.

I.INTRODUCTION

As IoT system becomes popular and has a little protective measure, DoSattack becomes the most widely used attack method recently. ICMP NTP and UDP are three different types of protocol, which can be used in it. ICMP attack attacks devices by sending a number of ICMP Echo Reply data packages in high speed. NTP replies flood attack by the vulnerability of NTP servers in the network. It uses short instructions to return huge instructions based on UDP transmission. Since the beginning of DoS attack, UDP attack method has been used. It sends a great deal of UDP small packages to attack DNS server.

Some related work about IoTplatform and DoS attack is introduced in [1-2]. Some previous works about DoS are listed in [3-5]. In this paper,DoS attack will be simulated, data will be analyzed and experiment result will be compared. The contribution of this paper is shown as below:

The data produced in this experiment will be analyzed, such as package loss rate and message transfer time.

Comparison between the data will be given to evaluate the performance of different attack methods.

II.IMPLEMENTATION

A.Preparation

IoT remote reprogramming system represented the communication between a sensor and Raspberry Pi in our experiment. The components weresensor, Raspberry Pi, router, PC and attacker. A continued connection between PC and Raspberry Pi were set up in Linux.These programs could also test message transfer time and loss percent. The connecting condition between PC and Raspberry Pi with no attack was tested and the test result had been analyzed.

B.Attack

Three different DoS attack methods were simulated separately. ICMP attack method was executed by inputting the command “hping3 –i u40 –d 4 –p 6632 --rand-source 192.168.1.101 -1” in terminal of Kali. NTP attack was executed in Scapy by entering the command “send (IP (dst = ‘192.168.1.101) / UDP (dport = 6632) / NTP () / (“Data”), inter = 0.0004, loop=1)”. UDP DoS attack was done by using LOIC in Win 10.

C.Comparison of 3 DoS Attack Methods

The package loss rate and message transfer time varying with package size in a fixedtransmit frequencywere first comparedseparately. Then, package size was set to a proper valueto compare the package loss rate and message transfer time varying with transmitting frequency.

It could be concluded from the data that ICMP attack method had both the longest message transfer time and highest package loss rate among three different DoS attack methods. UDP and NTP attack methods had short message transfer time and low package loss rate overall.

III.CONCLUSION

In this paper, 3 different methods for DoS attack based on IoT system has been introduced and compared. In conclusion, ICMPDoS attack with hping3 had the best performance. UDP DoS attack using LOIC had better performance than NTPDoS attack using Scapy. Furthermore, the larger packages size and higher transmit frequency, longer message transfer time and higher package loss rate, better performance.

References:

[1]N. Xue, X. Huang and J. Zhang. “S2Net: A Security Framework for Software Defined Intelligent Building Networks”. The IEEE International Conference on Trust, Security and Privacy in Computing and Communications. Tianjin, China, 2016.

[2]X. Huang, P. Craig, H. Lin and Z. Yan. “SecIoT: a security framework for the Internet of Things”. Security and Communication Networks, 2015.

[3]Gao, Yuan, H. Wang, and X. Huang. "Applying Docker Swarm Cluster into Software Defined Internet of Things." International Conference on Information Technology in Medicine and Education IEEE, 2017:445-449.

[4]Wang, Haoxuan, et al. "Bluetooth Based Software Defined Function in Internet of Things." The, Conference on Emerging Topics in Interactive Systems 2016.

[5]Czyz, Jakub, et al. "Taming the 800 Pound Gorilla: The Rise and Decline of NTP DDoS Attacks." internet measurement conference(2014): 435-448.

主站蜘蛛池模板: 日韩亚洲综合在线| 91精品啪在线观看国产91九色| 综合久久久久久久综合网| 欧美综合中文字幕久久| 免费国产黄线在线观看| 久久免费精品琪琪| 她的性爱视频| 国产精品嫩草影院av| 欧美午夜理伦三级在线观看| 国产香蕉97碰碰视频VA碰碰看| 狠狠干综合| jijzzizz老师出水喷水喷出| 日韩黄色大片免费看| 国产日韩精品欧美一区灰| 国产特级毛片| 激情视频综合网| 日本妇乱子伦视频| 综合亚洲色图| 91在线精品麻豆欧美在线| 日韩av手机在线| 美女国内精品自产拍在线播放| 一级做a爰片久久毛片毛片| 伊大人香蕉久久网欧美| 日本高清有码人妻| 国产精品精品视频| 一级一级一片免费| 91在线国内在线播放老师| 亚洲成aⅴ人片在线影院八| 四虎国产精品永久一区| 久久久久亚洲AV成人人电影软件| 夜夜操天天摸| 欧美a在线| 国产日本一线在线观看免费| 日韩午夜福利在线观看| 国产欧美日韩资源在线观看| av无码久久精品| 高清码无在线看| 国产精品伦视频观看免费| 五月婷婷丁香综合| 在线观看热码亚洲av每日更新| 成人日韩视频| 香蕉eeww99国产在线观看| 成人综合在线观看| 日本三区视频| 人妖无码第一页| 呦视频在线一区二区三区| 中文字幕va| 青青草91视频| 毛片久久久| 成人一区专区在线观看| 亚洲欧洲日产国码无码av喷潮| 亚洲免费毛片| 日韩精品毛片| 亚州AV秘 一区二区三区| 久久亚洲AⅤ无码精品午夜麻豆| 国产精品不卡永久免费| 韩日无码在线不卡| 欧美一级在线看| 国产网站一区二区三区| 午夜a视频| 亚洲啪啪网| 欧美成人第一页| 第一区免费在线观看| 色综合中文字幕| 欧美激情第一区| 亚洲女人在线| 美女被操91视频| 国产日本视频91| 亚洲中文字幕久久精品无码一区| 国产成人一区在线播放| 六月婷婷精品视频在线观看| 国产视频入口| 无码aaa视频| 热re99久久精品国99热| 日本a级免费| 97成人在线视频| 性喷潮久久久久久久久| 成人欧美在线观看| 免费a在线观看播放| 夜夜高潮夜夜爽国产伦精品| 日韩欧美国产三级| 3D动漫精品啪啪一区二区下载|