999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

A Denial of Service Attack Against IoT System

2018-04-26 10:32:48KunWangYuexuanLiDongmingShiQiankunShengXinHuang
科學與財富 2018年6期

Kun Wang Yuexuan Li Dongming Shi Qiankun Sheng Xin Huang

摘 要:Internet of Things is widely accepted and used in the modern days, however, it is not secure for the users because of the cyber-attack. Denial of Service attack can have impact on the data access and information transmission. This paper designed experiments to test the influence of Denial of Service attack on an IoT system.

關鍵詞:Internet of Things (IoT); Denial of Service (DoS) attack; SYN Flooding Attack; TCP Connect Flooding Attack

I. INTRODUCTION

Internet of Things (IoT) was initially mentioned in 1999 [1] and becomes common that there will be 20.8 billions devics on IoT by 2020[2]. As IoT gets pervasive, it is more vulnerable to become the attacking target. Denial of Service (DoS) attack is one of the cyber-attack methods [3]. In a Dos attack, attackers prevent users accessing information or service by utilizing different methods [4].

In this paper, DoS attack will be supported in the wireless sensor network system based on NRF and Wi-Fi communication. The DoS attack will be implemented on the gateway by SYN flooding attack and Transmission Control Protocol (TCP) connect flood.

II.EXPERIMENT PLATFORM

A.Equipment

PC, Router, Raspberry Pi, Gateway (Arduino), Sensor (Arduino): Detect voltage and other data

B.The platform for the DoS attack on gateway

This platform is for the DoS attack which against Arduino Nrf gateway. The Arduino gateway cannot send messages to the Raspberry Pi and the attacker is a Raspberry Pi.

III.DOS ATTACK IMPLEMENTATION

A.SYN Flooding Attack

SYN flooding attack is launched with the assistance of hping3 command on Raspberry Pi. Hping3 provides two kinds of instructions for source IP spoofing which are “--rand-source” and “--spoof”.

1)Spoofed Source IP Address

150 packets were sent from PC to the gateway via the ping method for the purpose of testing the communication between them. The packet loss rates are a downward trend as speed slows down. The same pattern can be seen at the average and maximum response time, whereas the time declines progressively.

2)Random Source IP Address

In this experiment, the attacks with different sizes ranging from 6 to 600000 bytes were launched. 150 packets were sent, and the size of packet sent might be irrelevant to SYN flood attack effects according to the ping results since all packet loss rates fluctuate slightly and the response time varies irregularly.

B.TCP Connect Flooding Attack

This experiment demonstrates the opinion that the bigger rate is, the stronger TCP connect flooding attack is. Additionally, the maximum duration for web page refresh suspension increases. Another view is that TCP connect flooding attack might ultimately lead to continuous gateway network congestion if the attacker persists in attacking the victim in a period of time.

C.Comparsion

150 packets by ping command were sent during each type of attack. Based on the package loss rate and web server condition, it appears that SYN flooding attack has far better effect than TCP Connect flooding attack.

IV.CONCLUSION

This paper applied SYN flooding attack and TCP connect flooding attack. Both methods enable to cause gateway resource exhaustion and data loss and both of these two attacks have significant impact on resource access regarding sending speeds.

ACKNOWLEDGMENT

This work has been supported by the XJTLU research development fund projects RDF140243 and RDF150246, as well as by the Suzhou Science and Technology Development Plan under grant SYG201516, and Jiangsu Province National Science Foundation under grant BK20150376.

REFERENCES

[1]K. Ashton, (2009). That Internet of Things thing. RFID Journal, 22 July. [Internet] Avail- able at: http://www.rfidjournal.com/article/view/4986 [Accessed 18 August 2011]. ?

[2]S. Conn, (2015, Nov.10)"Gartner Says 6.4 Billion Connected "Things" Will Be in Use in 2016, Up 30 Percent From 2015". [Online]. Available: http://www.gartner.com/newsroom/id/3165317

[3]Wikipedia, (2017, Aug.14) Denial-of-service attack [Online]. Available: https://en.wikipedia.org/wiki/Denial-of-service_attack

[4]M. McDowell, (2009, Nov.4) Understanding Denial-of-Service Attacks [Online]. Available: https://www.us-cert.gov/ncas/tips/ST04-015

主站蜘蛛池模板: 色首页AV在线| 日本高清免费不卡视频| 欧美a在线看| 国产人人乐人人爱| 国产另类乱子伦精品免费女| 伊人久久久久久久久久| 国产中文一区a级毛片视频 | 国产成人三级在线观看视频| 伊在人亞洲香蕉精品區| 国产午夜在线观看视频| 四虎精品黑人视频| 国产精品综合色区在线观看| 久久久久亚洲AV成人网站软件| 中文字幕欧美日韩| 国产福利影院在线观看| 中文无码精品a∨在线观看| 亚洲AV成人一区二区三区AV| 一级一毛片a级毛片| 亚洲成人动漫在线观看| 婷五月综合| 国产无人区一区二区三区| 四虎永久在线精品国产免费 | 狠狠色香婷婷久久亚洲精品| 欧洲成人免费视频| 国产精品不卡片视频免费观看| 精品一区二区无码av| 亚洲国产精品日韩av专区| 日本精品视频一区二区 | 2021精品国产自在现线看| 青青青国产免费线在| 丁香六月激情综合| 777午夜精品电影免费看| 亚洲国产欧美国产综合久久 | 自偷自拍三级全三级视频| 国产成人啪视频一区二区三区| 欧美成人aⅴ| 日韩一区二区三免费高清| 国产精品13页| 黄色福利在线| 国产日本欧美亚洲精品视| 国内黄色精品| 欧美亚洲第一页| 亚洲欧美日本国产综合在线 | 亚洲综合色在线| 亚洲Av综合日韩精品久久久| 高清欧美性猛交XXXX黑人猛交| 色婷婷亚洲综合五月| 国产 日韩 欧美 第二页| 毛片手机在线看| 国产91色| 久久99国产综合精品1| 全部免费特黄特色大片视频| 国产va在线| 亚洲精品中文字幕午夜| 欧美日本一区二区三区免费| 拍国产真实乱人偷精品| 黄色网页在线观看| 中文字幕第4页| 亚洲欧州色色免费AV| 亚洲欧美不卡中文字幕| 国产高清在线精品一区二区三区 | 亚洲av无码人妻| 高清无码手机在线观看| 在线观看热码亚洲av每日更新| 国产91精选在线观看| 欧美va亚洲va香蕉在线| 99爱在线| 亚洲色图欧美视频| 免费国产在线精品一区| 国产一级一级毛片永久| 国产福利一区视频| 亚洲美女久久| 国产精品第一区| 久久青青草原亚洲av无码| 欧美激情福利| 伊伊人成亚洲综合人网7777| 国产手机在线ΑⅤ片无码观看| 任我操在线视频| 久久久久亚洲Av片无码观看| 天天躁夜夜躁狠狠躁躁88| 婷婷色狠狠干| 亚洲一区二区三区麻豆|