999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

A Denial of Service Attack Against IoT System

2018-04-26 10:32:48KunWangYuexuanLiDongmingShiQiankunShengXinHuang
科學與財富 2018年6期

Kun Wang Yuexuan Li Dongming Shi Qiankun Sheng Xin Huang

摘 要:Internet of Things is widely accepted and used in the modern days, however, it is not secure for the users because of the cyber-attack. Denial of Service attack can have impact on the data access and information transmission. This paper designed experiments to test the influence of Denial of Service attack on an IoT system.

關鍵詞:Internet of Things (IoT); Denial of Service (DoS) attack; SYN Flooding Attack; TCP Connect Flooding Attack

I. INTRODUCTION

Internet of Things (IoT) was initially mentioned in 1999 [1] and becomes common that there will be 20.8 billions devics on IoT by 2020[2]. As IoT gets pervasive, it is more vulnerable to become the attacking target. Denial of Service (DoS) attack is one of the cyber-attack methods [3]. In a Dos attack, attackers prevent users accessing information or service by utilizing different methods [4].

In this paper, DoS attack will be supported in the wireless sensor network system based on NRF and Wi-Fi communication. The DoS attack will be implemented on the gateway by SYN flooding attack and Transmission Control Protocol (TCP) connect flood.

II.EXPERIMENT PLATFORM

A.Equipment

PC, Router, Raspberry Pi, Gateway (Arduino), Sensor (Arduino): Detect voltage and other data

B.The platform for the DoS attack on gateway

This platform is for the DoS attack which against Arduino Nrf gateway. The Arduino gateway cannot send messages to the Raspberry Pi and the attacker is a Raspberry Pi.

III.DOS ATTACK IMPLEMENTATION

A.SYN Flooding Attack

SYN flooding attack is launched with the assistance of hping3 command on Raspberry Pi. Hping3 provides two kinds of instructions for source IP spoofing which are “--rand-source” and “--spoof”.

1)Spoofed Source IP Address

150 packets were sent from PC to the gateway via the ping method for the purpose of testing the communication between them. The packet loss rates are a downward trend as speed slows down. The same pattern can be seen at the average and maximum response time, whereas the time declines progressively.

2)Random Source IP Address

In this experiment, the attacks with different sizes ranging from 6 to 600000 bytes were launched. 150 packets were sent, and the size of packet sent might be irrelevant to SYN flood attack effects according to the ping results since all packet loss rates fluctuate slightly and the response time varies irregularly.

B.TCP Connect Flooding Attack

This experiment demonstrates the opinion that the bigger rate is, the stronger TCP connect flooding attack is. Additionally, the maximum duration for web page refresh suspension increases. Another view is that TCP connect flooding attack might ultimately lead to continuous gateway network congestion if the attacker persists in attacking the victim in a period of time.

C.Comparsion

150 packets by ping command were sent during each type of attack. Based on the package loss rate and web server condition, it appears that SYN flooding attack has far better effect than TCP Connect flooding attack.

IV.CONCLUSION

This paper applied SYN flooding attack and TCP connect flooding attack. Both methods enable to cause gateway resource exhaustion and data loss and both of these two attacks have significant impact on resource access regarding sending speeds.

ACKNOWLEDGMENT

This work has been supported by the XJTLU research development fund projects RDF140243 and RDF150246, as well as by the Suzhou Science and Technology Development Plan under grant SYG201516, and Jiangsu Province National Science Foundation under grant BK20150376.

REFERENCES

[1]K. Ashton, (2009). That Internet of Things thing. RFID Journal, 22 July. [Internet] Avail- able at: http://www.rfidjournal.com/article/view/4986 [Accessed 18 August 2011]. ?

[2]S. Conn, (2015, Nov.10)"Gartner Says 6.4 Billion Connected "Things" Will Be in Use in 2016, Up 30 Percent From 2015". [Online]. Available: http://www.gartner.com/newsroom/id/3165317

[3]Wikipedia, (2017, Aug.14) Denial-of-service attack [Online]. Available: https://en.wikipedia.org/wiki/Denial-of-service_attack

[4]M. McDowell, (2009, Nov.4) Understanding Denial-of-Service Attacks [Online]. Available: https://www.us-cert.gov/ncas/tips/ST04-015

主站蜘蛛池模板: 欧美日韩精品一区二区在线线| 亚洲视频在线观看免费视频| 国产欧美网站| 亚洲无码高清一区二区| 精品成人免费自拍视频| 性色生活片在线观看| 国产浮力第一页永久地址 | 国产永久在线观看| 日韩色图在线观看| 亚洲综合天堂网| 亚洲人精品亚洲人成在线| 免费 国产 无码久久久| 成年女人a毛片免费视频| 精品视频一区二区观看| 国产女人18毛片水真多1| 日韩国产一区二区三区无码| 五月婷婷综合色| 又爽又黄又无遮挡网站| 无码高潮喷水专区久久| 在线播放国产99re| 成年人久久黄色网站| 国产精品太粉嫩高中在线观看| 久久黄色免费电影| 精品91在线| 在线看免费无码av天堂的| 亚洲中文字幕23页在线| 99热亚洲精品6码| 亚洲无码免费黄色网址| 国产精品亚洲天堂| a级毛片毛片免费观看久潮| 99视频免费观看| 欧美亚洲第一页| 青青青国产在线播放| 亚洲三级影院| 九色免费视频| 欧美成人午夜视频| 日韩毛片基地| 亚洲人免费视频| 国产在线精彩视频论坛| 中文字幕无线码一区| 天堂成人在线视频| 日本午夜三级| 成年人免费国产视频| 色综合a怡红院怡红院首页| 国产高清在线精品一区二区三区| 欧美在线中文字幕| 一级全免费视频播放| 91久久精品国产| 日韩国产一区二区三区无码| 成人福利在线视频| 在线综合亚洲欧美网站| 手机在线免费不卡一区二| 亚洲日韩精品综合在线一区二区 | 国产99精品视频| 99re在线免费视频| 国产农村精品一级毛片视频| 香蕉伊思人视频| 亚洲色图综合在线| 欧美高清国产| 亚洲人成日本在线观看| 二级特黄绝大片免费视频大片| 无码人妻免费| 国产成人91精品免费网址在线| 国产成人一级| 精品人妻一区无码视频| 亚洲欧美日韩中文字幕在线一区| 精品国产亚洲人成在线| 亚洲精品午夜天堂网页| 伊人丁香五月天久久综合| 狼友视频国产精品首页| 天堂av高清一区二区三区| 国产精品高清国产三级囯产AV| 婷婷色一区二区三区| 国产精品无码AV中文| 91久久偷偷做嫩草影院电| 日本不卡在线视频| 中文字幕免费在线视频| 一级毛片免费观看久| 老汉色老汉首页a亚洲| 亚洲色图欧美| 亚洲免费黄色网| 日本a级免费|