999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

A Denial of Service Attack Against IoT System

2018-04-26 10:32:48KunWangYuexuanLiDongmingShiQiankunShengXinHuang
科學與財富 2018年6期

Kun Wang Yuexuan Li Dongming Shi Qiankun Sheng Xin Huang

摘 要:Internet of Things is widely accepted and used in the modern days, however, it is not secure for the users because of the cyber-attack. Denial of Service attack can have impact on the data access and information transmission. This paper designed experiments to test the influence of Denial of Service attack on an IoT system.

關鍵詞:Internet of Things (IoT); Denial of Service (DoS) attack; SYN Flooding Attack; TCP Connect Flooding Attack

I. INTRODUCTION

Internet of Things (IoT) was initially mentioned in 1999 [1] and becomes common that there will be 20.8 billions devics on IoT by 2020[2]. As IoT gets pervasive, it is more vulnerable to become the attacking target. Denial of Service (DoS) attack is one of the cyber-attack methods [3]. In a Dos attack, attackers prevent users accessing information or service by utilizing different methods [4].

In this paper, DoS attack will be supported in the wireless sensor network system based on NRF and Wi-Fi communication. The DoS attack will be implemented on the gateway by SYN flooding attack and Transmission Control Protocol (TCP) connect flood.

II.EXPERIMENT PLATFORM

A.Equipment

PC, Router, Raspberry Pi, Gateway (Arduino), Sensor (Arduino): Detect voltage and other data

B.The platform for the DoS attack on gateway

This platform is for the DoS attack which against Arduino Nrf gateway. The Arduino gateway cannot send messages to the Raspberry Pi and the attacker is a Raspberry Pi.

III.DOS ATTACK IMPLEMENTATION

A.SYN Flooding Attack

SYN flooding attack is launched with the assistance of hping3 command on Raspberry Pi. Hping3 provides two kinds of instructions for source IP spoofing which are “--rand-source” and “--spoof”.

1)Spoofed Source IP Address

150 packets were sent from PC to the gateway via the ping method for the purpose of testing the communication between them. The packet loss rates are a downward trend as speed slows down. The same pattern can be seen at the average and maximum response time, whereas the time declines progressively.

2)Random Source IP Address

In this experiment, the attacks with different sizes ranging from 6 to 600000 bytes were launched. 150 packets were sent, and the size of packet sent might be irrelevant to SYN flood attack effects according to the ping results since all packet loss rates fluctuate slightly and the response time varies irregularly.

B.TCP Connect Flooding Attack

This experiment demonstrates the opinion that the bigger rate is, the stronger TCP connect flooding attack is. Additionally, the maximum duration for web page refresh suspension increases. Another view is that TCP connect flooding attack might ultimately lead to continuous gateway network congestion if the attacker persists in attacking the victim in a period of time.

C.Comparsion

150 packets by ping command were sent during each type of attack. Based on the package loss rate and web server condition, it appears that SYN flooding attack has far better effect than TCP Connect flooding attack.

IV.CONCLUSION

This paper applied SYN flooding attack and TCP connect flooding attack. Both methods enable to cause gateway resource exhaustion and data loss and both of these two attacks have significant impact on resource access regarding sending speeds.

ACKNOWLEDGMENT

This work has been supported by the XJTLU research development fund projects RDF140243 and RDF150246, as well as by the Suzhou Science and Technology Development Plan under grant SYG201516, and Jiangsu Province National Science Foundation under grant BK20150376.

REFERENCES

[1]K. Ashton, (2009). That Internet of Things thing. RFID Journal, 22 July. [Internet] Avail- able at: http://www.rfidjournal.com/article/view/4986 [Accessed 18 August 2011]. ?

[2]S. Conn, (2015, Nov.10)"Gartner Says 6.4 Billion Connected "Things" Will Be in Use in 2016, Up 30 Percent From 2015". [Online]. Available: http://www.gartner.com/newsroom/id/3165317

[3]Wikipedia, (2017, Aug.14) Denial-of-service attack [Online]. Available: https://en.wikipedia.org/wiki/Denial-of-service_attack

[4]M. McDowell, (2009, Nov.4) Understanding Denial-of-Service Attacks [Online]. Available: https://www.us-cert.gov/ncas/tips/ST04-015

主站蜘蛛池模板: 蜜桃视频一区二区| 亚洲综合久久一本伊一区| 色噜噜在线观看| 日本欧美在线观看| 国产91高清视频| 久久久久久久蜜桃| 国产色爱av资源综合区| 国产超薄肉色丝袜网站| 亚洲欧美成人在线视频| 亚洲福利一区二区三区| 亚洲最猛黑人xxxx黑人猛交| 亚洲丝袜中文字幕| 亚洲第一成年人网站| 国产激情无码一区二区三区免费| 尤物在线观看乱码| 国产av色站网站| 色欲国产一区二区日韩欧美| 综合色亚洲| 久久香蕉国产线看观看精品蕉| 久久久久人妻一区精品色奶水| 亚洲综合二区| 91成人免费观看在线观看| 久久黄色免费电影| 亚洲欧美日本国产综合在线| 国产精品尤物在线| 精品无码一区二区三区电影| 黄色国产在线| 国产经典在线观看一区| 欧美亚洲一二三区| 亚洲综合日韩精品| 亚洲欧美日韩综合二区三区| 久久综合结合久久狠狠狠97色| 日本亚洲国产一区二区三区| 孕妇高潮太爽了在线观看免费| 国产高清在线观看91精品| 国产91色| 黄色成年视频| 区国产精品搜索视频| 青草视频免费在线观看| 免费在线视频a| 欧美在线视频不卡| 日韩无码视频播放| 韩日午夜在线资源一区二区| 91在线中文| 亚洲va视频| 日韩人妻无码制服丝袜视频| 国产女同自拍视频| 99热国产这里只有精品9九| 九九热精品在线视频| 精品91自产拍在线| 亚洲综合婷婷激情| 亚洲综合国产一区二区三区| 欧美激情福利| 午夜国产精品视频| 一级毛片基地| 亚洲欧美一区二区三区图片 | 在线国产你懂的| 中国黄色一级视频| 亚洲女同欧美在线| 免费看美女毛片| 亚洲天堂.com| 亚洲精品波多野结衣| 色综合狠狠操| 久久精品国产亚洲AV忘忧草18| 99精品热视频这里只有精品7| 国产精品一区不卡| 免费一级大毛片a一观看不卡| 欧美日韩第三页| 国产在线视频欧美亚综合| 五月婷婷综合色| 亚洲αv毛片| 三上悠亚精品二区在线观看| 国产青青操| 日韩在线中文| 精品午夜国产福利观看| 2020精品极品国产色在线观看 | 欧美亚洲第一页| 精品一区二区三区波多野结衣| 日韩在线1| 欧美日韩一区二区三区四区在线观看| 综合社区亚洲熟妇p| 亚洲日本韩在线观看|