999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

A Denial of Service Attack Against IoT System

2018-04-26 10:32:48KunWangYuexuanLiDongmingShiQiankunShengXinHuang
科學與財富 2018年6期

Kun Wang Yuexuan Li Dongming Shi Qiankun Sheng Xin Huang

摘 要:Internet of Things is widely accepted and used in the modern days, however, it is not secure for the users because of the cyber-attack. Denial of Service attack can have impact on the data access and information transmission. This paper designed experiments to test the influence of Denial of Service attack on an IoT system.

關鍵詞:Internet of Things (IoT); Denial of Service (DoS) attack; SYN Flooding Attack; TCP Connect Flooding Attack

I. INTRODUCTION

Internet of Things (IoT) was initially mentioned in 1999 [1] and becomes common that there will be 20.8 billions devics on IoT by 2020[2]. As IoT gets pervasive, it is more vulnerable to become the attacking target. Denial of Service (DoS) attack is one of the cyber-attack methods [3]. In a Dos attack, attackers prevent users accessing information or service by utilizing different methods [4].

In this paper, DoS attack will be supported in the wireless sensor network system based on NRF and Wi-Fi communication. The DoS attack will be implemented on the gateway by SYN flooding attack and Transmission Control Protocol (TCP) connect flood.

II.EXPERIMENT PLATFORM

A.Equipment

PC, Router, Raspberry Pi, Gateway (Arduino), Sensor (Arduino): Detect voltage and other data

B.The platform for the DoS attack on gateway

This platform is for the DoS attack which against Arduino Nrf gateway. The Arduino gateway cannot send messages to the Raspberry Pi and the attacker is a Raspberry Pi.

III.DOS ATTACK IMPLEMENTATION

A.SYN Flooding Attack

SYN flooding attack is launched with the assistance of hping3 command on Raspberry Pi. Hping3 provides two kinds of instructions for source IP spoofing which are “--rand-source” and “--spoof”.

1)Spoofed Source IP Address

150 packets were sent from PC to the gateway via the ping method for the purpose of testing the communication between them. The packet loss rates are a downward trend as speed slows down. The same pattern can be seen at the average and maximum response time, whereas the time declines progressively.

2)Random Source IP Address

In this experiment, the attacks with different sizes ranging from 6 to 600000 bytes were launched. 150 packets were sent, and the size of packet sent might be irrelevant to SYN flood attack effects according to the ping results since all packet loss rates fluctuate slightly and the response time varies irregularly.

B.TCP Connect Flooding Attack

This experiment demonstrates the opinion that the bigger rate is, the stronger TCP connect flooding attack is. Additionally, the maximum duration for web page refresh suspension increases. Another view is that TCP connect flooding attack might ultimately lead to continuous gateway network congestion if the attacker persists in attacking the victim in a period of time.

C.Comparsion

150 packets by ping command were sent during each type of attack. Based on the package loss rate and web server condition, it appears that SYN flooding attack has far better effect than TCP Connect flooding attack.

IV.CONCLUSION

This paper applied SYN flooding attack and TCP connect flooding attack. Both methods enable to cause gateway resource exhaustion and data loss and both of these two attacks have significant impact on resource access regarding sending speeds.

ACKNOWLEDGMENT

This work has been supported by the XJTLU research development fund projects RDF140243 and RDF150246, as well as by the Suzhou Science and Technology Development Plan under grant SYG201516, and Jiangsu Province National Science Foundation under grant BK20150376.

REFERENCES

[1]K. Ashton, (2009). That Internet of Things thing. RFID Journal, 22 July. [Internet] Avail- able at: http://www.rfidjournal.com/article/view/4986 [Accessed 18 August 2011]. ?

[2]S. Conn, (2015, Nov.10)"Gartner Says 6.4 Billion Connected "Things" Will Be in Use in 2016, Up 30 Percent From 2015". [Online]. Available: http://www.gartner.com/newsroom/id/3165317

[3]Wikipedia, (2017, Aug.14) Denial-of-service attack [Online]. Available: https://en.wikipedia.org/wiki/Denial-of-service_attack

[4]M. McDowell, (2009, Nov.4) Understanding Denial-of-Service Attacks [Online]. Available: https://www.us-cert.gov/ncas/tips/ST04-015

主站蜘蛛池模板: 好久久免费视频高清| 色偷偷一区| 99九九成人免费视频精品| 国产精品视频系列专区| 欧美一级高清视频在线播放| 色婷婷啪啪| 99青青青精品视频在线| 五月婷婷激情四射| 国产精品视频系列专区| 欧美日韩第三页| 国产成人一区在线播放| 国产欧美自拍视频| 欧洲成人在线观看| 97精品久久久大香线焦| 狠狠色成人综合首页| 国产h视频免费观看| 中文字幕中文字字幕码一二区| 欧美日韩精品在线播放| 欧美福利在线| 在线观看精品国产入口| 有专无码视频| 中文精品久久久久国产网址| 人妻免费无码不卡视频| 国产午夜不卡| 人妻无码一区二区视频| 四虎影视库国产精品一区| 国产一区二区福利| 国产毛片不卡| 亚洲欧美日韩久久精品| 亚洲无码高清视频在线观看| 在线看国产精品| 好久久免费视频高清| 97国产在线观看| 99精品在线看| 国产精品丝袜在线| 国产91麻豆免费观看| 国产毛片网站| 91精品啪在线观看国产91九色| 不卡的在线视频免费观看| 99热线精品大全在线观看| 青青草国产精品久久久久| 亚洲va视频| 国产精品99久久久久久董美香| 波多野结衣一区二区三区四区视频 | 伊人久综合| 亚洲av色吊丝无码| 久久国语对白| 亚洲av色吊丝无码| 日本免费高清一区| 老司机久久99久久精品播放| 久久精品最新免费国产成人| 91美女视频在线| 色综合激情网| 五月天久久婷婷| 狠狠v日韩v欧美v| 久久久国产精品无码专区| 国产91透明丝袜美腿在线| 99精品视频在线观看免费播放| 亚洲嫩模喷白浆| 国产一区成人| 久久综合婷婷| 视频一区亚洲| 午夜一级做a爰片久久毛片| 国产精品冒白浆免费视频| 国产精品99久久久| 国产精品污视频| 99偷拍视频精品一区二区| 99人体免费视频| 日本少妇又色又爽又高潮| 免费看a级毛片| 国产精品久久久久久久久kt| www.av男人.com| 色精品视频| 99久久精品免费看国产免费软件| 久久久无码人妻精品无码| 国产成人1024精品| 国产精品尹人在线观看| 99精品伊人久久久大香线蕉| 在线观看国产精美视频| 亚洲狼网站狼狼鲁亚洲下载| 国产大片喷水在线在线视频| 国产一区二区精品福利|