亚洲免费av电影一区二区三区,日韩爱爱视频,51精品视频一区二区三区,91视频爱爱,日韩欧美在线播放视频,中文字幕少妇AV,亚洲电影中文字幕,久久久久亚洲av成人网址,久久综合视频网站,国产在线不卡免费播放

        ?

        A Denial of Service Attack for IoT System

        2018-04-19 10:36:58MingChengYichaoXuKaiZhengXinHuang
        科學與財富 2018年3期

        Ming Cheng Yichao Xu Kai Zheng Xin Huang

        Abstract—Denial of Services (DoS) attack, as the most widely used attack method, attacks victim host by invading a number of other hosts in the Internet of Things (IoT) system. In this paper,ICMP, UDP and NTP attack methods were used to imitate DoS attack. The data produced in this process were analyzedand the result shows ICMP DoS attack with hping3 had the best performance.

        Keywords—DoS attack, Internet of Things, Raspberry Pi.

        I.INTRODUCTION

        As IoT system becomes popular and has a little protective measure, DoSattack becomes the most widely used attack method recently. ICMP NTP and UDP are three different types of protocol, which can be used in it. ICMP attack attacks devices by sending a number of ICMP Echo Reply data packages in high speed. NTP replies flood attack by the vulnerability of NTP servers in the network. It uses short instructions to return huge instructions based on UDP transmission. Since the beginning of DoS attack, UDP attack method has been used. It sends a great deal of UDP small packages to attack DNS server.

        Some related work about IoTplatform and DoS attack is introduced in [1-2]. Some previous works about DoS are listed in [3-5]. In this paper,DoS attack will be simulated, data will be analyzed and experiment result will be compared. The contribution of this paper is shown as below:

        The data produced in this experiment will be analyzed, such as package loss rate and message transfer time.

        Comparison between the data will be given to evaluate the performance of different attack methods.

        II.IMPLEMENTATION

        A.Preparation

        IoT remote reprogramming system represented the communication between a sensor and Raspberry Pi in our experiment. The components weresensor, Raspberry Pi, router, PC and attacker. A continued connection between PC and Raspberry Pi were set up in Linux.These programs could also test message transfer time and loss percent. The connecting condition between PC and Raspberry Pi with no attack was tested and the test result had been analyzed.

        B.Attack

        Three different DoS attack methods were simulated separately. ICMP attack method was executed by inputting the command “hping3 –i u40 –d 4 –p 6632 --rand-source 192.168.1.101 -1” in terminal of Kali. NTP attack was executed in Scapy by entering the command “send (IP (dst = ‘192.168.1.101) / UDP (dport = 6632) / NTP () / (“Data”), inter = 0.0004, loop=1)”. UDP DoS attack was done by using LOIC in Win 10.

        C.Comparison of 3 DoS Attack Methods

        The package loss rate and message transfer time varying with package size in a fixedtransmit frequencywere first comparedseparately. Then, package size was set to a proper valueto compare the package loss rate and message transfer time varying with transmitting frequency.

        It could be concluded from the data that ICMP attack method had both the longest message transfer time and highest package loss rate among three different DoS attack methods. UDP and NTP attack methods had short message transfer time and low package loss rate overall.

        III.CONCLUSION

        In this paper, 3 different methods for DoS attack based on IoT system has been introduced and compared. In conclusion, ICMPDoS attack with hping3 had the best performance. UDP DoS attack using LOIC had better performance than NTPDoS attack using Scapy. Furthermore, the larger packages size and higher transmit frequency, longer message transfer time and higher package loss rate, better performance.

        References:

        [1]N. Xue, X. Huang and J. Zhang. “S2Net: A Security Framework for Software Defined Intelligent Building Networks”. The IEEE International Conference on Trust, Security and Privacy in Computing and Communications. Tianjin, China, 2016.

        [2]X. Huang, P. Craig, H. Lin and Z. Yan. “SecIoT: a security framework for the Internet of Things”. Security and Communication Networks, 2015.

        [3]Gao, Yuan, H. Wang, and X. Huang. "Applying Docker Swarm Cluster into Software Defined Internet of Things." International Conference on Information Technology in Medicine and Education IEEE, 2017:445-449.

        [4]Wang, Haoxuan, et al. "Bluetooth Based Software Defined Function in Internet of Things." The, Conference on Emerging Topics in Interactive Systems 2016.

        [5]Czyz, Jakub, et al. "Taming the 800 Pound Gorilla: The Rise and Decline of NTP DDoS Attacks." internet measurement conference(2014): 435-448.

        日本最新一区二区三区视频观看| 国产真实乱XXXⅩ视频| 国产成人激情视频在线观看| 一区二区三区四区草逼福利视频 | 亚洲一区日韩无码| 91久久精品一二三区蜜桃| 亚洲av三级黄色在线观看| 乱子伦一区二区三区| 中文乱码人妻系列一区二区| 亚洲AⅤ乱码一区二区三区| 高清不卡日本v二区在线| 国产精品成人网站| 全免费a级毛片免费看视频| 日本精品一区二区在线看| 一区二区三区国产内射| s级爆乳玩具酱国产vip皮裤| 日本成人久久| av在线网站一区二区| 淫妇日韩中文字幕在线| 一区二区三区四区亚洲免费| 麻豆av一区二区三区| 成人在线激情网| 中文字幕一区二区va| 成人日韩精品人妻久久一区| 亚洲国产精品久久久久婷婷老年 | 中文字幕久久久久久精| 中文字幕亚洲精品综合| 在线观看人成视频免费| 精品久久亚洲中文无码| 亚洲美女国产精品久久久久久久久| 水蜜桃男女视频在线观看网站| 亚洲妇女自偷自偷图片 | 亚洲熟妇av日韩熟妇av| 久草手机视频在线观看| 欧美成人片在线观看| 亚洲动漫成人一区二区| 国产一区二区白浆在线观看| 男人女人做爽爽18禁网站| 在线观看av中文字幕不卡| 精品人妻夜夜爽一区二区| 亚洲精品无码不卡在线播he|