亚洲免费av电影一区二区三区,日韩爱爱视频,51精品视频一区二区三区,91视频爱爱,日韩欧美在线播放视频,中文字幕少妇AV,亚洲电影中文字幕,久久久久亚洲av成人网址,久久综合视频网站,国产在线不卡免费播放

        ?

        Analysis of the Impact of ICMP Flood Attack in IoT System

        2018-04-26 10:32:48ZhiyongLiuKaiZhengXinHuang
        科學(xué)與財(cái)富 2018年6期
        關(guān)鍵詞:關(guān)鍵

        Zhiyong Liu Kai Zheng Xin Huang

        摘 要:Internet of Things (IoT) is widely used in various fields. It connects diverse devices and enables them to collect and exchange data. However, with the popularity of IoT, more and more attentions have been paid on the security of IoT. In this paper, experimenters use hping3 to launch a Denial of Service (DoS) attack to IoT. The DoS attack is launched by the method of ICMP Flood and the performance of attack is analysed.

        關(guān)鍵詞:Internet of Things (IoT); Denial of Service (DoS) attack; ICMP Flood; Network Security;

        I. INTRODUCTION

        The Internet of Things (IoT) paradigm conceives the ubiquitous interconnection and cooperation of devices in the Internet, which is considered as an applied extension of Internet.

        However, IoT system can be attacked. Among all possible attacks, Denial of Service (DoS) attack is an effective and common form [1, 2]. It is launched by a malignant intruder and aims to exhaust the resource of target [3, 4].

        In this paper, A IoT environment is deployed. A DoS attack in IoT is designed and implemented. The DoS attack is launched by the method of ICMP Flood attack, while the results of experiment are beneficial to analyze the impact of DoS attack on victim.

        II.THE EXPERIMENT PLATFORM

        ·Gateway: It is based on the Raspberry, which connects other devices. The raspberry is pre-installed with the Dstat, which is a monitoring tool in Linux.

        ·PC: The PC is client which connects to wireless LAN. It can exchange data with sensor node through gateway.

        ·Attacker: The attacker is Kali Linux which is a virtual machine on the PC. It can use built-in tools to launch the ICMP Flood ICMP attack.

        ·Sensor node: It is based on Arduino, which can monitor the information of environment.

        III.TESTING

        In this experiment, the size of ICMP packets launched by attacker is variable. We first chose three different sizes which are 250 bytes, 500 bytes and 750 bytes and use ping command to verify if the gateway can operate normally in terms of CPU utility, time of success of attack, packet lose rate.

        We also choose 10 packets in each scenario and compare the respond time in Figure 2, which shows that larger size of packet causes longer response time.

        We then use other extra size of ICMP packets to launch the attack in order to see the change of packet lose rate. The packet size is 1000 bytes, 1250 bytes, 1500 bytes. The results show that the performance of ICMP Flood attack becomes better when the size of packet increases.

        IV.CONCLUSION

        In this paper, experimenters deploy a IoT system as the victim of ICMP Flood attack. The results of experiment show that the increase of size of ICMP packet size can improve the performance of attack, which reflects in CPU utility, time of success of attack and packet lose rate in experiment.

        Acknowledgment

        This work has been supported by the XJTLU research development fund projects RDF140243 and RDF150246, as well as by the Suzhou Science and Technology Development Plan under grant SYG201516, and Jiangsu Province National Science Foundation under grant BK20150376.

        References

        [1]C. Ming et al, "Different Denail of Service Attack Methods for IoT System", 2017.

        [2]K. Zheng et al, "A Denail of Service Attack Method for an IoT System"

        [3]L. Liang et al, "A Denial of Service Attack Method for IoT System in photovoltaic Energy System"

        [4]K. Wang et al, "A Denial of Service Attack Against IoT System", 2017.

        猜你喜歡
        關(guān)鍵
        Semiotics and how it applied in the media text of cosmetic advertisement
        青年生活(2020年4期)2020-03-03 12:21:45
        Research and Analysis on the Integration of Power Communication Technology and Information System
        Application and Research of Power Information Communication Technology in Smart Grid
        A Study on How to Enhancing English Learning through Students Musical Intelligence
        China
        The Impact of Economic Globalization on China
        Model Constructing for Analyzing the Energy Profile Evolution
        An authenticated key agreement protocol with unbalanced computing costs for resource—limited devices in IoT
        Model Checking nRF24L01—based Internet of Things Systems
        Research on Depression through Data Mining
        自拍偷拍一区二区三区四区| 久久亚洲精品成人av| 国产精品video| 日韩人妻无码一区二区三区| 国产一区二区精品在线观看 | 国产老熟女精品一区二区| 久久国产加勒比精品无码| 欧美人和黑人牲交网站上线| 国产无遮挡a片又黄又爽| 女同性恋精品一区二区三区| 国产麻豆极品高清另类| 亚洲美女自拍偷拍视频| 亚洲av无码一区二区三区天堂古代 | 免费a级毛片无码a| 日韩中文字幕不卡网站| 国产黄片一区视频在线观看| 综合亚洲二区三区四区在线| 亚洲av综合av一区| 日本黄页网站免费大全| 青青青草国产熟女大香蕉| 少妇爽到高潮免费视频| 欧洲vat一区二区三区| 久久这里只精品国产99热| 少妇裸淫交视频免费看| 精品一区三区视频在线观看| 国内精品人妻无码久久久影院导航 | 国产精品女同久久久久电影院| 欧美日韩视频无码一区二区三| 丰满熟妇人妻无码区| 国产av天堂一区二区二区| 午夜男女很黄的视频| 欧美高大丰满freesex| 极品美女销魂一区二区三| 男女主共患难日久生情的古言 | 日本一级片一区二区三区| 熟女少妇精品一区二区| 久久青草伊人精品| 亚洲日本精品一区二区三区| 亚洲人成网站色在线入口口| 伊人激情av一区二区三区| 中文字幕少妇AV|