亚洲免费av电影一区二区三区,日韩爱爱视频,51精品视频一区二区三区,91视频爱爱,日韩欧美在线播放视频,中文字幕少妇AV,亚洲电影中文字幕,久久久久亚洲av成人网址,久久综合视频网站,国产在线不卡免费播放

        ?

        Analysis of the Impact of ICMP Flood Attack in IoT System

        2018-04-26 10:32:48ZhiyongLiuKaiZhengXinHuang
        科學(xué)與財富 2018年6期
        關(guān)鍵詞:關(guān)鍵

        Zhiyong Liu Kai Zheng Xin Huang

        摘 要:Internet of Things (IoT) is widely used in various fields. It connects diverse devices and enables them to collect and exchange data. However, with the popularity of IoT, more and more attentions have been paid on the security of IoT. In this paper, experimenters use hping3 to launch a Denial of Service (DoS) attack to IoT. The DoS attack is launched by the method of ICMP Flood and the performance of attack is analysed.

        關(guān)鍵詞:Internet of Things (IoT); Denial of Service (DoS) attack; ICMP Flood; Network Security;

        I. INTRODUCTION

        The Internet of Things (IoT) paradigm conceives the ubiquitous interconnection and cooperation of devices in the Internet, which is considered as an applied extension of Internet.

        However, IoT system can be attacked. Among all possible attacks, Denial of Service (DoS) attack is an effective and common form [1, 2]. It is launched by a malignant intruder and aims to exhaust the resource of target [3, 4].

        In this paper, A IoT environment is deployed. A DoS attack in IoT is designed and implemented. The DoS attack is launched by the method of ICMP Flood attack, while the results of experiment are beneficial to analyze the impact of DoS attack on victim.

        II.THE EXPERIMENT PLATFORM

        ·Gateway: It is based on the Raspberry, which connects other devices. The raspberry is pre-installed with the Dstat, which is a monitoring tool in Linux.

        ·PC: The PC is client which connects to wireless LAN. It can exchange data with sensor node through gateway.

        ·Attacker: The attacker is Kali Linux which is a virtual machine on the PC. It can use built-in tools to launch the ICMP Flood ICMP attack.

        ·Sensor node: It is based on Arduino, which can monitor the information of environment.

        III.TESTING

        In this experiment, the size of ICMP packets launched by attacker is variable. We first chose three different sizes which are 250 bytes, 500 bytes and 750 bytes and use ping command to verify if the gateway can operate normally in terms of CPU utility, time of success of attack, packet lose rate.

        We also choose 10 packets in each scenario and compare the respond time in Figure 2, which shows that larger size of packet causes longer response time.

        We then use other extra size of ICMP packets to launch the attack in order to see the change of packet lose rate. The packet size is 1000 bytes, 1250 bytes, 1500 bytes. The results show that the performance of ICMP Flood attack becomes better when the size of packet increases.

        IV.CONCLUSION

        In this paper, experimenters deploy a IoT system as the victim of ICMP Flood attack. The results of experiment show that the increase of size of ICMP packet size can improve the performance of attack, which reflects in CPU utility, time of success of attack and packet lose rate in experiment.

        Acknowledgment

        This work has been supported by the XJTLU research development fund projects RDF140243 and RDF150246, as well as by the Suzhou Science and Technology Development Plan under grant SYG201516, and Jiangsu Province National Science Foundation under grant BK20150376.

        References

        [1]C. Ming et al, "Different Denail of Service Attack Methods for IoT System", 2017.

        [2]K. Zheng et al, "A Denail of Service Attack Method for an IoT System"

        [3]L. Liang et al, "A Denial of Service Attack Method for IoT System in photovoltaic Energy System"

        [4]K. Wang et al, "A Denial of Service Attack Against IoT System", 2017.

        猜你喜歡
        關(guān)鍵
        Semiotics and how it applied in the media text of cosmetic advertisement
        青年生活(2020年4期)2020-03-03 12:21:45
        Research and Analysis on the Integration of Power Communication Technology and Information System
        Application and Research of Power Information Communication Technology in Smart Grid
        A Study on How to Enhancing English Learning through Students Musical Intelligence
        China
        The Impact of Economic Globalization on China
        Model Constructing for Analyzing the Energy Profile Evolution
        An authenticated key agreement protocol with unbalanced computing costs for resource—limited devices in IoT
        Model Checking nRF24L01—based Internet of Things Systems
        Research on Depression through Data Mining
        亚洲国产成人久久综合下载| 一区二区三区四区黄色av网站| 91精品亚洲成人一区二区三区| 欧美人伦禁忌dvd放荡欲情| 粗一硬一长一进一爽一a级| 免费大学生国产在线观看p| 女人天堂国产精品资源麻豆| 精品国产一区二区三区2021| 性色av无码不卡中文字幕| 国内精品福利在线视频| 一级内射免费观看视频| 色欲欲www成人网站| 无码精品a∨在线观看十八禁| 亚洲综合日韩中文字幕| 国产伦理一区二区久久精品| 亚洲av成人片无码网站| 久久久久久成人毛片免费看| 欧美h久免费女| 天天色天天操天天日天天射| 三年片免费观看大全有| 视频一区欧美| 美女被搞在线观看一区二区三区| 一边摸一边做爽的视频17国产| 999久久久无码国产精品| 国产精品久久久久影视不卡| 国产成人精品一区二三区在线观看| 天天做天天爱夜夜爽女人爽| 黄色视频在线免费观看| 无码精品人妻一区二区三区98| av在线高清观看亚洲| 无码国产69精品久久久久孕妇| 可以免费在线看黄的网站| 国产精品一区一区三区| 一边摸一边抽搐一进一出口述| 亚洲精品无码mv在线观看| 久久99久久99精品观看| 精品国产自在现线看久久| 久久精品免费一区二区三区| 国产福利小视频在线观看| 亚洲人成精品久久熟女| 久久久国产打桩机|