A Denial of Service Attack Against IoT System

来源 :科学与财富 | 被引量 : 0次 | 上传用户:limida
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  摘 要:Internet of Things is widely accepted and used in the modern days, however, it is not secure for the users because of the cyber-attack. Denial of Service attack can have impact on the data access and information transmission. This paper designed experiments to test the influence of Denial of Service attack on an IoT system.
  關键词:Internet of Things (IoT); Denial of Service (DoS) attack; SYN Flooding Attack; TCP Connect Flooding Attack
  I. INTRODUCTION
  Internet of Things (IoT) was initially mentioned in 1999 [1] and becomes common that there will be 20.8 billions devics on IoT by 2020[2]. As IoT gets pervasive, it is more vulnerable to become the attacking target. Denial of Service (DoS) attack is one of the cyber-attack methods [3]. In a Dos attack, attackers prevent users accessing information or service by utilizing different methods [4].
  In this paper, DoS attack will be supported in the wireless sensor network system based on NRF and Wi-Fi communication. The DoS attack will be implemented on the gateway by SYN flooding attack and Transmission Control Protocol (TCP) connect flood.
  II.EXPERIMENT PLATFORM
  A.Equipment
  PC, Router, Raspberry Pi, Gateway (Arduino), Sensor (Arduino): Detect voltage and other data
  B.The platform for the DoS attack on gateway
  This platform is for the DoS attack which against Arduino Nrf gateway. The Arduino gateway cannot send messages to the Raspberry Pi and the attacker is a Raspberry Pi.
  III.DOS ATTACK IMPLEMENTATION
  A.SYN Flooding Attack
  SYN flooding attack is launched with the assistance of hping3 command on Raspberry Pi. Hping3 provides two kinds of instructions for source IP spoofing which are “--rand-source” and “--spoof”.
  1)Spoofed Source IP Address
  150 packets were sent from PC to the gateway via the ping method for the purpose of testing the communication between them. The packet loss rates are a downward trend as speed slows down. The same pattern can be seen at the average and maximum response time, whereas the time declines progressively.
  2)Random Source IP Address
  In this experiment, the attacks with different sizes ranging from 6 to 600000 bytes were launched. 150 packets were sent, and the size of packet sent might be irrelevant to SYN flood attack effects according to the ping results since all packet loss rates fluctuate slightly and the response time varies irregularly.
  B.TCP Connect Flooding Attack   This experiment demonstrates the opinion that the bigger rate is, the stronger TCP connect flooding attack is. Additionally, the maximum duration for web page refresh suspension increases. Another view is that TCP connect flooding attack might ultimately lead to continuous gateway network congestion if the attacker persists in attacking the victim in a period of time.
  C.Comparsion
  150 packets by ping command were sent during each type of attack. Based on the package loss rate and web server condition, it appears that SYN flooding attack has far better effect than TCP Connect flooding attack.
  IV.CONCLUSION
  This paper applied SYN flooding attack and TCP connect flooding attack. Both methods enable to cause gateway resource exhaustion and data loss and both of these two attacks have significant impact on resource access regarding sending speeds.
  ACKNOWLEDGMENT
  This work has been supported by the XJTLU research development fund projects RDF140243 and RDF150246, as well as by the Suzhou Science and Technology Development Plan under grant SYG201516, and Jiangsu Province National Science Foundation under grant BK20150376.
  REFERENCES
  [1]K. Ashton, (2009). That ’Internet of Things’ thing. RFID Journal, 22 July. [Internet] Avail- able at: http://www.rfidjournal.com/article/view/4986 [Accessed 18 August 2011]. ?
  [2]S. Conn, (2015, Nov.10)"Gartner Says 6.4 Billion Connected "Things" Will Be in Use in 2016, Up 30 Percent From 2015". [Online]. Available: http://www.gartner.com/newsroom/id/3165317
  [3]Wikipedia, (2017, Aug.14) Denial-of-service attack [Online]. Available: https://en.wikipedia.org/wiki/Denial-of-service_attack
  [4]M. McDowell, (2009, Nov.4) Understanding Denial-of-Service Attacks [Online]. Available: https://www.us-cert.gov/ncas/tips/ST04-015
其他文献
摘 要:随着我国经济和人民生活水平不断提高,公路覆盖面积也越来越广,在公路施工中,必须意识到工程施工管理的重要性,施工过程中的管理重点对公路建设日后发展也有着重要的作用,只有对工程施工过程中的每一个细节都重视起来,才能将施工管理快速、有效,稳定地进行下去,深入了解公路施工管理的重要性,从重点入手,提高公路工程施工的质量从而完善我国公路建设发展状况。本文深入探究公路工程施工管理的重要性并分析,对工程
摘 要:PV energy system is concerned to solve pollution problems all over the world. Therefore, Internet of Things (IoT) is a monitoring network for PV system that based on the PV energy system to improv
摘 要:跃进二号东高点油田目前产量呈下降趋势,含水上升率、递减率指标均变差,目前自然递减15.49%、综合递减12.05%。含水上升率38.11%,主要是受部分高产井、措施井含水上升、产量下降造成。本文着重分析油田开发存在的问题,并提出下一步对策,尽力减小油田递减,提高油田开发效果。  关键词:精细注水 地产低效 高含水 出砂  一、油田开发现状  跃进二号东高点油田是在1985年地震统层解释中发
摘 要:Internet of Things (IoT) is widely used in various fields. It connects diverse devices and enables them to collect and exchange data. However, with the popularity of IoT, more and more attentions
摘 要:随着城市化进程的不断加快,城市管理也在跟随着城市的发展而不断地进步,城市的管理是一种向综合化、精密化方向发展的一种新兴事物,并且可以进一步的优化城市管理体制,进而提高城市管理的效果。实行数字化的城市管理如今已经为辽宁省各市带来不少便利,加强了城市管理,推进了城市发展的进程。数字化的城市管理技术彻底的改写了城市管理的理念、流程以及方法,对于提高如今各省市城市管理水平、解决城市问题以及维护各区
摘 要:随着我国交通事业的快速发展,隧道工程的数量在不断增多。对于隧道工程来说,帷幕注浆是非常重要的内容之一,主要对工程中发生的裂缝、渗水等问题进行必要的修补,从而提升整体工程的质量。本文以某某隧道工程为例介绍帷幕注浆施工技术方面的内容,希望能够对相关人士有所帮助。  关键词:隧道;帷幕注浆;施工技术  1.引言  隧道进口里程D2K372+305,出口里程DK381+695,隧道为全长9390m
摘 要:目前发电机组主汽门大多都安装在汽轮机中,实际工作运行过程中管道中会产生较大蒸汽作用力,对汽轮机实际受力状态产生较大影响。本文对主汽门安装方式对汽轮机受力影响进行分析,通过时间计算,证明通过主汽门侧挂方式对汽轮机各个支点反力以及定位键会产生不同程度的不平衡力,对汽轮机整体稳定性造成较大影响。通过主汽门中心线安装方式能够全面解决各个支点受力方面存在的问题,降低定位键侧向力,提高汽轮机稳定性。 
摘 要:工业生产中会产生大量的废料,由于工业类型繁多,废料的成分也有很大的区别。对工业废料进行及时地处理不仅可以降低对生态环境的影响,还可以将资源进行一定的回收,实现节约能源的目的,可以取到较好的经济效益和社会效益。本文将会对工业废料回收中的化学应用进行一定的分析。  关键词:工业生产;废料回收;化学应用  引言  随着相关技术以及市场的刺激作用,我国的工业发展规模越来越大,类别越来越多,相应的工
In this paper, we focused on Chinese university students depression issues and acquired data by a survey in universities. The data illustrates that nearly a hal
习近平总书记在福州工作期间分别于1987年和1995年两次来到军门社区视察,反复强调社区党建的重要性。特别是2014年11月1日,在福建考察的习近平总书记来到了福州军门社区,指出:社