• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    SDN Based DDos Mitigating Approach Using Traffic Entropy for IoT Network

    2022-03-14 09:26:04MuhammadIbrahimMuhammadHanifShabirAhmadFaisalJamilTayyabaSehar
    Computers Materials&Continua 2022年3期

    Muhammad Ibrahim,Muhammad Hanif,Shabir Ahmad,Faisal Jamil,Tayyaba Sehar

    YunJung Lee4 and DoHyeun Kim1,*

    1Department of Computer Engineering,Jeju National University,Jeju-si,Jeju Special Self-Governing Province,63243,Korea

    2Virtual University Islamabad,Pakistan

    3Department of IT Convergence Engineering,Gachon University,Sujeong-Gu,Seongnam-Si,Gyeonggi-Do,461-701,Korea

    4Department of Computer Science and Statistics,Jeju National University,Korea

    Abstract: The Internet of Things (IoT) has been widely adopted in various domains including smart cities,healthcare,smart factories,etc.In the last few years, the fitness industry has been reshaped by the introduction of smart fitness solutions for individuals as well as fitness gyms.The IoT fitness devices collect trainee data that is being used for various decision-making.However,it will face numerous security and privacy issues towards its realization.This work focuses on IoT security, especially DoS/DDoS attacks.In this paper,we have proposed a novel blockchain-enabled protocol (BEP) that uses the notion of a self-exposing node(SEN)approach for securing fitness IoT applications.The blockchain and SDN architectures are employed to enhance IoT security by a highly preventive security monitoring, analysis and response system.The proposed approach helps in detecting the DoS/DDoS attacks on the IoT fitness system and then mitigating the attacks.The BEP is used for handling Blockchain-related activities and SEN could be a sensor or actuator node within the fitness IoT system.SEN provides information about the inbound and outbound traffic to the BEP which is used to analyze the DoS/DDoS attacks on the fitness IoT system.The SEN calculates the inbound and outbound traffic features’entropies and transmits them to the Blockchain in the form of transaction blocks.The BEP picks the whole mined blocks’transactions and transfers them to the SDN controller node.The controller node correlates the entropies data of SENs and decides about the DoS or DDoS attack.So, there are two decision points, one is SEN, and another is the controller.To evaluate the performance of our proposed system, several experiments are performed and results concerning the entropy values and attack detection rate are obtained.The proposed approach has outperformed the other two approaches concerning the attack detection rate by an increase of 11%and 18%against Approach 1 and Approach 2 respectively.

    Keywords: SDN; control plane; load balancing; decision tree; CPU utilization

    1 Introduction

    In the future, the Internet will be a communication system for billions of interconnected smart devices embedded within the objects in the environment [1] that will be a revolution of data gathering and sharing among the smart devices.These devices will be carrying sensors generating a massive amount of data, gathered from these objects, and later analyzed for useful knowledge.Some examples of these smart devices carrying objects are traffic lights, appliances(fridge, Air conditioner), lampposts, irrigation outlets, medical equipment for monitoring and vehicles, etc.The Internet of things (IoT) [2,3] is the interaction of sensing and physical devices contained in buildings, vehicles, and other things connected through a network and offer services to accumulate data.It is the most extensive infrastructure running without human involvement.The IoT is permitted to sense, control distantly within the provided network structure.IoT has produced more openings for integrating the world into the systems created by the latest computing technologies.Due to these technological advancements, financial benefits are enlarged, efficiency is enhanced, and accuracy is peaked [3].Each thing is individually identified and operated within internet infrastructure through an embedded computing system within IoT.By 2020, 30 billion objects are expected to be within the IoT system [4].The technologies which play a pivotal role in enabling IoT are sensors, low-power electronics, connectivity, backbone connectivity, and hardware, to name a few.IoT gateways are vital for IoT and commonly consisted of small gateways.These gateways are capable of interconnecting wireless sensors that are distributed in the environment.These gateways form wireless sensor networks (WSN) and functioning internet gateway among the interconnected smart devices in the IoT.According to the requirements, it is a great challenge to impose the policies in such a complex and dynamic environment.Resource management and security gain immense importance in present-day networks that are still two important challenges in networks.Decoupling the networking data plane from network control logic is the main obstacle in these traditional networks [5].SDN is possibly a revolutionized computer network and might be a 5th generation wireless network known as 5G.Since IoT is the future, the integration of IoT and SDN has a considerable advantage.SDN is a crucial enabler for the integration of IoT services with traditional services.SDN can transport large amount of data gathered from the machines, terminals, sensors, and nodes in the IoT.It can allocate storage and computing resources in the distributed data centers.By automatically configuring network devices,SDN gathers such data required for analysis.SDN is designed to authenticate users for security purposes by following the prescribed rules for accessing the data.This new networking paradigm permits a centralized system as software to control the whole network behavior by decoupling the forwarding layer from the routing decision-making plane [6].A mechanism is required to enhance the communication between the control plane and the data plane.For this purpose, the OpenFlow system is utilized.The combination of SDN and OpenFlow permits us to implement high-level control programmed software system that provides the network components’behavior.Many new networking tasks are achieved through these programs including resource management,routing, and security.In the industry and academia, data transport and media requirements with the best quality are growing nowadays.Due to this growth of data requirements, the SDN could be used to tackle the challenge [7].SDN and IoT are two technologies that are very much dependent on each other.Both of these technologies complement each other in bringing us a better and connected world.SDN technology can prepare a network for a robust and successful IoT.It provides elasticity and agility, which IoT demands.Furthermore, SDN offers application developers an environment to develop new software and tools connecting the IoT effectively [8].Hackers have been performing DoS attacks for many years that increased exponentially over time.Due to the internet bandwidth evolution, such attacks have enlarged from 400 Mbps to 600 Gbps by 2015.The purpose of DoS attacks includes financial blackmailing, hacking and state-sponsored attacks on enemies, DoS attacks on sensitive systems of banks disrupt its working [6,9].The rest of the paper is organized as follows: Section 2 presents the state-of-the-art literature related to IoT, SDN, and Blockchain for IoT security solutions.The discussion about the proposed work is delineated in Section 3.In Section 4, the evaluation and results of the experiment are discussed.Finally, the conclusions and future work is presented in Section 5.

    2 Related Work

    In [10], the authors presented the challenges and opportunities in IoT.Data collection and brokerage, smart cities, aviation sector, automotive industry, energy sector, manufacturing, addressing and tagging, IoT applications are discussed, and opportunities and challenges associated with these areas are explained.The authors addressed the security issues in IoT [11].They gave a brief overview of IoT applications in different fields like Industries, personal medical devices, smart homes, etc.IoT security requirements are briefly discussed, including resilience of attacks, client privacy, access control, and data authentication.IoT security threats are end-to-end data life cycle protection, secure things planning, visible/usable security, and privacy.The attacks are classified into low-level, medium-level, high-level, and extremely high-level attacks.The authors in [12] discussed the research directions for IoT.Five research communities of IoT are carrying the research:IoT, cyber-physical systems, wireless sensor networks, mobile computing, and pervasive computing.The study has been conducted in the areas of IoT.These areas are Massive Scaling of IoT devices embedded within objects operated in daily life, the architecture of IoT for correct operations and dependencies, and the issues faced during in the design and development of IoT systems; the robustness of underlying network during the communication of massive amount of data is another big issue; the openness of the IoT is an issue because sensor-based systems traditionally closed systems and it is challenging to give them a property of transparency; a big problem for the IoT is the security attacks due to low memory and processing power of devices being used within IoT;physically accessing the sensors, objects, actuators and openness of the systems; and Privacy of the information being obtained from IoT devices is another significant concern.The authors presented a comprehensive survey on the SDN technology and security for the IoT [13].They compared several SDN architectures and presented their benefits and drawbacks.Furthermore, the discussion about role-based security controller for the SDN-IoT environment is also designed in their work.The authors in [14] presented a survey on the security and privacy issues of IoT.This work presented the evolution of IoT, architecture, and protocol stack of IoT for the IoT applications.IoT’s primary security concerns are front-end sensors and equipments leads to unauthorized access to data, threats to the Internet, and DoS attacks.IoT privacy concerns are privacy in devices being used for data collection, privacy during communication of sensed data, privacy in data storage during data storage on physical devices, and privacy during data processing.In [15], the authors presented a simple approach based on statistical analysis for Intrusion Detection System(IDS).The authors employed a simple statistical process for modeling a new IDS.An argument is given that the necessary statistical methodology is still used if search space is not reduced.This argument is confirmed by the deployment of the exhaustive search method.The authors in [16]presented SDN as a solution to overcome security challenges in the IoT.Four layers architecture is presented that support smart devices integrated with the IoT system.These four layers are the smart object layer providing tools to the programmers.The Internet layer provides network protocols for communication between the smart devices within the Internet.The middleware layer provides management IoT, and the application layer provides applications used in the smart devices.IoT-associated challenges are constraints on device resources, heterogeneous networks, and most importantly, the absence of common communication standards.Security issues in the IoT are trillion points of failure and vulnerabilities, integrating the people’s data and trust, and most importantly the privacy of the collected data.The authors proposed a defense approach against a new flow attack in SDN-based IoT system [17].A new Smart Security System (SSM) mechanism is presented in this work.SSM is a monitoring system and mitigation method.The monitoring system is low-cost that reuses the invocation of controller-to-switch messages and asynchronous messages.The mitigation method has used the function of redirection of suspicious flows.These flows are redirected to the security middleware in IoT, and the controller is informed about the result.The controller executes dynamic access control as the attacker access the SDN-based IoT switches.James Cannady (2016) compared the state-of-the-art Intrusion detection methods.The authors presented foundations of Intrusion detection systems (IDSs), development/evolution of IDSs, and approaches being used.These intrusion detection techniques are Next-Generation Intrusion Detection Expert System (NIDES), Distributed Intrusion Detection System (DIDS),State Transition Analysis Tool (STAT), USTAT, tripwire, Graph-based Intrusion Detection System(GrIDS), thumb printing and Cooperating Security Managers (CSM).

    The authors in [18] presented a survey on securing the network using SDN.The primary security configuration using SDN is a key to secure the network.Security configuration using SDN is achieved by centralizing the control plane and implementing flexible security policies.Configuring the network to detect the DoS attack, traffic anomaly detection, etc., is an excellent method for a secured network.In SDN, having programmatic capabilities with dynamic responses is used for threat remediation.In SDN, network verification and consistency are straightforward and could be verified for consistent networks.SDN is used as a service to facilitate some new network security measures beyond protecting the network and enabling the new services such as anonymization which enhanced the trust and remote management.The authors in [15] argued that SDN brings many benefits by decoupling control and data plane.By this mechanism, SDN makes it easy to detect and react to DoS/DDoS attacks.In [19], the authors discussed the development of Blockchain-based systems.s.While reimagining the space with the Blockchain, highlighted various common challenges, drawbacks, and shortcomings that can occur.The authors in [6] presented a comprehensive framework of entropy to deduce the state of network flow rates and properties in probabilistic form.Network traffic uncertainty is symbolized by the joint probability function over its unknowns.Kornites et al.presented a comprehension dataset of the normal and malicious traffic of IoT.They developed a Bot-IoT dataset of the traffic.The authors also presented some statistical analysis of this dataset.The authorpresented Blockchain and IoT’s integration called Blockchain of Things (Cot).His work presented IoT and Blockchain Technologies’union concerning architecture and security.The author claimed that IoT requires security features while Blockchain naturally has these features due to its broader use of cryptography and peer-to-peer consensus model.A holistic approach that presented attackers’motives for using IoT devices to launch DDoS attacks is proposed in [20].Attack tools are defined for infecting IoT devices with botnet malware and initiating DDoS attacks on networks and servers.New and emerging attack patterns as multi-vector attacks are introduced along with a detailed taxonomy of attacks on IoT layers and Cloud layers.The authors discussed IoT and the Cloud environment, providing a complete view of DDoS attacks and defensive measures.The authors also presented a detailed description of DDoS attacks from the formation of a botnet of IoT devices to implement them as DDoS attack traffic sources.In [21], the authors described the IoT data aspects, categorized as heterogeneity, inaccuracy of sensed data, scalability, and semantics.IoT data management also provides support for offline analysis.Management systems need to support heterogeneous devices that operates in heterogeneous networks in confined areas.Administrators can remotely control IoT devices that will reduce the costs associated with maintenance activities quickly.The authors presented an integrated research project between universities, government, and private sector companies in the USA and introduced IoT middleware [22].The middle layer constrains mobile access like smartphones, single board computers like the Raspberry pi, and laptops act as a gateway.Both layers have access to the CloudCloud services.This IoT middleware solution is not simple and can be installed on the embedded devices such as edge or Cloud devices.Actorbased IoT middleware sensors may not have a final service.However, the character provides a storage service that can be downloaded from Cloud storage where needed.Calvin and Node-RED are examples of character-based IoT middlewares.In [23], the authors presented a complete list of significant challenges, including collaboration, distribution, rollout, infrastructure support,security, and privacy by investigating the IoT Middleware solutions.The authors also concluded that the Web semantic-based IoT Middleware solution is adaptable to these challenges without the persistence service’s resilience.It is an effective solution for device support and service availability;however, IoT Middleware-based web service is heavy and is not ideal for downloading Middleware to Edge devices integrated with IoT applications.It has become more important to make a simple Middleware solution with the IoT network development and to distribute across both the Cloud or Edge devices as a function.Sensitive latency applications like autonomous driving may require Middleware to be applied to sensor nodes or edge devices.In contrast, applications that require advanced computing and analytics prefer Cloud-based Middleware solutions.In [24], the authors investigated that the device access management file for the IoT system is essential as critical details are important to understand different intelligent things.In [25], the authors proposed a device authentication approach for securing IoT communication networks.Various methods, such as dual authentication, PSO-AES, and authentication are used to authenticate the devices using the blockchain techniques.In [26], the authors proposed and implemented an efficient DDoS detection algorithm to maximize the detection rate with high efficiency.The detection approach integrates the PSD (Power Spectral Density) entropy method with the SVM (Support Vector Machine) for detecting the DDoS attacks from legitimate traffic.The proposed approach calculates the PSD-entropy first and then compares it against two pre-define adaptive thresholds values.

    3 Proposed Model

    The proposed BEP protocol comprises two components: SEN and SDN controller, as shown in Fig.1.

    The SEN module receives the inbound traffic using the packet capturing module.The packet processing and features distribution module process the inbound and outbound traffic and extract important features (i.e., 26 in this case as shown in Tab.1) from the traffic which are used by the entropy calculation module.The entropy information and traffic features are stored in the local Blockchain and then correlation of the entropy information is performed against the history entropy information by the features entropy data module to confirm about the traffic legitimacy.The BEP transmits the entropies information to the miners for the development of the block.

    Figure 1: System Architecture of BEP protocol

    The BEP is a proprietary protocol written in Python3 over Transport and Control Protocol(TCP) that provides a set of rules for transmission of transactions, blocks, data, and Blockchain between Controller node the Sens.BEP is an application layer protocol that is capable of transmitting Blockchain-related data that works as the client-server model.SEN captures the inbound and outbound traffic features and calculates its average joint entropies, and hand over to the Blockchain network.The miners mine this transaction and validate the transactions and put in the Blockchain as a block.On average, a block (the structure containing transaction) is mined every 10 s in the Blockchain and is transmitted to the controller by the BEP, where this block is mined into global Blockchain.

    Table 1: Traffic features and descriptions

    For profiling the DoS/DDoS, we have used the Bot-IoT dataset to profile and twenty-six features are extracted from the dataset [24].The average joint entropy is calculated for each feature and saved in the genesis block of the Blockchain by profiling from the Bot-IoT dataset and features of the traffic entropies of the DoS/DDoS attacks.Every SEN node detects the attack by correlating the genesis block’s entropies with its calculated entropies and getting information about the compromised node by itself.Each SEN can detect the attack by correlating the inbound and outbound entropy values with the values in the genesis block.The Controller node of the SDN is also taking part in the overall process.This controller maintains a database of all the SENs in the network by extracting Blockchain blocks’entropy data.By analyzing and correlating each entropy’s data, the decisions are made about either SEN is a bot or not.If SEN is a bot/botnet,it is blocked by the SDN infrastructure, which mitigates the attack.

    Finally, SEN calculates the entropies of the features of the inbound and outbound traffic and handover to the Blockchain as data of the block.Also, it correlates the entropies of the features to the dataset calculated entropies in the genesis block.The BEP picks the whole mined block and transmits it to the Controller node.The controller takes the block, extracts it, mines its information to the global Blockchain, and saves this information into the analysis database.The Controller node correlates the data of SENs and decides the DoS or DDoS attack.So, there are two decision points, one is SEN, and another is the controller.As SEN detects a botnet, the OFM will compose a flow entry and push it to the controller.The controller then updates the Voss’s flow tables and block the interface from the Voss to which bot SEN is connected to the network.In this way, SEN is isolated, and the network resources are saved from DoS/DDoS attacks.

    Profiling the network traffic features is an integral part of the SEN.The architecture of the profiler is shown in Fig.2.The profiler’s basic functionality is that it captures the traffic,distributes the traffic features, and calculates the entropy of the features, detection, and output.At first, already captured traffic files in the cap format of bots by different entities are provided to the profiler and generated a profile database of malicious traffic.This malicious traffic database gives us the basis for detecting DoS attacks by different bots of the botnet.The class and methods are given below class play reader and redcap (“file.pcap”) [24].The profile is developed from the Bot-IoT dataset (Koroniotis, 2019).The reasons behind using this dataset are because it uses realistic testbed configuration, realistic traffic, labeled data, IoT traces, diverse attack scenarios,total capture packets, and newly generated features.This dataset includes both attack traffic and regular traffic.This dataset has a size of 69.3 GB cap files.

    Figure 2: Workflow of traffic profiler

    Several fitness IoT devices are used, and data is stored in the Cloud.The generated messages are transmitted to the Cloud using the MQTT protocol.The statistics of regular traffic included in the dataset are shown in Tab.2.

    The dataset used four Linux Virtual Machines to start cyber-attacks in parallel for implementing different botnet scenarios.The cyber-attacks and their tools considered in the Bot-IoT dataset are described in Tab.3.

    Table 2: Statistics of normal instances included in the Bot-IoT dataset

    Table 3: Statistics of attacks in IoT-Bot dataset

    4 Experimental Setup and Evaluation

    A testbed of SDN and IoT is developed in Mininet.Mininet is a network emulator that generates a network by the links, controllers, switches, and virtual hosts.It is highly flexible and customizable simulation tool that supports network testbeds and complex topology configurations.Mininet provides CLI that is OpenFlow- enabled and topology-aware for running and debugging network-wide tests.This tool also provides Python APIs for network application programming and experimentation.The tool runs real code and can be moved to a real system with minimal changes.Blockchain and BEP are developed in Python3.The core components of Blockchain network are nodes, transaction, block, chain, miners, and consensus algorithm.These all components are implemented in Python3.We have two scenarios in this simulation.Firstly, when the SEN is under DoS attacks and secondly, when the SEN performs the DoS attack after being compromised by the malware attack.

    4.1 SEN Under Attack Scenario

    The topology of the smart Fitness IoT network is shown in Fig.3.The simulation is conducted on a system equipped with a CPU of 3 GHz, RAM 16 GB, and 150 GB of Hard drive, and for the simulation, the Mininet tool is installed and configured.Mininet is a powerful simulation tool to develop, share, and test OpenFlow and Software-Defined Networking systems.Open Daylight controller, OFM, OVS, and SEN are installed on the hosts.The results in Fig.4 show the SEN node’s traffic entropies when no attack is performed on the SEN node.The x-axis corresponds to the inbound traffic, and the y-axis’s inter-arrival time representing the entropies of traffic features.In this case, the entropy values follow a linear pattern that shows the SEN node’s normal behavior.

    Figure 3: DoS attack

    Figure 4: Traffic entropy of traffic features in normal scenario

    The results are shown in Fig.5a and present the SEN node’s abnormal behavior due to a DoS attack.A DoS attack is just started, and the normal functioning of SEN is disturbed due to significant data traffic.

    The shift from high entropy values to low entropy values can be seen in the results.This shows that SEN is sending/receiving a significant amount of data.This data inflow or outflow from the SEN monitors itself continuously and saves information about the inbound and outbound traffic in the Blockchain as shown in Fig.5b.A significant shift in entropy is demonstrated at the period of 10th second.The huge surge of data shifts the SEN behavior, and SEN cannot send its sensed data for the IoT applications.In this case, SEN inbound traffic is observed and draws a graph in the entropy time domain, as shown in Fig.5c.The SEN behavior is changed from normal to attack, and inbound traffic is increasing tremendously.SENs and the decision algorithm’s behavior with the observation of entropy of the traffic features and correlation of the traffic features like several packets inflow and outflow lead us to the final decision-making about the attacked/attacker SEN.The results are based on the entropy values of the traffic features correlation coefficient.We categorize the DoS/DDoS attacks strength concerning the correlation coefficient values as shown in Tab.4.

    Figure 5: SEN attacks categories (a) Abnormal behavior of SEN (b) SEN under attack against threshold values (c) SEN under attack (d) SEN under attack scenario

    The ideal correlation coefficient for both threshold values of entropy of dataset and SEN received traffic entropy values according to Tab.3 values for a strong and powerful relationship.It is essential to mention that the simulation was executed for 26 simulated parameters, as given in Tab.1.Therefore, the conclusions and explanations are based strictly on simulation SEN traffic feature entropies and Threshold traffic features entropies shown in Fig.5d.The simulations are executed multiple times, and the entropy values of traffic features are obtained.The next step is to calculate the correlation coefficient of test values of traffic features received on SEN with traffic features’threshold values.We got a correlation coefficient in the range of 0.600-0.799, which shows a strong relationship between SEN received traffic features entropy values and threshold traffic features entropy values that resulted from DoS/DDoS attack on the SEN.

    Table 4: Correlation coefficient interpretation

    4.2 SEN Attacking Scenario

    The obtained results are based on the entropy values of the traffic features correlation coefficient.The following simulation experiment corresponds to the scenario when SEN compromised and is performing the attack.In this case, SEN outbound traffic is observed and draws a graph in the entropy time domain, as shown in Fig.6a.The SEN behavior is changed from normal to attack, and outbound traffic is increased tremendously.The simulation’s primary purpose is to evaluate the SEN and detect the ideal correlation coefficient for both threshold values of entropy of dataset and SEN sent traffic entropy values according to Tab.4 value for solid and powerful relationships.It is essential to mention that the simulation was realized for 26 simulated parameters, as shown in Tab.1.Therefore, the conclusions and explanations are based strictly on the SEN traffic feature entropies and Threshold traffic features entropies shown in Fig.6b.

    A critical metric to quantify the performance of the DoS/DDoS detection approaches is the detection rate.Another set of experiments is carried out, and results concerning the proposed approach’s detection rate and two compared contemporary methods are obtained and plotted in Fig.7.Approach 1has shown a detection rate of 78% on the utilized dataset.Approach 2has demonstrated an improvement of 6% againstApproach 1.The proposed method has shown better entropy results and thus been able to improve the detection rate by 11% and 18.5% againstApproach 1andApproach 2,respectively.

    4.3 Results and Discussion

    The proposed approach was evaluated using various SEN simulation experiments under attack and SEN as an attacker scenario.Several experiments were performed to test the performance of the proposed approach with different entropies settings.The value of the entropy was used as a measure to detect the DDoS attack occurrence.After performing various experiments, it was revealed that the proposed approach has been able to catch most of the DDoS attacks with a detection rate of 90 or more in each of the experiments.These results confirm that the proposed approach can significantly improve the detection of DDoS attacks for fitness IoT data.

    Figure 6: SEN performing different Scenarios.(a) SEN performing DoS attack (b) SEN attacking scenario

    Figure 7: Detection rate comparison

    5 Conclusions and Future Work

    The simulation shows that the proposed approach has shown higher detection rate to counter DoS/DDoS attacks.In the current scenario, fitness data and access to the system are crucial due to time restraints and resources availability.The DoS/DDoS attacks on the fitness IoT system block the traffic by heavy flooding of the packets on the specific machine, and the user of the fitness system cannot access the resources of IoT system SDN can counter this by dropping the machine’s traffic by blocking the port on the OVS on which the attacking machine is connected.So, SDN has blocked the flooding traffic from the attacking machine and restored the fitness IoT system’s normal working.SEN is able to detect and mitigate the DoS attacks at their origin.With the help of SDN, SEN strengthened the IoT security against the DoS attacks.In the future, we will carry on this work to detect the botnet and botnet controller.We will use current research work to trace the botnet which the controller controls.Our current research work can help trace the bots in botnet back and the botnets’controller responsible for DoS/DDoS attacks.A botnet is many Internet-connected devices, each of which is running one or more bots.Botnets can be used to perform distributed DDoS attacks, steal data, send spam, and allows the attacker to access the device and its connection.

    Funding Statement:This research was supported by Energy Cloud R&D Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT(2019M3F2A1073387), and this research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education(2018R1D1A1A09082919), and this research was supported by Institute for Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government(MSIT) (No.2018-0-01456, AutoMaTa: Autonomous Management framework based on artificial intelligent Technology for adaptive and disposable IoT).Any correspondence related to this paper should be addressed to Do-hyeun Kim.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产精品一区www在线观看| 国产伦理片在线播放av一区| 看十八女毛片水多多多| 久久久久久久久久久免费av| 黄色配什么色好看| 亚洲国产成人一精品久久久| 成年人午夜在线观看视频| 春色校园在线视频观看| 亚洲精品456在线播放app| 成人综合一区亚洲| 人妻一区二区av| 久久狼人影院| 在线观看三级黄色| 草草在线视频免费看| 国产熟女午夜一区二区三区| 人人妻人人添人人爽欧美一区卜| 欧美日韩av久久| 精品亚洲成国产av| 女性生殖器流出的白浆| 日本av免费视频播放| 一级毛片电影观看| 日韩 亚洲 欧美在线| 午夜福利视频在线观看免费| 你懂的网址亚洲精品在线观看| 国产欧美日韩综合在线一区二区| 久久国产亚洲av麻豆专区| 三级国产精品片| 免费人成在线观看视频色| 在线天堂最新版资源| 成人漫画全彩无遮挡| a级毛片黄视频| 国产亚洲av片在线观看秒播厂| www.av在线官网国产| 免费高清在线观看视频在线观看| 97在线视频观看| 99久国产av精品国产电影| 亚洲av在线观看美女高潮| 精品少妇黑人巨大在线播放| 欧美日韩精品成人综合77777| 成人18禁高潮啪啪吃奶动态图| 久久久久精品性色| 久久国产精品男人的天堂亚洲 | 午夜激情久久久久久久| 美国免费a级毛片| 男人舔女人的私密视频| 成年人免费黄色播放视频| 日韩av在线免费看完整版不卡| 爱豆传媒免费全集在线观看| 免费日韩欧美在线观看| 亚洲国产毛片av蜜桃av| 在线天堂最新版资源| 少妇人妻久久综合中文| 美女内射精品一级片tv| 内地一区二区视频在线| 亚洲,欧美,日韩| 婷婷色麻豆天堂久久| 日韩av免费高清视频| 一本大道久久a久久精品| 久久精品国产亚洲av天美| 国产在线一区二区三区精| 国产在线一区二区三区精| 亚洲精品一区蜜桃| 三级国产精品片| 亚洲成人一二三区av| 午夜福利乱码中文字幕| 伊人亚洲综合成人网| 中文精品一卡2卡3卡4更新| 春色校园在线视频观看| 在线观看一区二区三区激情| 插逼视频在线观看| 国产成人91sexporn| 91精品国产国语对白视频| 丝袜在线中文字幕| 亚洲精品美女久久av网站| 欧美精品一区二区免费开放| 久久精品久久精品一区二区三区| 丝瓜视频免费看黄片| 欧美激情极品国产一区二区三区 | av线在线观看网站| 免费av不卡在线播放| 成人国产麻豆网| 久久精品久久精品一区二区三区| 亚洲少妇的诱惑av| 国产熟女欧美一区二区| 免费不卡的大黄色大毛片视频在线观看| av国产久精品久网站免费入址| 免费黄网站久久成人精品| 成年人免费黄色播放视频| 欧美日韩精品成人综合77777| 日日爽夜夜爽网站| 自线自在国产av| 少妇高潮的动态图| 草草在线视频免费看| videossex国产| 亚洲精品一区蜜桃| 免费女性裸体啪啪无遮挡网站| 中文欧美无线码| 99久久中文字幕三级久久日本| 亚洲一级一片aⅴ在线观看| 免费av中文字幕在线| 卡戴珊不雅视频在线播放| 亚洲国产精品成人久久小说| 在线免费观看不下载黄p国产| 久久久久久久大尺度免费视频| 秋霞伦理黄片| 91国产中文字幕| 国产综合精华液| 久久精品久久久久久久性| 精品少妇黑人巨大在线播放| 我的女老师完整版在线观看| 一二三四在线观看免费中文在 | 菩萨蛮人人尽说江南好唐韦庄| 亚洲欧美日韩卡通动漫| 久久人人97超碰香蕉20202| 女性生殖器流出的白浆| 国产精品国产三级国产av玫瑰| 夜夜骑夜夜射夜夜干| 又黄又爽又刺激的免费视频.| 免费观看av网站的网址| 国国产精品蜜臀av免费| 另类精品久久| 在线观看免费视频网站a站| 18+在线观看网站| 久久久久精品人妻al黑| 久久精品aⅴ一区二区三区四区 | 纵有疾风起免费观看全集完整版| 国产视频首页在线观看| 婷婷色av中文字幕| 亚洲经典国产精华液单| 亚洲成国产人片在线观看| 午夜福利影视在线免费观看| 国产免费又黄又爽又色| 伊人亚洲综合成人网| 黄片无遮挡物在线观看| 国产精品成人在线| 26uuu在线亚洲综合色| 免费不卡的大黄色大毛片视频在线观看| 久久精品久久精品一区二区三区| 亚洲五月色婷婷综合| 又黄又爽又刺激的免费视频.| 成人免费观看视频高清| 日产精品乱码卡一卡2卡三| 亚洲精品乱久久久久久| 国产1区2区3区精品| 亚洲国产精品成人久久小说| 日日啪夜夜爽| 国产精品人妻久久久久久| 国产av码专区亚洲av| 欧美人与性动交α欧美精品济南到 | 精品国产一区二区三区久久久樱花| 久久ye,这里只有精品| a级毛色黄片| 久久久久精品人妻al黑| 女人精品久久久久毛片| 国产精品久久久久久精品电影小说| 日韩在线高清观看一区二区三区| 91aial.com中文字幕在线观看| 久久国产亚洲av麻豆专区| 午夜福利视频在线观看免费| 91国产中文字幕| 卡戴珊不雅视频在线播放| 午夜影院在线不卡| 亚洲精品,欧美精品| 毛片一级片免费看久久久久| 亚洲丝袜综合中文字幕| av播播在线观看一区| 美女福利国产在线| 夜夜爽夜夜爽视频| 国产免费福利视频在线观看| 综合色丁香网| 久久久久久久亚洲中文字幕| 一区二区三区精品91| 啦啦啦视频在线资源免费观看| 精品亚洲乱码少妇综合久久| 午夜日本视频在线| 黄色毛片三级朝国网站| 精品视频人人做人人爽| 美女主播在线视频| 国产精品久久久久成人av| 又黄又爽又刺激的免费视频.| 欧美日韩综合久久久久久| 交换朋友夫妻互换小说| 欧美亚洲 丝袜 人妻 在线| 久久精品国产自在天天线| 久久影院123| 纯流量卡能插随身wifi吗| 夫妻性生交免费视频一级片| 国产片内射在线| 自线自在国产av| 高清黄色对白视频在线免费看| 国产亚洲最大av| 国产精品蜜桃在线观看| 午夜福利在线观看免费完整高清在| 欧美另类一区| 亚洲国产精品国产精品| 日韩av不卡免费在线播放| 亚洲精品av麻豆狂野| 一级爰片在线观看| av播播在线观看一区| 好男人视频免费观看在线| 日本欧美视频一区| 国产精品无大码| 欧美日韩国产mv在线观看视频| 青春草视频在线免费观看| 亚洲精品,欧美精品| 精品少妇内射三级| 两个人免费观看高清视频| 26uuu在线亚洲综合色| 国产精品熟女久久久久浪| 亚洲欧美成人精品一区二区| 国产精品国产三级国产av玫瑰| 国产乱来视频区| 90打野战视频偷拍视频| 丰满乱子伦码专区| 乱人伦中国视频| 日韩av不卡免费在线播放| 久久 成人 亚洲| 亚洲第一av免费看| 中文字幕人妻熟女乱码| 亚洲四区av| 99re6热这里在线精品视频| 久久久久久伊人网av| 亚洲人与动物交配视频| 女人久久www免费人成看片| 亚洲av福利一区| 久久精品久久久久久久性| 国产有黄有色有爽视频| 国产日韩一区二区三区精品不卡| 亚洲伊人色综图| 国产精品 国内视频| 亚洲欧美日韩卡通动漫| 午夜视频国产福利| 亚洲国产精品专区欧美| 日韩一区二区三区影片| 午夜福利在线观看免费完整高清在| 青青草视频在线视频观看| 国产高清三级在线| 久久99蜜桃精品久久| 春色校园在线视频观看| 九草在线视频观看| 国产亚洲欧美精品永久| 中文字幕免费在线视频6| 成人毛片60女人毛片免费| 久久久久久久精品精品| 人妻 亚洲 视频| 99热国产这里只有精品6| 中文乱码字字幕精品一区二区三区| 成年人免费黄色播放视频| 久久久国产一区二区| 成人二区视频| 这个男人来自地球电影免费观看 | 观看美女的网站| 久久久a久久爽久久v久久| 亚洲美女黄色视频免费看| 91精品国产国语对白视频| 亚洲av在线观看美女高潮| 亚洲丝袜综合中文字幕| 99re6热这里在线精品视频| 制服诱惑二区| 97人妻天天添夜夜摸| 国产在线免费精品| 亚洲内射少妇av| 18禁观看日本| 两性夫妻黄色片 | 国产欧美亚洲国产| 丰满乱子伦码专区| 国产日韩欧美在线精品| 亚洲熟女精品中文字幕| 国产精品一区www在线观看| 国产精品一区二区在线观看99| 国产片内射在线| 精品亚洲成国产av| 国产国语露脸激情在线看| 国产精品久久久久成人av| videos熟女内射| 国产一区二区三区综合在线观看 | 最后的刺客免费高清国语| 久久狼人影院| 女人精品久久久久毛片| 中文字幕免费在线视频6| 亚洲av国产av综合av卡| 热99国产精品久久久久久7| 女人久久www免费人成看片| 亚洲欧洲精品一区二区精品久久久 | 大码成人一级视频| 久久久久久久大尺度免费视频| 男女啪啪激烈高潮av片| 99久久精品国产国产毛片| 国产在线免费精品| av一本久久久久| 丁香六月天网| 欧美日韩精品成人综合77777| 久久久久国产精品人妻一区二区| 精品国产一区二区三区久久久樱花| 天堂8中文在线网| 久久这里有精品视频免费| 欧美日韩综合久久久久久| 久久久久人妻精品一区果冻| 午夜影院在线不卡| 七月丁香在线播放| 欧美日韩亚洲高清精品| 在线观看免费日韩欧美大片| 熟女人妻精品中文字幕| 免费观看在线日韩| 日韩欧美精品免费久久| 色94色欧美一区二区| 有码 亚洲区| 国产精品麻豆人妻色哟哟久久| 美女主播在线视频| 成人二区视频| 午夜日本视频在线| 97人妻天天添夜夜摸| 肉色欧美久久久久久久蜜桃| 午夜福利视频精品| 伦精品一区二区三区| 亚洲内射少妇av| 国产亚洲av片在线观看秒播厂| 久久精品久久久久久噜噜老黄| 国产精品一二三区在线看| 高清黄色对白视频在线免费看| 丰满少妇做爰视频| 国产一区二区三区综合在线观看 | 久久久久精品人妻al黑| 美女xxoo啪啪120秒动态图| 欧美97在线视频| 日日撸夜夜添| 高清在线视频一区二区三区| 又大又黄又爽视频免费| 飞空精品影院首页| 国产黄频视频在线观看| 久久久久久久精品精品| 国产精品蜜桃在线观看| 深夜精品福利| 亚洲精品自拍成人| 日本wwww免费看| 中文乱码字字幕精品一区二区三区| 日韩一区二区视频免费看| 天天躁夜夜躁狠狠久久av| 欧美性感艳星| 老女人水多毛片| 欧美日韩成人在线一区二区| 亚洲国产最新在线播放| 18+在线观看网站| 国产成人免费观看mmmm| 欧美xxxx性猛交bbbb| 亚洲成色77777| 狂野欧美激情性xxxx在线观看| 男人舔女人的私密视频| 天天操日日干夜夜撸| 亚洲国产精品一区三区| videos熟女内射| 国产黄频视频在线观看| 春色校园在线视频观看| 精品人妻熟女毛片av久久网站| 亚洲精品乱久久久久久| 欧美成人精品欧美一级黄| 边亲边吃奶的免费视频| 黄色毛片三级朝国网站| 亚洲国产日韩一区二区| 天美传媒精品一区二区| 精品酒店卫生间| 看免费av毛片| www.av在线官网国产| 亚洲精品av麻豆狂野| 国产在线免费精品| 9191精品国产免费久久| 中文字幕人妻丝袜制服| 国内精品宾馆在线| 国产成人精品无人区| 亚洲欧美清纯卡通| 中文字幕另类日韩欧美亚洲嫩草| 观看美女的网站| 男人添女人高潮全过程视频| 91国产中文字幕| 久久久久网色| 国产精品.久久久| 高清av免费在线| 国产一区有黄有色的免费视频| 七月丁香在线播放| 夜夜爽夜夜爽视频| www.熟女人妻精品国产 | 欧美日韩视频高清一区二区三区二| 18禁国产床啪视频网站| 人人妻人人添人人爽欧美一区卜| 精品酒店卫生间| 美女福利国产在线| 欧美日韩一区二区视频在线观看视频在线| 久久精品久久精品一区二区三区| 午夜福利视频在线观看免费| 波多野结衣一区麻豆| 久久午夜福利片| 99re6热这里在线精品视频| 亚洲精品久久午夜乱码| 精品酒店卫生间| 91精品伊人久久大香线蕉| 免费av不卡在线播放| 精品久久久精品久久久| 亚洲欧美精品自产自拍| 狂野欧美激情性bbbbbb| 18在线观看网站| 99热全是精品| 香蕉国产在线看| 天堂俺去俺来也www色官网| 欧美日韩视频精品一区| 久久精品国产亚洲av天美| 亚洲av.av天堂| 九色亚洲精品在线播放| 免费高清在线观看视频在线观看| 水蜜桃什么品种好| 日本免费在线观看一区| 亚洲欧美清纯卡通| 熟女av电影| 搡女人真爽免费视频火全软件| 999精品在线视频| 这个男人来自地球电影免费观看 | 香蕉精品网在线| 亚洲,欧美,日韩| 亚洲情色 制服丝袜| 亚洲伊人色综图| 成人亚洲欧美一区二区av| 免费少妇av软件| 国产精品久久久久久久电影| 久久久久视频综合| www日本在线高清视频| 成年动漫av网址| 美女脱内裤让男人舔精品视频| 丝袜人妻中文字幕| 日日爽夜夜爽网站| 国产毛片在线视频| 黄色毛片三级朝国网站| 亚洲人成77777在线视频| 久久ye,这里只有精品| a级片在线免费高清观看视频| 黄片播放在线免费| 人妻 亚洲 视频| 国产高清国产精品国产三级| 国产毛片在线视频| 日韩伦理黄色片| 亚洲人与动物交配视频| 国产高清国产精品国产三级| 嫩草影院入口| 欧美激情国产日韩精品一区| 色吧在线观看| 欧美精品亚洲一区二区| 制服丝袜香蕉在线| 国语对白做爰xxxⅹ性视频网站| 亚洲成av片中文字幕在线观看 | 免费大片黄手机在线观看| 久久ye,这里只有精品| 不卡视频在线观看欧美| 纵有疾风起免费观看全集完整版| 国产精品久久久久久av不卡| 国产不卡av网站在线观看| 少妇的丰满在线观看| 日韩电影二区| 我的女老师完整版在线观看| 久热这里只有精品99| 国产精品秋霞免费鲁丝片| 亚洲少妇的诱惑av| 午夜日本视频在线| 人妻少妇偷人精品九色| 制服诱惑二区| 青春草国产在线视频| 欧美人与性动交α欧美精品济南到 | 高清不卡的av网站| 大香蕉久久网| 大香蕉97超碰在线| 最近最新中文字幕大全免费视频 | 日韩电影二区| 久久久久人妻精品一区果冻| 日韩欧美一区视频在线观看| 狂野欧美激情性xxxx在线观看| 国产欧美亚洲国产| 国产综合精华液| 老司机影院毛片| 亚洲欧美日韩卡通动漫| 精品熟女少妇av免费看| 老司机亚洲免费影院| 午夜日本视频在线| 黄色视频在线播放观看不卡| 亚洲精品日韩在线中文字幕| 亚洲欧美日韩另类电影网站| 国产 一区精品| 女的被弄到高潮叫床怎么办| 91国产中文字幕| 春色校园在线视频观看| 精品国产国语对白av| 另类精品久久| 黑丝袜美女国产一区| 精品一区二区三区四区五区乱码 | 自线自在国产av| 最近最新中文字幕大全免费视频 | 国产不卡av网站在线观看| 国产亚洲欧美精品永久| 精品人妻在线不人妻| 午夜免费鲁丝| 亚洲欧美成人精品一区二区| 王馨瑶露胸无遮挡在线观看| 99国产综合亚洲精品| a 毛片基地| 国产福利在线免费观看视频| 日本爱情动作片www.在线观看| 90打野战视频偷拍视频| 性色avwww在线观看| 日韩av不卡免费在线播放| 久久国内精品自在自线图片| 中文欧美无线码| 欧美亚洲日本最大视频资源| 天天躁夜夜躁狠狠久久av| 国产成人欧美| 欧美人与性动交α欧美精品济南到 | 边亲边吃奶的免费视频| 在现免费观看毛片| 人人妻人人爽人人添夜夜欢视频| 自拍欧美九色日韩亚洲蝌蚪91| 欧美97在线视频| 亚洲av男天堂| 成年av动漫网址| 久久久亚洲精品成人影院| 男男h啪啪无遮挡| 赤兔流量卡办理| 国国产精品蜜臀av免费| 午夜精品国产一区二区电影| 免费播放大片免费观看视频在线观看| 亚洲精品久久成人aⅴ小说| 国产精品免费大片| 国产精品.久久久| 热re99久久国产66热| 国产精品 国内视频| 99热全是精品| 一级毛片 在线播放| av黄色大香蕉| 国产视频首页在线观看| 午夜免费观看性视频| 亚洲色图综合在线观看| 久久国产精品大桥未久av| 99热6这里只有精品| 欧美日韩成人在线一区二区| 丝袜喷水一区| 日韩中文字幕视频在线看片| 亚洲,欧美,日韩| 日本爱情动作片www.在线观看| 国产精品人妻久久久久久| 咕卡用的链子| 欧美最新免费一区二区三区| 麻豆乱淫一区二区| 日韩人妻精品一区2区三区| 国产欧美日韩一区二区三区在线| 日韩伦理黄色片| 一区二区日韩欧美中文字幕 | 免费久久久久久久精品成人欧美视频 | 纯流量卡能插随身wifi吗| 国产精品人妻久久久影院| 青春草视频在线免费观看| 看免费av毛片| 黄色一级大片看看| 久久久久精品性色| 婷婷色麻豆天堂久久| 极品少妇高潮喷水抽搐| www.色视频.com| 尾随美女入室| 天美传媒精品一区二区| 精品福利永久在线观看| 一边摸一边做爽爽视频免费| 亚洲av男天堂| 国产色婷婷99| 久久97久久精品| 国产精品一区二区在线观看99| 欧美成人午夜精品| 免费高清在线观看视频在线观看| a级毛色黄片| 国产男女超爽视频在线观看| 国产精品女同一区二区软件| 国产色婷婷99| 亚洲精品久久久久久婷婷小说| xxxhd国产人妻xxx| 国产精品久久久av美女十八| 街头女战士在线观看网站| 最后的刺客免费高清国语| 亚洲人成77777在线视频| 毛片一级片免费看久久久久| 欧美xxⅹ黑人| 熟妇人妻不卡中文字幕| 桃花免费在线播放| 亚洲丝袜综合中文字幕| 99九九在线精品视频| 欧美日韩综合久久久久久| xxxhd国产人妻xxx| 大话2 男鬼变身卡| av女优亚洲男人天堂| 日韩制服骚丝袜av| 久久精品国产鲁丝片午夜精品| 人人澡人人妻人| 亚洲,欧美精品.| 91精品伊人久久大香线蕉| 免费人妻精品一区二区三区视频| 晚上一个人看的免费电影| 国产激情久久老熟女| 久久亚洲国产成人精品v| 老司机影院成人| 国产黄频视频在线观看| 免费人成在线观看视频色| 五月玫瑰六月丁香| h视频一区二区三区| 26uuu在线亚洲综合色| 国产精品一国产av| 黄色视频在线播放观看不卡| 日韩熟女老妇一区二区性免费视频| 丝袜美足系列| 欧美老熟妇乱子伦牲交| 国产男女内射视频| 久久这里有精品视频免费| 我的女老师完整版在线观看| 中文字幕制服av| 国产极品天堂在线|