
Export Tables from Access to PostgreSQL
This article describes how to export a table from Access DB to postgresql via excel and python.
(Mayzaud, Badonnel, & Chrisment, 2016 3) classified the attacks as shown in Figure 2.15 in their article on attacks on the RPL protocol.
Attacks on resources result in unnecessary operations to consume the resources of normal nodes through vulnerable nodes or nodes in DODAG. With this attack, the energy or memory on the node is consumed, or the processor is run out of steam. With this type of attack, the life of the network is exhausted in a very short time than desired. (Mayzaud, Badonnel, & Chrisment, 20163))
In direct attacks, the vulnerable node is directly responsible for the depletion of resources. Typically, this can be done when storage mode is enabled, by performing flooding attacks or by performing overload attacks based on routing tables. (Mayzaud, Badonnel, & Chrisment, 2016 3)
This attack is done by announcing fake routes using DAO messages that fill the routing table of the targeted node. This saturation prevents the creation of new normal pathways and affects the functioning of the network. (Mayzaud, Badonnel, & Chrisment, 20163)
Overflow attacks involve generating significant traffic on a network and rendering nodes and connections unavailable. All or some network nodes can run out of resources in these attacks. These types of messages can also be called a HELLO-Flood attack. We can carry it out in two ways:
Both situations lead to network congestion, as well as saturation of RPL nodes. (Mayzaud, Badonnel, & Chrisment, 20163)
Malicious node attacks cause other nodes to overload the network.
In the RPL network, each node is associated with a sequence value and corresponds to its position in the graph structure relative to the root node. As mentioned in the second section, the node order is always increasing downstream to maintain the non-cyclical structure of DODAG. Therefore, the rank of a node must always be greater than the rank of the parent node. This type of attack occurs when the vulnerable node reports a higher queue value than it should. (Mayzaud, Badonnel, & Chrisment, 20163)
The purpose of this attack is to force the vulnerable node to reset the DIO drip timer of the targeted node. In this case, this node begins to transmit DIO messages more often, creating local instability in the RPL network. This also consumes the battery of the nodes and affects the availability of connections. (Mayzaud, Badonnel, & Chrisment, 20163)
The DODAG version number is an ordered counter that is incremented by the root to create a new version of a DODAG. A DODAG Version is uniquely identified by its title (in the RPL Event ID, DODAG ID, DODAG Version Number). The version number is incremented only by the root. DODAG needs to be restructured when it is increased, which is also called general repair. An older value indicates that the node has not been moved to the new DODAG graph and cannot be used as a parent node. When a vulnerable node changes the version number and forwards it to its neighbors, the entire DODAG graph is unnecessarily regenerated. Successive unnecessary reconfigurations of DODAG significantly increase message overhead, consume node resources as shown in figure 2.17, and clog up the network. (Mayzaud, Badonnel, & Chrisment, 20163)
It is accomplished by having the vulnerable node declare routes to nodes that are not in the sub-DODAG. Therefore, it can cause longer network latency, packet drops, or network congestion. (Mayzaud, Badonnel, & Chrisment, 20163)
Such an attack takes place in two steps. First, the malicious node manages to attract a lot of traffic by advertising fake information data (for example, uplinks and downlinks of superior quality). Then, after receiving the traffic illegitimately, it changes or leaves it. (Mayzaud, Badonnel, & Chrisment, 20163)
Wormhole attacks can be defined as the use of a pair of RPL attacker nodes (nodes A and B) that are interconnected by a private network connection. an example is shown in Figure 2.18. In this scenario, each packet received by node 4 is forwarded to node 5 through the wormhole for later replay. Because the tasks are interchangeable, node 4 can perform the same operations as node 5. In the case of wireless networks, it is easier to carry out this attack. This attack disrupts the routing path. If an attacker tunnels routing information to another part of the network, that is, to nodes that are actually far away, they will see each other as if they were side by side. As a result, they can create routes that are not optimized according to the purpose function. (Mayzaud, Badonnel, & Chrisment, 20163)
This attack occurs when a vulnerable node records valid control messages from other nodes and then forwards them to the network. (Mayzaud, Badonnel, & Chrisment, 2016 3)
Isolation attacks are on the inability of any node or group of nodes in DODAG to communicate with other nodes.
In a black hole attack, the vulnerable node, as depicted in figure 2.19, drops all the packets it needs to transmit. This attack can be very damaging when combined with a sinkhole attack that causes a large portion of traffic to be lost. It can be seen as a type of denial of service (DoS) attack. If the attacker is strategically located in the graph, he can isolate several nodes from the network. (Mayzaud, Badonnel, & Chrisment, 2016)
At the time DODAG occurs, a node may have a downward route previously learned from a DAO message, but this route may no longer be valid in the child node’s routing table. In this case, RPL provides a mechanism called DAO inconsistency loop recovery to resolve DAO message inconsistencies. This attack occurs through the abuse of this mechanism. (Mayzaud, Badonnel, & Chrisment, 2016 3)
RPL relates to attacks that target network traffic.
The pervasive nature of RPL networks can facilitate the deployment of malicious nodes that perform eavesdropping activities such as sniffing and analyzing network traffic. (Mayzaud, Badonnel, & Chrisment, 20163)
Sniffing attack consists of listening for packets transmitted over the network. This attack is very common in wired and wireless networks and compromises the confidentiality of communication , which is difficult to detect due to the passive nature of this attack. The only way to prevent sniff is through encryption. (Mayzaud, Badonnel, & Chrisment, 20163)
Traffic analysis aims to retrieve routing information using the characteristics and patterns of traffic on a link. This attack can be carried out even if the packets are encrypted. The goal is to gather information about the RPL network, such as a partial view of the topology, by identifying parent/child relationships, such as sniffing attacks. Thanks to this attack, a malicious node can probably carry out other attacks with the information collected. The results depend on the degree of the attacker. If this is close to the root node, it can handle a large amount of traffic and therefore receive more information than if the node is located on the edge of a child DODAG. (Mayzaud, Badonnel, & Chrisment, 20163)
Misappropriation attacks usurp the identity of a legitimate node or demand excessive performance. These attacks are not very harmful to the RPL network per se. However, they are often used as a first step for other attacks, such as those seen in the previous two main categories. They allow the attacker to better understand the network and its topology, gain better access, or intercept a large portion of traffic. (Mayzaud, Badonnel, & Chrisment, 20163)
When a malicious node announces an abnormally lower rank, it will exceed its performance. As a result, many legitimate nodes are connected to the DODAG graph through the attacker. (Mayzaud, Badonnel, & Chrisment, 20163)
This attack does not harm a network, but combining it with other building blocks can be very effective because it allows the attacker to tunnel some traffic through the malicious node (for example, eavesdropping).An attacker could sniff network traffic to determine the root node. When this identification is carried out, DODAG can spoof the address of its root and take control over the network. (Mayzaud, Badonnel, & Chrisment, 20163)
1. Le, A., Loo, J., Luo, Y., & Lasebae, A. (2011). Specification-based IDS for securing RPL from topology attacks. 2011 IFIP Wireless Days (WD), 1-3. doi:10.1109/WD.2011.6098218 (Back)
2. Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., . . . Alexander, R. (Mart 2012). RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. Internet Engineering Task Force. https://www.hjp.at/doc/rfc/rfc6550.html adresinden alındı (Back)
3. Mayzaud, A., Badonnel, R., & Chrisment, I. (2016). A Taxonomy of Attacks in RPL-based Internet. International Journal of Network Security, ACEEE a Division of Engineers Network, 459 – 473. https://hal.inria.fr/hal-01207859/document (Back)
This article describes how to export a table from Access DB to postgresql via excel and python.
In this blog post, the Flooding Attack, Decreased Rank Attack and Version Number Increase Attack in the RPL protocol were trained and detected by “Decision Tree”, “Logistic Regression”, “Random Forest”, “Naive Bayes”, “K Nearest Neighbor” and “Artificial Neural Networks” algorithms.
The test results for the attacks were compared, as a result of the comparison, the Artificial Neural Networks algorithm with an accuracy rate of 97.2% in the detection of Flooding Attacks, the K Nearest Neighbor algorithm with an accuracy rate of 81% in the detection of Version Number Increase Attacks, and the Artificial Neural Networks with an accuracy rate of 58% in the detection of Decreased Rank attacks algorithm has been found to show success.
I continue to share how I did my master’s thesis titled Comparison of Machine Learning Algorithms for the Detection of Vulnerability of RPL-Based IoT Devices, my experiences in this process, and the codes in this thesis in a series of articles on my blog.
So far, I have provided detailed information about the RPL protocol and the attacks that take place in the RPL protocol. Then, I experimented with Flooding Attacks, Version Number Increased Attack, and Decreased Rank Attack, extracting the raw data and making sense of that raw data. I compared the results of experiments with weak knots with statistical methods.
In this section, I will interpret the numerical results of the attacks we detect with machine learning algorithms.