Enhancing DDoS Detection in 5G Systems through Advanced Intrusion Detection Techniques
Main Article Content
Abstract
As 5G technology continues to advance, it brings unprecedented opportunities for high-speed connectivity and data transfer. However, the proliferation of 5G also opens new avenues for cyber threats, including Distributed Denial of Service (DDoS) attacks. With the advent of 5G technology, the potential for faster and more efficient communication is undeniable. However, this progress also brings about new challenges, particularly in the realm of security. One of the major threats faced by 5G systems is Distributed Denial of Service (DDoS) attacks, which can cripple network performance and compromise user experience. This paper explores the application of advanced intrusion detection techniques for the detection and mitigation of DDoS attacks in 5G systems. The study investigates the unique characteristics of 5G networks, such as increased bandwidth, low latency, and massive device connectivity, and proposes innovative solutions to enhance DDoS detection capabilities. The research aims to contribute to the development of robust security measures, ensuring the resilience of 5G networks against evolving cyber threats. DDoS attacks can overwhelm network resources and disrupt services, making them a significant concern in 5G systems. This paper presents a comprehensive exploration of DDoS detection techniques within the context of 5G systems, with a specific focus on leveraging Intrusion Detection Techniques (IDS). We delve into the unique challenges posed by 5G networks, such as their increased complexity, massive data flows, and low-latency requirements, and how these challenges impact DDoS detection. Our research examines various IDS methods, including signature-based, anomaly-based, and machine learning-based approaches, to assess their suitability for 5G DDoS detection. Furthermore, we propose novel strategies and enhancements tailored to 5G environments to improve the accuracy and efficiency of DDoS detection. These strategies encompass real-time traffic analysis, behavior profiling, and adaptive response mechanisms. Through empirical experiments and simulations, we evaluate the performance of these techniques in detecting and mitigating DDoS attacks in 5G systems. We assess their effectiveness in terms of detection accuracy, false-positive rates, and resource utilization. In conclusion, this research contributes valuable insights into the challenges and solutions related to DDoS detection in 5G systems using Intrusion Detection Techniques. By addressing these challenges, we aim to enhance the security and resilience of 5G networks, ensuring their continued reliability in the face of evolving cyber threats.
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
How to Cite
References
Anthi, E., et al., A Supervised Intrusion Detection System for Smart Home IoT Devices. IEEE Internet of Things Journal, 2019. 6(5): p. 9042-9053.
Mishra, N. and S. Pandya, Internet of Things Applications, Security Challenges, Attacks, Intrusion Detection, and Future Visions: A Systematic Review. IEEE Access, 2021. 9: p. 59353-59377.
Mufti, Y., et al., A Readiness Model for Security Requirements Engineering. IEEE Access, 2018. 6: p. 28611-28631.
Villamizar, H., et al., A Systematic Mapping Study on Security in Agile Requirements Engineering, in 2018 44th Euromicro Conference on Software Engineering and Advanced Applications (SEAA). 2018. p. 454-461.
MUSTAFA, N., et al., SECURITY REQUIREMENTS TEMPLATE-BASED APPROACH TO IMPROVE THE WRITING OF COMPLETE SECURITY REQUIREMENTS. Journal of Theoretical and Applied Information Technology, 2021. 99(01).
Lal, B. and C.R. Chavan, Analysis Report on Attacks and Defence Modeling Approach to Cyber Security. International Journal of Scientific Research in Science and Technology, 2019: p. 52-60.
Anderson, R., Security engineering: a guide to building dependable distributed systems. 2020: John Wiley & Sons.
Rehman, S.u., C. Allgaier, and V. Gruhn, Security Requirements Engineering: A Framework for Cyber-Physical Systems, in 2018 International Conference on Frontiers of Information Technology (FIT). 2018. p. 315-320.
Khan, R.A. and S.U. Khan. A preliminary structure of software security assurance model. in Proceedings of the 13th International Conference on Global Software Engineering. 2018.
Hu, Y., et al., A survey of intrusion detection on industrial control systems. International Journal of Distributed Sensor Networks, 2018. 14(8).
Nicholson, P., Five most famous DDoS attacks and then some. A10 Networks. Source: https://www. a10networks. com/blog/5-most-famous-ddos-attacks/[accessed 3rd February 2021], 2020.
Sharafaldin, I., et al. Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. in 2019 International Carnahan Conference on Security Technology (ICCST). 2019. IEEE.
Zeebaree, S.R., K. Jacksi, and R.R. Zebari, Impact analysis of SYN flood DDoS attack on HAProxy and NLB cluster-based web servers. Indones. J. Electr. Eng. Comput. Sci, 2020. 19(1): p. 510-517.
Sreeram, I. and V.P.K. Vuppala, HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm. Applied computing and informatics, 2019. 15(1): p. 59-66.
Tuan, T.A., et al., Performance evaluation of Botnet DDoS attack detection using machine learning. Evolutionary Intelligence, 2020. 13: p. 283-294.
Poongodi, M., et al., Intrusion prevention system for DDoS attack on VANET with reCAPTCHA controller using information based metrics. IEEE Access, 2019. 7: p. 158481-158491.
Angrishi, K., Turning internet of things (iot) into internet of vulnerabilities (iov): Iot botnets. arXiv preprint arXiv:1702.03681, 2017.
Rhodes-Ousley, M., Information security the complete reference. 2013: McGraw Hill Professional.
Mcgraw, G., Software Security: Building Security In, ser. 2006, Addison-Wesley Software Security Series. Addison-Wesley.
Zareen, S., A. Akram, and S. Ahmad Khan, Security Requirements Engineering Framework with BPMN 2.0.2 Extension Model for Development of Information Systems. Applied Sciences, 2020. 10(14).
El-Hadary, H. and S. El-Kassas, Capturing security requirements for software systems. J Adv Res, 2014. 5(4): p. 463-72.
Haley, C.B., Arguing security: a framework for analyzing security requirements. 2007, The Open University.
Salini, P. and S. Kanmani, Survey and analysis on Security Requirements Engineering. Computers & Electrical Engineering, 2012. 38(6): p. 1785-1797.
Khan, R.A. and S.U. Khan, A preliminary structure of software security assurance model, in Proceedings of the 13th International Conference on Global Software Engineering. 2018. p. 137-140.
Sharma, A. and P.K. Misra, Aspects of enhancing security in software development life cycle. Advances in Computational Sciences and Technology, 2017. 10(2): p. 203-210.
Karim, N.S.A., et al., The practice of secure software development in SDLC: an investigation through existing model and a case study. Security and Communication Networks, 2016. 9(18): p. 5333-5345.
Lee, Y. and G. Lee, HW-CDI: Hard-wired control data integrity. IEEE Access, 2019. 7: p. 10811-10822.
Hussain, B., et al., Deep learning-based DDoS-attack detection for cyber–physical system over 5G network. IEEE Transactions on Industrial Informatics, 2020. 17(2): p. 860-870.
Rezvy, S., et al. An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks. in 2019 53rd Annual Conference on information sciences and systems (CISS). 2019. IEEE.
Alladi, T., et al., Artificial intelligence (AI)-empowered intrusion detection architecture for the internet of vehicles. IEEE Wireless Communications, 2021. 28(3): p. 144-149.
Chettri, L. and R. Bera, A comprehensive survey on Internet of Things (IoT) toward 5G wireless systems. IEEE Internet of Things Journal, 2019. 7(1): p. 16-32.
Dong, S., K. Abbas, and R. Jain, A survey on distributed denial of service (DDoS) attacks in SDN and cloud computing environments. IEEE Access, 2019. 7: p. 80813-80828.
Gurusamy, D., et al., DDoS risk in 5G enabled IoT and solutions. International Journal of Engineering and Advanced Technology, 2019. 8(5): p. 1574-1578.