An Authentication Scheme to Defend Against UDP DrDoS Attacks in 5G Networks

被引:8
|
作者
Huang, Haiou [1 ,2 ]
Hu, Liang [1 ]
Chu, Jianfeng [1 ]
Cheng, Xiaochun [3 ]
机构
[1] Jilin Univ, Coll Comp Sci & Technol, Changchun, Peoples R China
[2] Jilin Agr Sci & Technol Univ, Coll Elect & Informat Engn, Jilin, Jilin, Peoples R China
[3] Middlesex Univ, Dept Comp Commun, London NW4 4BT, England
来源
IEEE ACCESS | 2019年 / 7卷
关键词
Authentication; distributed reflection denial of service (DrDoS); network time protocol (NTP); user datagram protocol (UDP); 5G; INTERNET;
D O I
10.1109/ACCESS.2019.2957565
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
5th generation wireless systems are coming. While we are excited about the delay-free high speeds 5G will bring, security problems are becoming more and more serious. Increasingly rampant Distributed Denial of service (DDoS) attacks, particularly Distributed Reflection Denial of Service (DrDoS) attacks with User Datagram Protocols (UDPs) have developed into a global problem. This article presents a design, implementation, analysis, and experimental evaluation of an authentication scheme, a defense against UDP DrDoS attacks, by which attackers cleverly use rebound server farms to bounce a flood of packets to a target host. We call our solution IEWA because it combines the concepts of increasing expenses and weak authentication. In this paper, we apply IEWA to Network Time Protocol (NTP). First, we simulate and compare the original and improved protocols. Next, we verify the effectiveness of our proposed scheme. We show that our improved scheme is safer than the original scheme. Finally, we compare our solution with existing state-of-the-art schemes, using indicators such as communication overhead, server storage costs, client storage costs, computation costs of server and computation costs of client. We find that our scheme improves system stability and security, reduces communication overhead, server storage cost and computational costs. Our solution not only improves the NTP protocol to mitigate DrDoS attacks, but also strengthens other UDP protocols that are vulnerable to DrDoS attacks. Therefore, our solution can be used as a solution to UDP DrDoS attacks in 5G Networks.
引用
收藏
页码:175970 / 175979
页数:10
相关论文
共 50 条
  • [1] Preventing DRDoS Attacks in 5G Networks: a New Source IP Address Validation Approach
    Chen, Xu
    Feng, Wei
    Ma, Yinglun
    Ge, Ning
    Wang, xianbin
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [2] Attacks Against Mobility Prediction in 5G Networks
    Al Atiiq, Syafiq
    Yuan, Yachao
    Gehrmann, Christian
    Sternby, Jakob
    Barriga, Luis
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1502 - 1511
  • [3] Attacks Against Mobility Prediction in 5G Networks
    Atiiq, Syafiq Al
    Yuan, Yachao
    Gehrmann, Christian
    Sternby, Jakob
    Barriga, Luis
    Proceedings - 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom/BigDataSE/CSE/EUC/iSCI 2023, 2023, : 1502 - 1511
  • [4] Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks
    Braeken, An
    Liyanage, Madhusanka
    Kumar, Pardeep
    Murphy, John
    IEEE ACCESS, 2019, 7 : 64040 - 64052
  • [5] Autonomic protection of multi-tenant 5G mobile networks against UDP flooding DDoS attacks
    Mamolar, Ana Serrano
    Salva-Garcia, Pablo
    Chirivella-Perez, Enrique
    Pervez, Zeeshan
    Calero, Jose M. Alcaraz
    Wang, Qi
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 145
  • [6] Attacks against Machine Learning Models in 5G Networks
    Zolotukhin, Mikhail
    Zhang, Di
    Miraghaie, Parsa
    Hamalainen, Timo
    Ke, Wang
    Dunderfelt, Marja
    2022 6TH EUROPEAN CONFERENCE ON ELECTRICAL ENGINEERING & COMPUTER SCIENCE, ELECS, 2022, : 106 - 114
  • [7] An Agreement Graph-Based-Authentication Scheme for 5G Networks
    Gharam, Maroua
    Boudriga, Noureddine
    UBIQUITOUS NETWORKING, UNET 2017, 2017, 10542 : 509 - 520
  • [8] Game-theoretic Modeling of Hybrid Defense Strategies against DRDoS Traffic in 5G Networks
    Guo, Chaojie
    Wang, Shen
    Rong, Xin
    Tao, Xiaofeng
    ICC 2024 - IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2024, : 4650 - 4655
  • [9] A Group-oriented Authentication Scheme for IoT Devices in 5G Networks
    Guo, Qili
    Lai, Chengzhe
    Ma, Haoyan
    Zheng, Dong
    2023 19TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING, MSN 2023, 2023, : 699 - 706
  • [10] SEMS-5G: A Secure and Efficient Multi-Server Authentication Scheme for 5G Networks
    Irshad, Azeem
    Alreshoodi, Mohammed
    IEEE ACCESS, 2024, 12 : 49062 - 49077