Abstract

The fifth-generation (5G) mobile networks target a variety of new use cases that involve a massive amount of heterogeneous devices connected to the same infrastructure. This trend also brings new security threats, and one of the most critical ones for the availability of network services is a Distributed Denial of Service (DDoS) attack. A small portion of the billions of connected devices can be employed as a botnet to trigger a massive DDoS flooding attack that can bring down important services or affect the complete infrastructure. Traditional security systems against DDoS attacks are generally designed to work in infrastructures with a particular topology. However, the mobility of many devices subscribed to the network should be taken into account when designing defence systems. Otherwise, both the detection and the trace back of the attacker will be limited to non-mobile devices as the source of the attack. This is specially relevant when security needs to be part of the definition of the network slices associated to the 5G networks. This paper presents a novel approach to overcome the limitation of traditional detection systems. A novel sensor provides the required information to trace back an attacker even if it is moving among different locations. The proposed approach is suitable to be deployed in almost all 5G network segments including the Edge. Architectural design is described and empirical experiments have validated the proposed approach.
Original languageEnglish
Title of host publicationEuropean Conference on Network and Communication
Number of pages5
Publication statusAccepted/In press - 15 Apr 2019
EventEuropean Conference on Networks and Communications - Valencia, Spain
Duration: 18 Jun 201921 Jun 2019
https://www.eucnc.eu/

Conference

ConferenceEuropean Conference on Networks and Communications
Abbreviated titleEUCNC 2019
CountrySpain
CityValencia
Period18/06/1921/06/19
Internet address

Fingerprint

Architectural design
Security systems
Wireless networks
Topology
Availability
Sensors
Experiments
Denial-of-service attack
Botnet

Keywords

  • 5G Network
  • DDoS Attack
  • Mobile botnet
  • Attacker traceback

Cite this

@inproceedings{923c9b4cb21a46a1a3c1647a9c87f707,
title = "Towards the detection of mobile DDoS attacks in 5G multi-tenant networks",
abstract = "The fifth-generation (5G) mobile networks target a variety of new use cases that involve a massive amount of heterogeneous devices connected to the same infrastructure. This trend also brings new security threats, and one of the most critical ones for the availability of network services is a Distributed Denial of Service (DDoS) attack. A small portion of the billions of connected devices can be employed as a botnet to trigger a massive DDoS flooding attack that can bring down important services or affect the complete infrastructure. Traditional security systems against DDoS attacks are generally designed to work in infrastructures with a particular topology. However, the mobility of many devices subscribed to the network should be taken into account when designing defence systems. Otherwise, both the detection and the trace back of the attacker will be limited to non-mobile devices as the source of the attack. This is specially relevant when security needs to be part of the definition of the network slices associated to the 5G networks. This paper presents a novel approach to overcome the limitation of traditional detection systems. A novel sensor provides the required information to trace back an attacker even if it is moving among different locations. The proposed approach is suitable to be deployed in almost all 5G network segments including the Edge. Architectural design is described and empirical experiments have validated the proposed approach.",
keywords = "5G Network, DDoS Attack, Mobile botnet, Attacker traceback",
author = "{Serrano Mamolar}, Ana and Zeeshan Pervez and Qi Wang and {Alcaraz Calero}, {Jose M.}",
year = "2019",
month = "4",
day = "15",
language = "English",
booktitle = "European Conference on Network and Communication",

}

Serrano Mamolar, A, Pervez, Z, Wang, Q & Alcaraz Calero, JM 2019, Towards the detection of mobile DDoS attacks in 5G multi-tenant networks. in European Conference on Network and Communication. European Conference on Networks and Communications, Valencia, Spain, 18/06/19.

Towards the detection of mobile DDoS attacks in 5G multi-tenant networks. / Serrano Mamolar, Ana; Pervez, Zeeshan; Wang, Qi; Alcaraz Calero, Jose M.

European Conference on Network and Communication. 2019.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Towards the detection of mobile DDoS attacks in 5G multi-tenant networks

AU - Serrano Mamolar, Ana

AU - Pervez, Zeeshan

AU - Wang, Qi

AU - Alcaraz Calero, Jose M.

PY - 2019/4/15

Y1 - 2019/4/15

N2 - The fifth-generation (5G) mobile networks target a variety of new use cases that involve a massive amount of heterogeneous devices connected to the same infrastructure. This trend also brings new security threats, and one of the most critical ones for the availability of network services is a Distributed Denial of Service (DDoS) attack. A small portion of the billions of connected devices can be employed as a botnet to trigger a massive DDoS flooding attack that can bring down important services or affect the complete infrastructure. Traditional security systems against DDoS attacks are generally designed to work in infrastructures with a particular topology. However, the mobility of many devices subscribed to the network should be taken into account when designing defence systems. Otherwise, both the detection and the trace back of the attacker will be limited to non-mobile devices as the source of the attack. This is specially relevant when security needs to be part of the definition of the network slices associated to the 5G networks. This paper presents a novel approach to overcome the limitation of traditional detection systems. A novel sensor provides the required information to trace back an attacker even if it is moving among different locations. The proposed approach is suitable to be deployed in almost all 5G network segments including the Edge. Architectural design is described and empirical experiments have validated the proposed approach.

AB - The fifth-generation (5G) mobile networks target a variety of new use cases that involve a massive amount of heterogeneous devices connected to the same infrastructure. This trend also brings new security threats, and one of the most critical ones for the availability of network services is a Distributed Denial of Service (DDoS) attack. A small portion of the billions of connected devices can be employed as a botnet to trigger a massive DDoS flooding attack that can bring down important services or affect the complete infrastructure. Traditional security systems against DDoS attacks are generally designed to work in infrastructures with a particular topology. However, the mobility of many devices subscribed to the network should be taken into account when designing defence systems. Otherwise, both the detection and the trace back of the attacker will be limited to non-mobile devices as the source of the attack. This is specially relevant when security needs to be part of the definition of the network slices associated to the 5G networks. This paper presents a novel approach to overcome the limitation of traditional detection systems. A novel sensor provides the required information to trace back an attacker even if it is moving among different locations. The proposed approach is suitable to be deployed in almost all 5G network segments including the Edge. Architectural design is described and empirical experiments have validated the proposed approach.

KW - 5G Network

KW - DDoS Attack

KW - Mobile botnet

KW - Attacker traceback

M3 - Conference contribution

BT - European Conference on Network and Communication

ER -