Security Concerns of IoT Against DDoS in 5G Systems

U. Maiwada, Shahbaz Ali Imran, K. U. Danyaro, A. Janisar, Anas Salameh, A. Sarlan
{"title":"Security Concerns of IoT Against DDoS in 5G Systems","authors":"U. Maiwada, Shahbaz Ali Imran, K. U. Danyaro, A. Janisar, Anas Salameh, A. Sarlan","doi":"10.37394/232027.2024.6.11","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT), which enables seamless connectivity and communication between gadgets and the internet has completely changed how people interact with and use technology in 5G. Distributed Denial of Service (DDoS) assaults are now recognized as a serious security concern because of the rapid expansion of IoT devices, which has also brought about new security issues. DDoS attacks plan massive, coordinated attacks that overwhelm target systems and impair their functions by taking advantage of the interconnectedness of IoT devices. This paper explores the vulnerabilities in IoT devices and their possible exploitation by hostile actors, providing an in-depth examination of IoT and DDoS assault dynamics in 5G. The report emphasizes the need for preventative security measures by highlighting the growing size and complexity of DDoS attacks employing compromised IoT botnets. The examination of various DDoS attack channels and methodologies against IoT devices sheds light on the growing strategies used by attackers to infiltrate and manage IoT botnets. To emphasize how urgent it is to mitigate such risks, the effects of DDoS assaults on vital infrastructures, companies, and end-users are also emphasized. The paper also evaluates current mitigation techniques and security safeguards intended to counter IoT-based DDoS attacks. These include the use of security in Nexus that prioritize device authentication, encryption, and secure communication protocols as well as network traffic filtering and anomaly detection. Relevant case studies and real-world examples are provided to give readers a thorough understanding of the topic while demonstrating the scope and effects of recent IoT-based DDoS attacks. The paper guides different approaches through which DDOS can harm the server/ system (or anything, which is belonging to the family of the Internet of things) through different types; DDOS can be minimized but impossible to overcome. In this paper, we also have proved that due to IOT, the ratio of DDOS has increased by implementing these measures and continuously monitoring the network for potential threats. 5G systems can enhance their security posture and provide a safer and more reliable communication infrastructure for users and businesses by mitigating DDoS.","PeriodicalId":475274,"journal":{"name":"International Journal of Electrical Engineering and Computer Science","volume":"21 5","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Electrical Engineering and Computer Science","FirstCategoryId":"0","ListUrlMain":"https://doi.org/10.37394/232027.2024.6.11","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The Internet of Things (IoT), which enables seamless connectivity and communication between gadgets and the internet has completely changed how people interact with and use technology in 5G. Distributed Denial of Service (DDoS) assaults are now recognized as a serious security concern because of the rapid expansion of IoT devices, which has also brought about new security issues. DDoS attacks plan massive, coordinated attacks that overwhelm target systems and impair their functions by taking advantage of the interconnectedness of IoT devices. This paper explores the vulnerabilities in IoT devices and their possible exploitation by hostile actors, providing an in-depth examination of IoT and DDoS assault dynamics in 5G. The report emphasizes the need for preventative security measures by highlighting the growing size and complexity of DDoS attacks employing compromised IoT botnets. The examination of various DDoS attack channels and methodologies against IoT devices sheds light on the growing strategies used by attackers to infiltrate and manage IoT botnets. To emphasize how urgent it is to mitigate such risks, the effects of DDoS assaults on vital infrastructures, companies, and end-users are also emphasized. The paper also evaluates current mitigation techniques and security safeguards intended to counter IoT-based DDoS attacks. These include the use of security in Nexus that prioritize device authentication, encryption, and secure communication protocols as well as network traffic filtering and anomaly detection. Relevant case studies and real-world examples are provided to give readers a thorough understanding of the topic while demonstrating the scope and effects of recent IoT-based DDoS attacks. The paper guides different approaches through which DDOS can harm the server/ system (or anything, which is belonging to the family of the Internet of things) through different types; DDOS can be minimized but impossible to overcome. In this paper, we also have proved that due to IOT, the ratio of DDOS has increased by implementing these measures and continuously monitoring the network for potential threats. 5G systems can enhance their security posture and provide a safer and more reliable communication infrastructure for users and businesses by mitigating DDoS.
物联网应对 5G 系统中 DDoS 的安全问题
物联网(IoT)实现了小工具与互联网之间的无缝连接和通信,彻底改变了人们与 5G 技术的交互和使用方式。由于物联网设备的迅速扩展,分布式拒绝服务(DDoS)攻击现已被视为一个严重的安全问题,同时也带来了新的安全问题。DDoS 攻击利用物联网设备的互联性,策划大规模、协调的攻击,使目标系统不堪重负并损害其功能。本文探讨了物联网设备中的漏洞及其可能被敌对行为者利用的情况,对 5G 中的物联网和 DDoS 攻击动态进行了深入研究。报告强调了采取预防性安全措施的必要性,重点指出了利用受损物联网僵尸网络进行 DDoS 攻击的规模和复杂性不断增长。报告对针对物联网设备的各种 DDoS 攻击渠道和方法进行了研究,揭示了攻击者在渗透和管理物联网僵尸网络方面所采用的不断增长的策略。为了强调降低此类风险的紧迫性,本文还强调了 DDoS 攻击对重要基础设施、公司和最终用户的影响。本文还评估了当前旨在应对基于物联网的 DDoS 攻击的缓解技术和安全保障措施。其中包括在 Nexus 中优先使用设备验证、加密和安全通信协议以及网络流量过滤和异常检测等安全措施。本文提供了相关案例研究和现实世界中的实例,让读者全面了解这一主题,同时展示了近期基于物联网的 DDoS 攻击的范围和影响。本文介绍了 DDOS 通过不同类型对服务器/系统(或任何属于物联网大家庭的事物)造成危害的不同方法;DDOS 可以被最小化,但不可能被克服。在本文中,我们也证明了由于物联网的存在,通过实施这些措施并持续监控网络的潜在威胁,DDOS 的比例已经增加。通过缓解 DDoS,5G 系统可以增强其安全态势,为用户和企业提供更安全、更可靠的通信基础设施。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信