IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2022
DOI: 10.1109/infocomwkshps54753.2022.9798301
|View full text |Cite
|
Sign up to set email alerts
|

Identifying DDoS Attack using Split-Machine Learning System in 5G and Beyond Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 18 publications
0
6
0
Order By: Relevance
“…We use data plane flood attack and ping flood attack interchangeably to refer to this attack throughout the paper. • Control plane flood attack: Request flood attacks are common in different types of networks [23], [24]. The second attack that we consider is the registration request flood attack targeting the control plane VNFs [25].…”
Section: Threat Modelmentioning
confidence: 99%
“…We use data plane flood attack and ping flood attack interchangeably to refer to this attack throughout the paper. • Control plane flood attack: Request flood attacks are common in different types of networks [23], [24]. The second attack that we consider is the registration request flood attack targeting the control plane VNFs [25].…”
Section: Threat Modelmentioning
confidence: 99%
“…During a DoS attack, a hacker attempts to consume legitimate network resources or bandwidth. This attack is referred to as a DDoS when it originates from multiple compromised nodes [96] and falls into different categories such as traffic/fragmentation attack, bandwidth attack, and application attack) [97]. Wireless and wired networks are critical to DDoS attacks, which target the network layer [98].…”
Section: Figure 4: Cybersecurity Threats In Perception Layermentioning
confidence: 99%
“…• Data plane flood attack: The first attack scenario is the ping flood attack initiated by the attacking UEs to flood the links of the slice and to exhaust the resources of the data plane VNFs [23]. When the UEs send ping requests, the DN responds with ping replies, further flooding the network links.…”
Section: Threat Modelmentioning
confidence: 99%