Security Concerns of IoT Against DDoS in 5G Systems
UMAR DANJUMA MAIWADA2, SHAHBAZ ALI IMRAN1, KAMALUDDEEN USMAN DANYARO2, AFTAB
ALAM JANISAR2, ANAS SALAMEH3, ALIZA BT SARLAN2
1Department of Software Engineering Bahria university Islamabad campus Islamabad, PAKISTAN
2Department of Computer and Information Science Universiti Teknologi Petronas, MALAYSIA
3Department of management Information System college of business administration Prince Sattam bin Abdulaziz
University, SAUDI ARABIA
Abstract: The Internet of Things (IoT), which enables seamless connectivity and communication between gadgets and the internet
has completely changed how people interact with and use technology in 5G. Distributed Denial of Service (DDoS) assaults are
now recognized as a serious security concern because of the rapid expansion of IoT devices, which has also brought about new
security issues. DDoS attacks plan massive, coordinated attacks that overwhelm target systems and impair their functions by taking
advantage of the interconnectedness of IoT devices. This paper explores the vulnerabilities in IoT devices and their possible
exploitation by hostile actors, providing an in-depth examination of IoT and DDoS assault dynamics in 5G. The report emphasizes
the need for preventative security measures by highlighting the growing size and complexity of DDoS attacks employing
compromised IoT botnets. The examination of various DDoS attack channels and methodologies against IoT devices sheds light
on the growing strategies used by attackers to infiltrate and manage IoT botnets. To emphasize how urgent it is to mitigate such
risks, the effects of DDoS assaults on vital infrastructures, companies, and end-users are also emphasized. The paper also evaluates
current mitigation techniques and security safeguards intended to counter IoT-based DDoS attacks. These include the use of
security in Nexus that prioritize device authentication, encryption, and secure communication protocols as well as network traffic
filtering and anomaly detection. Relevant case studies and real-world examples are provided to give readers a thorough
understanding of the topic while demonstrating the scope and effects of recent IoT-based DDoS attacks. The paper guides different
approaches through which DDOS can harm the server/ system (or anything, which is belonging to the family of the Internet of
things) through different types; DDOS can be minimized but impossible to overcome. In this paper, we also have proved that due
to IOT, the ratio of DDOS has increased by implementing these measures and continuously monitoring the network for potential
threats. 5G systems can enhance their security posture and provide a safer and more reliable communication infrastructure for users
and businesses by mitigating DDoS.
Keywords: Internet of things (IoT), DDOS, class assignment for the subject of ARE, 5G, ID and Nexus.
Received: March 16, 2023. Revised: November 28, 2023. Accepted: January 11, 2024. Published: March 26, 2024.
1. Introduction
IoT devices in 5G face distinct security challenges due to their
massive numbers, diverse communication protocols, and
constrained resources. These devices often have limited
processing power and memory, making them susceptible to
resource depletion attacks. Furthermore, the sheer volume and
heterogeneity of IoT devices in 5G networks create
complexities in ensuring uniform security standards and
updates across the ecosystem [1]. Presently, multi day's web is
broadly utilized everywhere throughout the world.
Correspondence is simple; everybody can speak with one
another everywhere throughout the world free of expense.
Indeed, even as IOT is present, we can deal with our homes IP
and in addition shutting/opening the entryway through remote
by giving them the IP address and the other way around [2]. As
we know, everything accompanies a cost like IOT by giving the
IP to everything the traded off proportion has, likewise
expanded due to which calamities accompanies inadvertent
blow-back. For example, in case of DDOS which must be made
a condition.
1.1 DDOS Introduction
DDOS (Distributed denial of service attack) is a sort of DOS
(denial of service attack) assault. In which aggressor tosses the
broad heap of movement from numerous sources to trade off a
focused-on framework/server [3].
1.2 Difference between DOS and DDOS
In DOS, there is just a single source from where the assault has
been created and trade off the specific framework/server or
anything, which are remote access or has a place with the
Internet of things family [4].
On the other hand, in DDOS, the sources are numerous; the
traded off/contaminated frameworks, with a Trojan, are
normally used to focus on a solitary wanted or specific
framework by tossing the huge measure of movement from
different sources [5].
1.3 DIFFERENT TYPES OF DDOS:
Here we discussed three types of DDOs attacks (1) Volume-
Based ATTACKS, (2) Protocol Attacks, (3) Application layer
ATTACKS [6].
1.3.1Volume Based attacks:
In this sort of DDOs assault ICMP, UDP and numerous other
parodied parcels surge is included. The genuine objective of
this assault is to overabundance the site's transfer speed, which
is being under assault. The estimation of data transfer capacity
is in bits every second (BPS) [6].
International Journal of Electrical Engineering and Computer Science
DOI: 10.37394/232027.2024.6.11
Umar Danjuma Maiwada, Shahbaz Ali Imran,
Kamaluddeen Usman Danyaro, Aftab Alam Janisar,
Anas Salameh, Aliza Bt Sarlan
E-ISSN: 2769-2507
98
Volume 6, 2024
1.3.2 Protocol attack.
In this assault, dangerous (pings of death) and SYN Floods are
included to expend the assets (genuine assets) of the
framework [6].
1.3.3 Application layer attack:
Includes Get/post for the most part moderate. The objective of
these assaults is Apache, firewalls and so forth. Results server
smashed [6].
1.3.4 DDOS SPECIFIC TYPES
There are more particular kinds of DDOS assaults accessible
and some of them are specified here SYN Flood, client
Datagram convention, SLOWLORIS. However, our
fundamental concentration and worry about are POD, is called
Ping of Death. In POD, attackers send diverse sorts of mistake-
based pings to the framework. IP bundle Length is a colossal
number of unsigned int (65,535) as it may be, the reason is
Ethernet systems can just acknowledge a breaking point of 1500
bytes which is sent by the Data Link layer with countless
bundles parts into various sections. There are unit winds up with
a flood of memory allotted for IP bundles and this is the reason
for DDOS [7].
2. Literature review
To understand the deep knowledge of internet of things and
DDOs we have studied different journals and research. [8] In
Blockchain for IoT Security and Privacy: According to the
writers of the case study issue of a Smart Home magazine, IoT
security is currently receiving a lot of attention from both the
academic and business communities. The high vitality
consumption and handling overhead of current security systems
make them ill-suited for the Internet of Things. They have
previously suggested a method that addresses these issues by
making use of Bitcoin BC, a permanent database of squares.
The idea of assigning contextual analysis to a brilliant home
was discussed. In [9], they discussed the various exchanges and
tactics associated with it while illuminating the various center
sections of the magnificent home level. They also demonstrated
a thorough examination of its safety and security. Their
recreation results exhibit that the overheads brought about by 0
10 20 30 40 50 60 70 80 Base BC-based Store Transaction Time
Period Store Transaction Query-Based Access Transaction
Time (ms). Assessment of time overhead. 56.3 56.32 56.34
56.36 56.38 56.4 56.42 56.44 56.46 56.48 56.5 56.52 Access
Store-Query Store-Period Base Idea BC-based CPU Tx Lx
CPU Tx Lx CPU Tx Lx Base Idea 0.0103 0.0102 56.3489
0.0117 0.0357 56.3393 0.0121 0.0549 56.3645 BC-based
0.0127 0.0834 56.3496 0.0132 0.1106 56.3379 0.0133 0.1166
56.3657 Consumed Energy (MJ). Evaluation of energy
consumption in different rush hour traffic streams reveals that
their approach is modest and reasonable for low-asset IoT
devices. They concluded that, considering the significant
security and protection advantages they provide, these
overheads are warranted regardless of their weight. To the
utmost of our understanding, this analysis is the main effort
aimed at enhancing BC's smart homes. They looked into how
these systems might be used in various IoT spaces in further
studies. [10] concentrated on the security design and security
issues of IoT and have isolated IoT into three layers:
recognition layer, transportation layer, and application layer.
They looked at each layer's highlights and security
vulnerabilities and offered the appropriate, regular solutions for
these problems. Meanwhile, by examining the innovation
incorporated, they also examined the salient features of these
unique arrangements. The security implications of RFID
innovations and their corresponding arrangements, such as
uniform coding, collision avoidance, RFID privacy protection,
and trust management, were analyzed for the recognition layer.
Next, they looked at the security concerns and specialized
protocols in WSNs, such as cryptographic algorithms, key
management, secure routing protocols, cryptographic
algorithms, and trust handling for nodes in WSNs. They
dissected the new challenges associated with the RSN, which is
managing the integration of RFID and WSNs, after looking at
RFID and WSNs. [11] As the IoT framework needs to deal with
gigantic heterogeneous information from various sources, they
additionally dissected cross-layer heterogeneous incorporation
issues and security issues in detail. The transportation layer
comprises of the entrance organize, center system, and
neighborhood. They dissected security problems with WiFi, ad
hoc and 3G arrangements, and their associated advancements in
arrangement in the entrance organize. The neighborhood's
malfunctioning system allows for control over innovation in
understanding the security risk associated with the misuse of
unlawfully arranged assets. They also thoroughly dissected the
fundamental security issues and its practical layout for security
issues. Use pattern layer and IoT layer of application to make
up the application layer. They have looked at security concerns
related to the use of the bolster layer, such as potential threats,
interference with benefits, and attack issues, as well as review-
related concerns. Other IoT layers cannot resolve the security
challenges associated with application layer security because it
is application related. So, they have presented some common
place IoT applications, for example, Intelligent Transportation
and Smart Home and examined their comparing security issues
and related advancements, for example, organize control
innovation, interchanges innovation, and portable terminal
innovation [12]. At last, they looked at security issues between
IoT and conventional system and inferred that IoT framework
lives in a more hazardous condition with restricted assets and
less system monitors, along these lines lightweight
arrangements would dependably be their first decisions for IoT
security. They additionally talked about opening security issues
of IoT as an unbreakable element and give some potential
headings for these issues: generally speaking, security design
for the whole IoT framework, lightweight security
arrangements and productive answers for gigantic
heterogeneous information [13].
DDoS attacks can exploit these vulnerabilities by inundating
IoT devices with a deluge of traffic, overwhelming their
capacity to function normally. In a 5G environment, the high
bandwidth and low latency can amplify the impact of DDoS
attacks, leading to widespread service disruptions,
compromised data integrity, and potential financial losses [14].
Moreover, the interconnected nature of IoT devices can allow
DDoS attacks to propagate rapidly, affecting critical
infrastructure and services [15]. utilizing machine learning
techniques to spot unusual trends in network traffic and device
activity, which enables the early identification of possible
DDoS attacks. Through utilizing blockchain-based methods,
International Journal of Electrical Engineering and Computer Science
DOI: 10.37394/232027.2024.6.11
Umar Danjuma Maiwada, Shahbaz Ali Imran,
Kamaluddeen Usman Danyaro, Aftab Alam Janisar,
Anas Salameh, Aliza Bt Sarlan
E-ISSN: 2769-2507
99
Volume 6, 2024
they can provide reliable identification of devices with
verification whilst mitigating the probability of unlicensed
usage along with compromising accuracy. They employ
dynamic security mechanisms enabling accessibility, which
periodically alter permissions upon real-time vulnerability
evaluations to lessen the effect from DDoS assaults. By using
continual traffic tracking methods to identify and mitigate
aberrant traffic movements, they stop DDoS assaults against
interfering via Internet of Things systems. Reducing delay and
increasing sensitivity towards possible DDoS assaults are made
possible by the use of edge computing, putting risk evaluation
along with response technologies near to Internet of Things
devices [16]. The major (DDoS) assault impacted government
agencies and jeopardized traffic management systems inside the
facilities of a linked metropolis supported by 5G connectivity.
The hacking incident took use of flaws within IoT gadgets and
produced significant technical and economic impacts. The
imperative to prioritize privacy in design, install firmware
often, and incorporate effective authentication methods to
safeguard IoT gadgets from any denial-of-service assaults [11].
After the contrary, employ traffic evaluation methods, mutual
susceptibility transaction, along with network segmentation to
identify and stop DDoS attacks involving IoT gadgets that
utilize 5G networks. Establish secure, one-of-a-kind login
credentials, divide together IoT gadgets over various
connections, and update IoT gadget firmware often to lessen the
impact of any DDoS assaults [17]. However, rather than serving
as a modelling tool for IoT systems in a 5G context, the model
is focused on a vehicular context. IoT devices will be able to
converse and share data more quickly than ever with 5G
networks. However, this development is probably going to
make the systems more susceptible to security risks, such as
those posed by malicious nodes. Researchers have presented
novel 5G network-compatible solutions to several of the
security challenges. For instance, they suggested an effective
access control system that addresses the issue of a single feature
bottleneck to prevent unwanted action within the network. By
2024, there will be 17 million DDoS attacks, with the typical
DDoS attack size reaching 1 Gbps. Since it takes a lot of
resources to produce efficient attacks, there were not many
huge points to point service (PPS) attacks in prior years. The
prevalence of IoT devices, the majority of which are unsecured,
has led to an increase in high intensity attacks. Multivector
attacks using botnets notably Mirai, Brickerbot, Reaper, and so
on are becoming more common. It is challenging to detect and
mitigate these threats since they change over time. Attackers are
using more potent botnets made up of embedded, IoT, and
cloud servers that have been misused.
Figure 1: https://www.slideshare.net/skim71/ddos-attack-on-dns-
using-infected-iot-devices
2.1 CASE STUDY
Our team studied Nexus Technologies, a firm that recently
suffered a devastating DDoS attack, to increase awareness
concerning IoT security and DDoS mitigation. To strengthen
Nexus Technologies' cybersecurity defenses, this study sought
to pinpoint the vulnerabilities that allowed for these kinds of
assaults and to examine the company's post-event reaction.
2.1.1 Discovering Nexus Technologies: The opportunity to
conduct this case study arose when (Shahbaz Ali Imran) was
working at Nexus Technologies and personally witnessed the
impact of the DDoS attack. Realizing the gravity of the
situation, the organization acknowledged the urgency to
address their security shortcomings. With over 26,000 clients,
including major organizations like HEC, Nexus Technologies
held substantial responsibility for safeguarding sensitive data.
During our investigation, we consulted the Senior Server
Administrator, who helped us identify the past mistakes and
weaknesses that had left the organization susceptible to cyber
threats.
2.1.2 Identifying Weaknesses: One of the significant
weaknesses revealed during the case study was the absence of
load balancers in the organization's infrastructure. Nexus
Technologies operated approximately 93 UNIX servers, each
hosting more than 900 websites. The lack of load balancers left
the servers vulnerable to DDoS attacks, causing catastrophic
consequences during the incident [18].
2.1.3 Flawed Server Clustering: Another critical
vulnerability we discovered was the outdated server clustering
configuration, implemented over 16 years ago. In this
configuration, each server acted as both parent and child,
enabling DNS changes from any server to impact all others.
This design flaw led to nine servers crashing simultaneously
during the DDoS attack, exacerbating the impact on the
organization's services [19].
2.1.4 Security Measurement Gaps: During post-incident
investigation, significant security measurement flaws within
Nexus Technologies were discovered. The security of the
servers had not been reviewed since the initial configuration.
International Journal of Electrical Engineering and Computer Science
DOI: 10.37394/232027.2024.6.11
Umar Danjuma Maiwada, Shahbaz Ali Imran,
Kamaluddeen Usman Danyaro, Aftab Alam Janisar,
Anas Salameh, Aliza Bt Sarlan
E-ISSN: 2769-2507
100
Volume 6, 2024
The most concerning aspect was the use of a program that
generated passwords that had been compromised. This issue
highlights the lack of regular security audits and monitoring of
vulnerabilities as it was created by an intruder who succeeded
in hacking into the login credentials generator's technique on
infected servers [20].
2.1.5 Measures Taken to Improve Security: Improving the
security of wireless networks, particularly for 5G systems,
requires implementing several safeguards against potential
threats and vulnerabilities [1].
2.1.6 Load Balancer Deployment: Nexus Technologies
promptly implemented load-balancing systems on every single
93 of its own UNIX servers after analyzing the case study
results. This strategic action decreased the likelihood of server
overloads during potential DDoS assaults by equally dispersing
incoming traffic [21].
2.1.7 Revamping Server Clustering: To increase system
resilience, Nexus Technologies altered the architecture of their
server clustering. The new architecture reduces the potential for
widespread disruptions and diminishes the influence on the
network overall by isolated DNS changes to specific servers
[22].
2.1.8 Strengthening Password Security: To address the
breached password creator vulnerability, the organization
updated its password security protocols. To strengthen the
security of crucial accounts and systems, multi-factor
authentication and strong password regulations were put in
place [2].
2.1.9 Leveraging CVE Resources: Nexus Technologies
regularly used vulnerability and exposure (CVE) resources,
such as mitre.com and mitre.org, to keep apprised of known
vulnerabilities. To assist the organization in staying ahead of
possible threats, these platforms offered comprehensive
susceptibility descriptions, particularly Unique IDs, that were
updated on a regular basis.
At Nexus Methods, the organization's overall network stability
and cybersecurity resilience significantly improved once the
security measures were put in place. Proactive action and a
commitment to bolstering security produced notable benefits
and lessened the effects of DDoS attacks. The effect of DDoS
attacks was significantly reduced by the installation of load
balancers among the 93 UNIX servers [23]. The load balancers
averted server overloads and kept the organization's services
operational during periods of high demand by dividing
incoming traffic equally [24].
2.1.10Enhanced Server Clustering: DNS modifications
were effectively segregated to servers by the redesigned server
clustering architecture. This structural modification reduced the
possibility of large-scale disruptions brought about by
malevolent modifications, increasing network stability and
lessening the effect of subsequent attacks [25].
2.1.11 Fortified Password Security: Sensitive identities and
systems are now better protected thanks to the implementation
of enhanced password security methods including multiple-
factor authorization and strict password restrictions. As
consequence, the amount of attempts at obtaining unauthorized
access has dramatically decreased, lowering the likelihood of
further breaches [22].
2.1.12 Proactive Vulnerability Management: Nexus
Technologies was able to discover and address any concerns
early on thanks to regular security reviews, vulnerability
evaluations, and sensitivity scanning. Using this strategy, the
company was able to stay ahead of developing threats and
quickly install the upgrades and patches required to guard
against known vulnerabilities [26].
2.1.13 Informed Decision Making: Because of the
organization's emphasis on CVE assets, specifically mitre.com
and mitre.org, important information about detected issues and
software safety criteria became accessible. Nexus Systems used
this data to decide upon safety precautions and make software
update decisions [27].
2.1.14 Increased Stakeholder Confidence: The effective
adoption of these security procedures increased stakeholder
trust in Nexus Innovations' competence to safeguard critical
data and precious assets. Consumers, particularly HEC along
with other significant businesses, expressed gratitude for the
increased cybersecurity safeguards and voiced confidence in
the company with regard to their personal information [28].
The case study at Nexus Technologies yielded invaluable
insights into their security vulnerabilities and deficiencies.
Armed with this knowledge, the organization took decisive
action to fortify its cybersecurity measures [29]. The
implementation of load balancers, improved server clustering,
and stronger password security significantly strengthened
Nexus Technologies' resilience against DDoS attacks. Regular
security assessments and reliance on CVE resources ensured
that potential weaknesses were promptly addressed. The
organization's proactive approach and commitment to ongoing
security improvements demonstrate their dedication to
safeguarding their valuable assets and maintaining a secure
environment for their clients and stakeholders.
3. How DDOS ratio is increased due to
IOT, HERE is the proof:
As the number of IOT devices increases IP’s will also be
increased
So, we can say that IOT is directly proportional IP’s.
T I eq (1)
IOT IPs
The larger the number of IOT devices the greater the threat of
DDOS
S 1/T eq (2)
security IOT
If security decreases DDOS or DOS threat will increase. Let’s
take DDOS as D
S 1/D eq (3)
International Journal of Electrical Engineering and Computer Science
DOI: 10.37394/232027.2024.6.11
Umar Danjuma Maiwada, Shahbaz Ali Imran,
Kamaluddeen Usman Danyaro, Aftab Alam Janisar,
Anas Salameh, Aliza Bt Sarlan
E-ISSN: 2769-2507
101
Volume 6, 2024
Security DDOS
Let’s take k (small) as a constant #2
Now let’s solve the equation 2 and 3
S 1/T, S 1/D
S = 1/T (eq 4)
S = 1/D (eq 5)
As security is common in both equations so we can write EQ 4
and EQ 5 as
1/T= 1/D (eq 6)
We can write eq 6 as
1*D = 1*T (eq 6)
Then the new equation becomes
D=T (eq7)
We can also write eq 7 as
D T Proved
As T P
(Where T denotes IOT, and I denote IP) so the new equation
becomes.
T D and I D
The above equation clearly shows that IOT is directly
proportional to DDOS.
Figure 2: methodology flow
According to figure 2 above, this approach is superior to others
since it addresses the safety of IoT devices in 5G networks from
all angles. 5G technology offers more functionality for network
segmentation, reliable communication needs, including
improved device identification across previous network
protocols. These developments strengthen the basis of IoT
systems and increase its resilience against DDoS assaults. This
technique uses proactive risk assessment methods, real-time
channel evaluation, and adaptive access control to solve the
problems caused by DDoS assaults within the context of both
5G plus IoT. 5G's fast speeds, low latency, while IoT-specific
security standards make it possible to quickly identify and stop
DDoS attacks. The result lessens the chance that vital IoT
applications may be interrupted. By offering safe gadget
identification, actual time assault reaction; however, an
efficient DDoS assault identification helps these developments
significantly by reinforcing the general safety procedures for
IoT gadgets in 5G systems. The method we used considerably
enhances the management of attacks with DDoS for IoT
scenarios as opposed to prior security protocols. When it comes
to identifying legitimate and malicious IoT distribution,
previous systems that had possession of real-time information
about vulnerabilities sometimes had difficulties because of the
vast volume and range of IoT gadgets. Figure 3 below illustrates
how a 5G systems enabled approach gets around these
drawbacks and provides improved defenses over DDoS assaults
by fusing the inherent characteristics of 5G connectivity with
state-of-the-art security measures developed specifically for
IoT scenarios.
Figure 3: IoT vs DDoS in 5G Systems
4. Improved Security in 5g IΟΤ Systems
The use of robust techniques for authentication, including
credential verification and multiple-factor authentication,
called 2FA, to assure only those who are authorized can access
internet resources. Install access control procedures after
stopping unwanted individuals from gaining access to private
data and amenities. TLS and other confidential communication
protocols must be present to protect data flows through gadgets
and the network's elements. This prevents interception and
transmission manipulation. These systems employ IDPS
approaches, which analyze traffic on the network for aberrant
activity and possible risks to detect anomalies and respond
quickly to combat fraudulent activities and attacks. Network
segmentation, which divides the network into lighter, more
isolated sections, was adopted by Hene to prevent hackers from
moving diagonally in case of a breach. Through the creation of
discrete Internet connections for various uses, network slicing
can enhance resource security and isolation. This helps securely
virtualize network functions and implement security measures
to protect virtualized resources from attacks. Regular update
and patch virtualized network elements are needed to mitigate
known vulnerabilities. Then employing continuous monitoring
tools to detect and respond to security incidents promptly. By
utilizing threat, intelligence feeds will stay updated on the latest
threats and vulnerabilities, enabling proactive security
measures. Since conducting regular security training and
awareness programs for users and network administrators will
give update. Educating them about best security practices, the
International Journal of Electrical Engineering and Computer Science
DOI: 10.37394/232027.2024.6.11
Umar Danjuma Maiwada, Shahbaz Ali Imran,
Kamaluddeen Usman Danyaro, Aftab Alam Janisar,
Anas Salameh, Aliza Bt Sarlan
E-ISSN: 2769-2507
102
Volume 6, 2024
importance of strong passwords, and how to identify and report
suspicious activities is required. By ensuring that all devices
and network components receive regular security updates and
patches to address known vulnerabilities then there is need to
implement a secure OTA mechanism to distribute updates
securely. To implement mechanisms by verifying the integrity
of connected devices, we ensure that they haven't been
tampered with or compromised. This can be done through
hardware-based attestation or secure boot procedures. There is
a need to securely store and protect physical network
components, such as base stations and routers, to prevent
unauthorized access and tampering. Finally, the development of
a comprehensive incident response plan to outline the steps to
be taken in case of a security breach or cyberattack to plan
should include strategies for containment, eradication, and
recovery.
Figure 4: Application matrics table
In figure 4, IoT devices in 5G networks present unique
vulnerabilities due to their large attack surface, limited
computational resources, and diverse communication protocols
in a DDoS attack. These devices can be overwhelmed with a
flood of malicious traffic, disrupting their connectivity, and
impacting critical services within the network.
Figure 5: flow of IoT network
To safeguard IoT devices from DDoS attacks in 5G networks
from figure 5 between time and throughput, it is crucial to
explore advanced technologies such as NETSIM-based
anomaly detection, blockchain for secure device authentication,
and adaptive access control mechanisms. There is need for the
utilization of Low latency in 5G and an increase in bandwidth
for the protocols of IoT to strengthen devices and protect them
against assaults.
Figure 6: link matrics
Scenarios of attack like that of multiple DDoS needs to be
simulated for 5G and find vulnerabilities by testing IoT devices.
Using the connection matrices in figure 6, we can simulate
various DDoS attacks, such as volumetric, rules, and
application layer attacks, to assess the durability of IoT devices
and improve response mechanisms to effectively counter these
threats. Defenses are needed for IoT devices from the hardware
level and 5G's network at the software level to provide solution
against the assault of DDoS. This entails putting in place
reliable traffic filtering methods, deploying IoT-specific
systems for identifying and preventing intrusions, and
incorporating flexible policies for access control to react
quickly to changing security risks.
Figure 7: IoT network against DDoS
Large-scale DDoS attacks on IoT networks in 5G can have
severe implications as seen in figure 7, potentially disrupting
critical services and compromising data integrity. To ensure
continuous operation during such events, it is essential to
develop redundancy measures, distributed traffic filtering
capabilities, and rapid response protocols to mitigate the impact
of these attacks and maintain the integrity of IoT services within
the 5G ecosystem.
5. Conclusion
In this paper, we have demonstrated that because of IOT, the
proportion of DDOS increments through scientific conditions
has been improved. Before IOT, regardless the IP has
information that is being exchanged, for example, PC's and so
forth, however, the issue is these things called fans and lights
are imperiled effectively and are DDOS that happens to harm
the record so effortlessly. While the proportion of DDOS were
not all that high before IOT, IT is on account of individuals, for
the most part, utilizing a solid secret word and have less
utilization of secret key generator calculation. After IOT, when
the exchange of information is begun once again from IPs, we
utilize default secret phrases like Username: Admin, Password:
Admin and so on. They are anything but difficult to figure
International Journal of Electrical Engineering and Computer Science
DOI: 10.37394/232027.2024.6.11
Umar Danjuma Maiwada, Shahbaz Ali Imran,
Kamaluddeen Usman Danyaro, Aftab Alam Janisar,
Anas Salameh, Aliza Bt Sarlan
E-ISSN: 2769-2507
103
Volume 6, 2024
through which Hacker can trade off the framework. As
indicated by our discoveries from various fields, we ought to
have utilized solid passwords that can't be speculated. What is
more is that we utilize the secret key generator because toward
section 3, there is a calculation and if the programmer knows
the rationale of secret phrase even one secret key, then it will
likewise start a danger. We have additionally talked about the
contextual analysis of NEXUS innovation, the association that
confronted DDOS assault and how they secure their servers and
safety measures after the assault. By putting these protections
in place and regularly scanning the network for threats, 5G
systems may improve their security posture and offer
consumers and companies a safer and more dependable
communication infrastructure. The study concludes by
highlighting the urgent need for cooperation among IoT device
manufacturers, network operators, and regulators to address the
security issues brought on by DDoS attacks on IoT devices. A
secure and resilient IoT-enabled future can be created by
effectively implementing security best practices, ongoing
monitoring, and quick incident response. Sensors can defend
IoT systems contrary to denial-of-service assaults.
The ability of IDS to provide immediate warnings and response
mechanisms is critical for future direction and successful
mitigation of DDoS attacks. This lessens the impact on usability
and network efficiency. Although we have made significant
progress in countering DDoS attacks in 5G internet of things
systems, there remains a few avenues we may pursue. These
include developing adaptable and autonomous learning
systems, looking for ways to identify zero-day assaults, and
researching sophisticated models of machine learning for
intrusion detection systems. It is a wise decision to incorporate
blockchain technology, intrusion detection technologies within
Internet of Things (IoT) devices since this will assist defend 5G
systems from DDoS attacks. Advancements in this domain are
essential to guarantee the longevity and accessibility of critical
amenities as the number of 5G-enabled and interconnected
devices keep expanding. We strongly recommend more
research and cooperation in this field to stay ahead of growing
cyberthreats and safeguard the confidentiality of 5G networks
in the future.
References
[1] I. Ahmad, S. Shahabuddin, T. Kumar, J. Okwuibe, A.
Gurtov, and M. Ylianttila, "Security for 5G and
beyond," IEEE Communications Surveys & Tutorials,
vol. 21, no. 4, pp. 3682-3722, 2019.
[2] P. M. Chanal and M. S. Kakkasageri, "Security and
privacy in IOT: a survey," Wireless Personal
Communications, vol. 115, pp. 1667-1693, 2020.
[3] J. Singh and S. Behal, "Detection and mitigation of
DDoS attacks in SDN: A comprehensive review,
research challenges and future directions," Computer
Science Review, vol. 37, p. 100279, 2020.
[4] M. Gniewkowski, "An overview of DoS and DDoS
attack detection techniques," in Theory and
Applications of Dependable Computer Systems:
Proceedings of the Fifteenth International Conference
on Dependability of Computer Systems DepCoS-
RELCOMEX, June 29–July 3, 2020, Brunów, Poland
15, 2020: Springer, pp. 233-241.
[5] A. Aminu Ghali, R. Ahmad, and H. S. A. Alhussian,
"Comparative analysis of DoS and DDoS attacks in
Internet of Things environment," in Artificial
Intelligence and Bioinspired Computational Methods:
Proceedings of the 9th Computer Science On-line
Conference 2020, Vol. 2 9, 2020: Springer, pp. 183-
194.
[6] A. R. a. Yusof, N. I. Udzir, and A. Selamat,
"Systematic literature review and taxonomy for DDoS
attack detection and prediction," International Journal
of Digital Enterprise Technology, vol. 1, no. 3, pp.
292-315, 2019.
[7] E. Navruzov and A. Kabulov, "Detection and analysis
types of DDoS attack," in 2022 IEEE International
IOT, Electronics and Mechatronics Conference
(IEMTRONICS), 2022: IEEE, pp. 1-7.
[8] S. Arif, M. A. Khan, S. U. Rehman, M. A. Kabir, and
M. Imran, "Investigating smart home security: Is
blockchain the answer?," IEEE Access, vol. 8, pp.
117802-117816, 2020.
[9] F. Hussain, S. G. Abbas, M. Husnain, U. U. Fayyaz, F.
Shahzad, and G. A. Shah, "IoT DoS and DDoS attack
detection using ResNet," in 2020 IEEE 23rd
International Multitopic Conference (INMIC), 2020:
IEEE, pp. 1-6.
[10] R. Vishwakarma and A. K. Jain, "A survey of DDoS
attacking techniques and defence mechanisms in the
IoT network," Telecommunication systems, vol. 73,
no. 1, pp. 3-25, 2020.
[11] I. Cvitić, D. Peraković, M. Periša, and M. Botica,
"Novel approach for detection of IoT generated DDoS
traffic," Wireless Networks, vol. 27, no. 3, pp. 1573-
1586, 2021.
[12] E. Džaferović, A. Sokol, A. Abd Almisreb, and S. M.
Norzeli, "DoS and DDoS vulnerability of IoT: a
review," Sustainable Engineering and Innovation, vol.
1, no. 1, pp. 43-48, 2019.
[13] F. A. F. Silveira, F. Lima-Filho, F. S. D. Silva, A. d.
M. B. Junior, and L. F. Silveira, "Smart detection-IoT:
A DDoS sensor system for Internet of Things," in 2020
international conference on systems, signals and
image processing (IWSSIP), 2020: IEEE, pp. 343-348.
[14] D. Fang, Y. Qian, and R. Q. Hu, "Secure and Efficient
Mobility Management in 5G Wireless Networks,"
2024.
[15] M. A. Al-Garadi, A. Mohamed, A. K. Al-Ali, X. Du,
I. Ali, and M. Guizani, "A survey of machine and deep
learning methods for internet of things (IoT) security,"
IEEE Communications Surveys & Tutorials, vol. 22,
no. 3, pp. 1646-1685, 2020.
[16] N. Ahuja, G. Singal, D. Mukhopadhyay, and N.
Kumar, "Automated DDOS attack detection in
software defined networking," Journal of Network and
Computer Applications, vol. 187, p. 103108, 2021.
[17] A. Ahmed, S. Jabbar, M. M. Iqbal, M. Ibrar, A. Erbad,
and H. Song, "An Efficient Hierarchical Mobile IPv6
Group-Based BU Scheme for Mobile Nodes in IoT
Network," IEEE Internet of Things Journal, vol. 10,
no. 10, pp. 8684-8695, 2022.
[18] C. Fan, N. M. Kaliyamurthy, S. Chen, H. Jiang, Y.
Zhou, and C. Campbell, "Detection of DDoS attacks
International Journal of Electrical Engineering and Computer Science
DOI: 10.37394/232027.2024.6.11
Umar Danjuma Maiwada, Shahbaz Ali Imran,
Kamaluddeen Usman Danyaro, Aftab Alam Janisar,
Anas Salameh, Aliza Bt Sarlan
E-ISSN: 2769-2507
104
Volume 6, 2024
in software defined networking using entropy,"
Applied Sciences, vol. 12, no. 1, p. 370, 2021.
[19] J. O. Nehinbe and U. S. Onyeabor, "An exhaustive
study of DDOS attacks and DDOS datasets,"
International Journal of Internet Technology and
Secured Transactions, vol. 10, no. 3, pp. 268-285,
2020.
[20] H. F. Atlam and G. B. Wills, "IoT security, privacy,
safety and ethics," Digital twin technologies and smart
cities, pp. 123-149, 2020.
[21] K. Sood, M. R. Nosouhi, D. D. N. Nguyen, F. Jiang,
M. Chowdhury, and R. Doss, "Intrusion Detection
Scheme With Dimensionality Reduction in Next
Generation Networks," IEEE Transactions on
Information Forensics and Security, vol. 18, pp. 965-
979, 2023.
[22] Y. Xiao, Y. Jia, C. Liu, X. Cheng, J. Yu, and W. Lv,
"Edge computing security: State of the art and
challenges," Proceedings of the IEEE, vol. 107, no. 8,
pp. 1608-1631, 2019.
[23] S. Black and Y. Kim, "An overview on detection and
prevention of application layer DDoS attacks," in 2022
IEEE 12th Annual Computing and Communication
Workshop and Conference (CCWC), 2022: IEEE, pp.
0791-0800.
[24] R. J. Thomas and T. Chothia, "Learning from
vulnerabilities-categorising, understanding and
detecting weaknesses in industrial control systems," in
Computer Security: ESORICS 2020 International
Workshops, CyberICPS, SECPRE, and ADIoT,
Guildford, UK, September 1418, 2020, Revised
Selected Papers 6, 2020: Springer, pp. 100-116.
[25] R. Burton, "Characterizing Certain DNS DDoS
Attacks," arXiv preprint arXiv:1905.09958, 2019.
[26] T. Horak, P. Strelec, L. Huraj, P. Tanuska, A.
Vaclavova, and M. Kebisek, "The vulnerability of the
production line using industrial IoT systems under
ddos attack," Electronics, vol. 10, no. 4, p. 381, 2021.
[27] G. Nebbione and M. C. Calzarossa, "Security of IoT
application layer protocols: Challenges and findings,"
Future Internet, vol. 12, no. 3, p. 55, 2020.
[28] N. Z. Bawany and J. A. Shamsi, "SEAL: SDN based
secure and agile framework for protecting smart city
applications from DDoS attacks," Journal of Network
and Computer Applications, vol. 145, p. 102381,
2019.
[29] S. Siddique, M. A. Haque, R. H. Rifat, R. George, K.
Shujaee, and K. D. Gupta, "Cyber Security issues in
the industrial applications of digital twins," in 2023
IEEE Symposium Series on Computational
Intelligence (SSCI), 2023: IEEE, pp. 873-878.
International Journal of Electrical Engineering and Computer Science
DOI: 10.37394/232027.2024.6.11
Umar Danjuma Maiwada, Shahbaz Ali Imran,
Kamaluddeen Usman Danyaro, Aftab Alam Janisar,
Anas Salameh, Aliza Bt Sarlan
E-ISSN: 2769-2507
105
Volume 6, 2024
Contribution of Individual Authors to the
Creation of a Scientific Article (Ghostwriting
Policy)
The authors equally contributed in the present
research, at all stages from the formulation of the
problem to the final findings and solution.
Sources of Funding for Research Presented in a
Scientific Article or Scientific Article Itself
No funding was received for conducting this study.
Conflict of Interest
The authors have no conflicts of interest to declare
that are relevant to the content of this article.
Creative Commons Attribution License 4.0
(Attribution 4.0 International, CC BY 4.0)
This article is published under the terms of the
Creative Commons Attribution License 4.0
https://creativecommons.org/licenses/by/4.0/deed.en
_US