
through which Hacker can trade off the framework. As
indicated by our discoveries from various fields, we ought to
have utilized solid passwords that can't be speculated. What is
more is that we utilize the secret key generator because toward
section 3, there is a calculation and if the programmer knows
the rationale of secret phrase even one secret key, then it will
likewise start a danger. We have additionally talked about the
contextual analysis of NEXUS innovation, the association that
confronted DDOS assault and how they secure their servers and
safety measures after the assault. By putting these protections
in place and regularly scanning the network for threats, 5G
systems may improve their security posture and offer
consumers and companies a safer and more dependable
communication infrastructure. The study concludes by
highlighting the urgent need for cooperation among IoT device
manufacturers, network operators, and regulators to address the
security issues brought on by DDoS attacks on IoT devices. A
secure and resilient IoT-enabled future can be created by
effectively implementing security best practices, ongoing
monitoring, and quick incident response. Sensors can defend
IoT systems contrary to denial-of-service assaults.
The ability of IDS to provide immediate warnings and response
mechanisms is critical for future direction and successful
mitigation of DDoS attacks. This lessens the impact on usability
and network efficiency. Although we have made significant
progress in countering DDoS attacks in 5G internet of things
systems, there remains a few avenues we may pursue. These
include developing adaptable and autonomous learning
systems, looking for ways to identify zero-day assaults, and
researching sophisticated models of machine learning for
intrusion detection systems. It is a wise decision to incorporate
blockchain technology, intrusion detection technologies within
Internet of Things (IoT) devices since this will assist defend 5G
systems from DDoS attacks. Advancements in this domain are
essential to guarantee the longevity and accessibility of critical
amenities as the number of 5G-enabled and interconnected
devices keep expanding. We strongly recommend more
research and cooperation in this field to stay ahead of growing
cyberthreats and safeguard the confidentiality of 5G networks
in the future.
References
[1] I. Ahmad, S. Shahabuddin, T. Kumar, J. Okwuibe, A.
Gurtov, and M. Ylianttila, "Security for 5G and
beyond," IEEE Communications Surveys & Tutorials,
vol. 21, no. 4, pp. 3682-3722, 2019.
[2] P. M. Chanal and M. S. Kakkasageri, "Security and
privacy in IOT: a survey," Wireless Personal
Communications, vol. 115, pp. 1667-1693, 2020.
[3] J. Singh and S. Behal, "Detection and mitigation of
DDoS attacks in SDN: A comprehensive review,
research challenges and future directions," Computer
Science Review, vol. 37, p. 100279, 2020.
[4] M. Gniewkowski, "An overview of DoS and DDoS
attack detection techniques," in Theory and
Applications of Dependable Computer Systems:
Proceedings of the Fifteenth International Conference
on Dependability of Computer Systems DepCoS-
RELCOMEX, June 29–July 3, 2020, Brunów, Poland
15, 2020: Springer, pp. 233-241.
[5] A. Aminu Ghali, R. Ahmad, and H. S. A. Alhussian,
"Comparative analysis of DoS and DDoS attacks in
Internet of Things environment," in Artificial
Intelligence and Bioinspired Computational Methods:
Proceedings of the 9th Computer Science On-line
Conference 2020, Vol. 2 9, 2020: Springer, pp. 183-
194.
[6] A. R. a. Yusof, N. I. Udzir, and A. Selamat,
"Systematic literature review and taxonomy for DDoS
attack detection and prediction," International Journal
of Digital Enterprise Technology, vol. 1, no. 3, pp.
292-315, 2019.
[7] E. Navruzov and A. Kabulov, "Detection and analysis
types of DDoS attack," in 2022 IEEE International
IOT, Electronics and Mechatronics Conference
(IEMTRONICS), 2022: IEEE, pp. 1-7.
[8] S. Arif, M. A. Khan, S. U. Rehman, M. A. Kabir, and
M. Imran, "Investigating smart home security: Is
blockchain the answer?," IEEE Access, vol. 8, pp.
117802-117816, 2020.
[9] F. Hussain, S. G. Abbas, M. Husnain, U. U. Fayyaz, F.
Shahzad, and G. A. Shah, "IoT DoS and DDoS attack
detection using ResNet," in 2020 IEEE 23rd
International Multitopic Conference (INMIC), 2020:
IEEE, pp. 1-6.
[10] R. Vishwakarma and A. K. Jain, "A survey of DDoS
attacking techniques and defence mechanisms in the
IoT network," Telecommunication systems, vol. 73,
no. 1, pp. 3-25, 2020.
[11] I. Cvitić, D. Peraković, M. Periša, and M. Botica,
"Novel approach for detection of IoT generated DDoS
traffic," Wireless Networks, vol. 27, no. 3, pp. 1573-
1586, 2021.
[12] E. Džaferović, A. Sokol, A. Abd Almisreb, and S. M.
Norzeli, "DoS and DDoS vulnerability of IoT: a
review," Sustainable Engineering and Innovation, vol.
1, no. 1, pp. 43-48, 2019.
[13] F. A. F. Silveira, F. Lima-Filho, F. S. D. Silva, A. d.
M. B. Junior, and L. F. Silveira, "Smart detection-IoT:
A DDoS sensor system for Internet of Things," in 2020
international conference on systems, signals and
image processing (IWSSIP), 2020: IEEE, pp. 343-348.
[14] D. Fang, Y. Qian, and R. Q. Hu, "Secure and Efficient
Mobility Management in 5G Wireless Networks,"
2024.
[15] M. A. Al-Garadi, A. Mohamed, A. K. Al-Ali, X. Du,
I. Ali, and M. Guizani, "A survey of machine and deep
learning methods for internet of things (IoT) security,"
IEEE Communications Surveys & Tutorials, vol. 22,
no. 3, pp. 1646-1685, 2020.
[16] N. Ahuja, G. Singal, D. Mukhopadhyay, and N.
Kumar, "Automated DDOS attack detection in
software defined networking," Journal of Network and
Computer Applications, vol. 187, p. 103108, 2021.
[17] A. Ahmed, S. Jabbar, M. M. Iqbal, M. Ibrar, A. Erbad,
and H. Song, "An Efficient Hierarchical Mobile IPv6
Group-Based BU Scheme for Mobile Nodes in IoT
Network," IEEE Internet of Things Journal, vol. 10,
no. 10, pp. 8684-8695, 2022.
[18] C. Fan, N. M. Kaliyamurthy, S. Chen, H. Jiang, Y.
Zhou, and C. Campbell, "Detection of DDoS attacks
International Journal of Electrical Engineering and Computer Science
DOI: 10.37394/232027.2024.6.11
Umar Danjuma Maiwada, Shahbaz Ali Imran,
Kamaluddeen Usman Danyaro, Aftab Alam Janisar,
Anas Salameh, Aliza Bt Sarlan