Skip to main content

Mathematical Analysis of DDoS Attacks in SDN-based 5G

  • Conference paper
  • First Online:
Towards new e-Infrastructure and e-Services for Developing Countries (AFRICOMM 2022)

Abstract

Data transmission in a high speed is the most requested by every internet user. Fortunately, the implementation of the fifth-generation (5G) cellular network was carried out by Verizon in 2019 to ameliorate and overcome some challenges of the 4G cellular networks. Software-defined networking (SDN) as a good networking prototype of the hour extremely welcomed the 5G to render the full performance of itself. Unluckily, the best integration of SDN and 5G is seriously being confronted the Distributed Denial of Service (DDoS) attacks day in and day out. The goal of this paper is to analyse the DDoS attacks in the SDN-based 5G technology. Hence, a proposed VIS (Vulnerable-Infected-Secured) epidemic model is provided to investigate the security issues posed by DDoS attacks in SDN-based 5G. In this paper, the mathematical formulation for the epidemic VIS model was developed. The equilibria points, DDoS-free equilibrium, basic reproduction number and stabilities of DDoS-free equilibria were provided in MATLAB.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Santos, G.L., Endo, P.T., Sadok, D., Kelner, J.: When 5G meets deep learning: a systematic review. Algorithms 13(9), 208 (2020)

    Article  Google Scholar 

  2. Dutta, A., Hammad, E.: 5G security challenges and opportunities: a system approach. In: 2020 IEEE 3rd 5G World Forum (5GWF), pp. 109–114. IEEE (2020)

    Google Scholar 

  3. GSA: 794 organisations are deploying LTE or 5G Private Mobile Networks worldwide. Press Release published by Global mobile Suppliers Association, under 5G, Manufacturing, Market Research/Analysis, Small Cells, 15 Jun 2022. https://www.cambridgewireless.co.uk/news/2022/jun/15/gsa-794-organisations-are-deploying-lte-or-5g-priv/

  4. Rosen, M.: Driving the digital agenda requires strategic architecture (2015)

    Google Scholar 

  5. Aujla, G.S., Singh, M., Bose, A., Kumar, N., Han, G., Buyya, R.: BlocksDN: blockchain-as-a-service for software defined networking in smart city applications. IEEE Netw. 34(2), 83–91 (2020)

    Article  Google Scholar 

  6. Accelerating the 5G future of business, 25 February 2020. https://www.accenture.com/us-en/insights/communications-media/accelerating-5g-future-business

  7. Dzik, S.: COVID-19 convalescent plasma: now is the time for better science. Transfus. Med. Rev. 34(3), 141 (2020)

    Article  Google Scholar 

  8. Gündoğan, C., Amsüss, C., Schmidt, T.C., Wählisch, M.: Content object security in the internet of things: challenges, prospects, and emerging solutions. IEEE Trans. Netw. Serv. Manage. 19(1), 538–553 (2021)

    Article  Google Scholar 

  9. Dahiya, D.: DDoS attacks detection in 5G networks: hybrid model with statistical and higher-order statistical features. Cybern. Syst. (2022). https://doi.org/10.1080/01969722.2022.2122002

    Article  Google Scholar 

  10. Dahiya, D.: DDoS attacks detection in 5G networks: hybrid model with statistical and higher-order statistical features. Cybern. Syst. 1–26 (2022)

    Google Scholar 

  11. Wu, P., Yao, L., Lin, C., Wu, G., Obaidat, M.S.: FMD: a DoS mitigation scheme based on flow migration in software-defined networking. Int. J. Commun. Syst. 31(9), e3543 (2018)

    Article  Google Scholar 

  12. Durner, R., Lorenz, C., Wiedemann, M., Kellerer, W.: Detecting and mitigating denial of service attacks against the data plane in software defined networks. In: 2017 IEEE Conference on Network Softwarization (NetSoft), pp. 1–6. IEEE, July 2017

    Google Scholar 

  13. Mohammadi, R., Javidan, R., Conti, M.: Slicots: an SDN-based lightweight countermeasure for TCP SYN flooding attacks. IEEE Trans. Netw. Serv. Manage. 14(2), 487–497 (2017)

    Article  Google Scholar 

  14. Wang, T., Chen, H., Qi, C.: MinDos: a priority-based SDN safe-guard architecture for DoS attacks. IEICE Trans. Inf. Syst. 101(10), 2458–2464 (2018)

    Article  Google Scholar 

  15. Kazmi, S.H.A., Qamar, F., Hassan, R., Nisar, K., Chowdhry, B.S.: Survey on Joint Paradigm of 5G and SDN Emerging Mobile Technologies: Architecture. Security, Challenges and Research Directions (2022)

    Google Scholar 

  16. Chen, M., Qian, Y., Mao, S., Tang, W., Yang, X.: Software-defined mobile networks security. Mob. Netw. Appl. 21(5), 729–743 (2016)

    Article  Google Scholar 

  17. Duan, X., Liu, Y., Wang, X.: SDN enabled 5G-VANET: adaptive vehicle clustering and beamformed transmission for aggregated traffic. IEEE Commun. Mag. 55(7), 120–127 (2017)

    Article  Google Scholar 

  18. Sheibani, M., Konur, S., Awan, I.: DDoS attack detection and mitigation in software-defined networking-based 5G mobile networks with multiple controllers. In: 2022 9th International Conference on Future Internet of Things and Cloud (FiCloud), pp. 32–39. IEEE, August 2022

    Google Scholar 

  19. Yang, L., et al.: Analysis of psychological state and clinical psychological intervention model of patients with COVID-19. MedRxiv (2020)

    Google Scholar 

Download references

Acknowledgement

The authors appreciate the support received from the Africa Centre of Excellence, ICT-Driven Knowledge Park (ACE OAK-Park), OAU, Ile-Ife in funding this research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. O. S. BIAOU .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

BIAOU, B.O.S., Oluwatope, A.O., Ogundare, B.S. (2023). Mathematical Analysis of DDoS Attacks in SDN-based 5G. In: Saeed, R.A., Bakari, A.D., Sheikh, Y.H. (eds) Towards new e-Infrastructure and e-Services for Developing Countries. AFRICOMM 2022. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 499. Springer, Cham. https://doi.org/10.1007/978-3-031-34896-9_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-34896-9_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-34895-2

  • Online ISBN: 978-3-031-34896-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics