Abstract
As the internet plays an increasingly vital role in our daily lives, the threat of denial of service (DoS) attacks continues to loom, posing significant challenges to network security. With the proliferation of internet-of-things (IoT) devices, including those in the healthcare sector (IoMT), the need to secure these networks becomes even more critical. The emergence of Mobile Edge Computing (MEC) servers has shifted the focus toward processing data near the network edge to alleviate network congestion. However, a new form of DoS attack, known as the crossfire attack, presents a complex challenge as it is difficult to detect and can have devastating effects on networks. While Software Defined Networks (SDNs) offer promise in mitigating DoS attacks, they also introduce vulnerabilities of their own. This paper explores the current landscape of IoT, IoMT, DoS attacks, and crossfire attacks. It discusses existing defense strategies and proposes a defense mechanism that leverages packet header inspection to differentiate between adversarial and benign packets. The paper concludes with the execution of a crossfire attack in a Mininet environment with the RYU SDN controller, highlighting the need for multiple approaches to protect critical servers in the face of persistent DDoS attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Abbas, N., Zhang, Y., Taherkordi, A., Skeie, T.: Mobile edge computing: a survey. IEEE Internet Things J. 5(1), 450–465 (2017)
Aydeger, A., Saputro, N., Akkaya, K., Rahman, M.: Mitigating crossfire attacks using SDN-based moving target defense. In: 2016 IEEE 41st Conference on Local Computer Networks (LCN), pp. 627–630 (2016). https://doi.org/10.1109/LCN.2016.108
Balaji, S., Nathani, K., Santhakumar, R.: IoT technology, applications and challenges: a contemporary survey. Wirel. Pers. Commun. 108(1), 363–388 (2019). https://doi.org/10.1007/s11277-019-06407-w
Gudla, C., Sung, A.H.: Moving target defense application and analysis in software-defined networking. In: 2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), pp. 641–646 (2020). https://doi.org/10.1109/IEMCON51383.2020.9284847
Gupta, A., Jha, R.K.: A survey of 5G network: architecture and emerging technologies. IEEE Access 3, 1206–1232 (2015). https://doi.org/10.1109/ACCESS.2015.2461602
Kampanakis, P., Perros, H., Beyene, T.: SDN-based solutions for moving target defense network protection. In: Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014, pp. 1–6 (2014). https://doi.org/10.1109/WoWMoM.2014.6918979
Kang, M.S., Lee, S.B., Gligor, V.D.: The crossfire attack. In: 2013 IEEE Symposium on Security and Privacy, pp. 127–141 (2013). https://doi.org/10.1109/SP.2013.19
Kavre, M., Gadekar, A., Gadhade, Y.: Internet of Things (IoT): a survey. In: 2019 IEEE Pune Section International Conference (PuneCon), pp. 1–6 (2019). https://doi.org/10.1109/PuneCon46936.2019.9105831
Knight, S., Nguyen, H., Falkner, N., Bowden, R., Roughan, M.: The internet topology zoo. IEEE J. Select. Areas Commun. 29(9), 1765–1775 (2011). https://doi.org/10.1109/JSAC.2011.111002
Narayanadoss, A.R., Truong-Huu, T., Mohan, P.M., Gurusamy, M.: Crossfire attack detection using deep learning in software defined its networks. In: 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring), pp. 1–6 (2019). https://doi.org/10.1109/VTCSpring.2019.8746594
Panwar, N., Sharma, S., Singh, A.K.: A survey on 5G: the next generation of mobile communication. Phys. Commun. 18, 64–84 (2016)
Patel, M., et al.: Mobile-Edge Computing - Introductory Technical White Paper (2019). https://www.scirp.org/reference/ReferencesPapers.aspx?ReferenceID=2580032
Patton, M., Gross, E., Chinn, R., Forbis, S., Walker, L., Chen, H.: Uninvited connections: a study of vulnerable devices on the Internet of Things (IoT). In: 2014 IEEE Joint Intelligence and Security Informatics Conference, pp. 232–235. IEEE (2014)
Smith, J.M., Schuchard, M.: Routing around congestion: defeating DDoS attacks and adverse network conditions via reactive BGP routing. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 599–617 (2018). https://doi.org/10.1109/SP.2018.00032
Tran, M., Kang, M.S., Hsiao, H.C., Chiang, W.H., Tung, S.P., Wang, Y.S.: On the feasibility of rerouting-based DDoS defenses. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 1169–1184 (2019). https://doi.org/10.1109/SP.2019.00055
Vishnu, S., Ramson, S.J., Jegan, R.: Internet of medical things (IoMT)-an overview. In: 2020 5th International Conference on Devices, Circuits and Systems (ICDCS), pp. 101–104. IEEE (2020)
Wang, C.X., et al.: Cellular architecture and key technologies for 5G wireless communication networks. IEEE Commun. Mag. 52(2), 122–130 (2014). https://doi.org/10.1109/MCOM.2014.6736752
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 IFIP International Federation for Information Processing
About this paper
Cite this paper
Perry, N., Bhunia, S. (2024). Crossfire Attack Detection in 6G Networks with the Internet of Things (IoT). In: Puthal, D., Mohanty, S., Choi, BY. (eds) Internet of Things. Advances in Information and Communication Technology. IFIPIoT 2023. IFIP Advances in Information and Communication Technology, vol 683. Springer, Cham. https://doi.org/10.1007/978-3-031-45878-1_19
Download citation
DOI: https://doi.org/10.1007/978-3-031-45878-1_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-45877-4
Online ISBN: 978-3-031-45878-1
eBook Packages: Computer ScienceComputer Science (R0)