Skip to main content

Crossfire Attack Detection in 6G Networks with the Internet of Things (IoT)

  • Conference paper
  • First Online:
Internet of Things. Advances in Information and Communication Technology (IFIPIoT 2023)

Abstract

As the internet plays an increasingly vital role in our daily lives, the threat of denial of service (DoS) attacks continues to loom, posing significant challenges to network security. With the proliferation of internet-of-things (IoT) devices, including those in the healthcare sector (IoMT), the need to secure these networks becomes even more critical. The emergence of Mobile Edge Computing (MEC) servers has shifted the focus toward processing data near the network edge to alleviate network congestion. However, a new form of DoS attack, known as the crossfire attack, presents a complex challenge as it is difficult to detect and can have devastating effects on networks. While Software Defined Networks (SDNs) offer promise in mitigating DoS attacks, they also introduce vulnerabilities of their own. This paper explores the current landscape of IoT, IoMT, DoS attacks, and crossfire attacks. It discusses existing defense strategies and proposes a defense mechanism that leverages packet header inspection to differentiate between adversarial and benign packets. The paper concludes with the execution of a crossfire attack in a Mininet environment with the RYU SDN controller, highlighting the need for multiple approaches to protect critical servers in the face of persistent DDoS attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Abbas, N., Zhang, Y., Taherkordi, A., Skeie, T.: Mobile edge computing: a survey. IEEE Internet Things J. 5(1), 450–465 (2017)

    Article  Google Scholar 

  2. Aydeger, A., Saputro, N., Akkaya, K., Rahman, M.: Mitigating crossfire attacks using SDN-based moving target defense. In: 2016 IEEE 41st Conference on Local Computer Networks (LCN), pp. 627–630 (2016). https://doi.org/10.1109/LCN.2016.108

  3. Balaji, S., Nathani, K., Santhakumar, R.: IoT technology, applications and challenges: a contemporary survey. Wirel. Pers. Commun. 108(1), 363–388 (2019). https://doi.org/10.1007/s11277-019-06407-w

    Article  Google Scholar 

  4. Gudla, C., Sung, A.H.: Moving target defense application and analysis in software-defined networking. In: 2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), pp. 641–646 (2020). https://doi.org/10.1109/IEMCON51383.2020.9284847

  5. Gupta, A., Jha, R.K.: A survey of 5G network: architecture and emerging technologies. IEEE Access 3, 1206–1232 (2015). https://doi.org/10.1109/ACCESS.2015.2461602

    Article  Google Scholar 

  6. Kampanakis, P., Perros, H., Beyene, T.: SDN-based solutions for moving target defense network protection. In: Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014, pp. 1–6 (2014). https://doi.org/10.1109/WoWMoM.2014.6918979

  7. Kang, M.S., Lee, S.B., Gligor, V.D.: The crossfire attack. In: 2013 IEEE Symposium on Security and Privacy, pp. 127–141 (2013). https://doi.org/10.1109/SP.2013.19

  8. Kavre, M., Gadekar, A., Gadhade, Y.: Internet of Things (IoT): a survey. In: 2019 IEEE Pune Section International Conference (PuneCon), pp. 1–6 (2019). https://doi.org/10.1109/PuneCon46936.2019.9105831

  9. Knight, S., Nguyen, H., Falkner, N., Bowden, R., Roughan, M.: The internet topology zoo. IEEE J. Select. Areas Commun. 29(9), 1765–1775 (2011). https://doi.org/10.1109/JSAC.2011.111002

    Article  Google Scholar 

  10. Narayanadoss, A.R., Truong-Huu, T., Mohan, P.M., Gurusamy, M.: Crossfire attack detection using deep learning in software defined its networks. In: 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring), pp. 1–6 (2019). https://doi.org/10.1109/VTCSpring.2019.8746594

  11. Panwar, N., Sharma, S., Singh, A.K.: A survey on 5G: the next generation of mobile communication. Phys. Commun. 18, 64–84 (2016)

    Article  Google Scholar 

  12. Patel, M., et al.: Mobile-Edge Computing - Introductory Technical White Paper (2019). https://www.scirp.org/reference/ReferencesPapers.aspx?ReferenceID=2580032

  13. Patton, M., Gross, E., Chinn, R., Forbis, S., Walker, L., Chen, H.: Uninvited connections: a study of vulnerable devices on the Internet of Things (IoT). In: 2014 IEEE Joint Intelligence and Security Informatics Conference, pp. 232–235. IEEE (2014)

    Google Scholar 

  14. Smith, J.M., Schuchard, M.: Routing around congestion: defeating DDoS attacks and adverse network conditions via reactive BGP routing. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 599–617 (2018). https://doi.org/10.1109/SP.2018.00032

  15. Tran, M., Kang, M.S., Hsiao, H.C., Chiang, W.H., Tung, S.P., Wang, Y.S.: On the feasibility of rerouting-based DDoS defenses. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 1169–1184 (2019). https://doi.org/10.1109/SP.2019.00055

  16. Vishnu, S., Ramson, S.J., Jegan, R.: Internet of medical things (IoMT)-an overview. In: 2020 5th International Conference on Devices, Circuits and Systems (ICDCS), pp. 101–104. IEEE (2020)

    Google Scholar 

  17. Wang, C.X., et al.: Cellular architecture and key technologies for 5G wireless communication networks. IEEE Commun. Mag. 52(2), 122–130 (2014). https://doi.org/10.1109/MCOM.2014.6736752

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Suman Bhunia .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Perry, N., Bhunia, S. (2024). Crossfire Attack Detection in 6G Networks with the Internet of Things (IoT). In: Puthal, D., Mohanty, S., Choi, BY. (eds) Internet of Things. Advances in Information and Communication Technology. IFIPIoT 2023. IFIP Advances in Information and Communication Technology, vol 683. Springer, Cham. https://doi.org/10.1007/978-3-031-45878-1_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-45878-1_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-45877-4

  • Online ISBN: 978-3-031-45878-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics