Namsakhi Kumar - namsakhi_kumar@sfu.ca
Kwok Liang Lee - wailongt@sfu.ca
Edwin Tam - kwokl@sfu.ca
With the fifth-generation (5G) network becoming popular to the public due to the facts that it has a higher bit rate and wider bandwidth that would allow high-speed communication, it favors 5G network to replace the older generations, and it allows more devices, such as autonomous vehicles and health monitors to be implemented into 5G technology in the future. However, the security on 5G networks for autonomous devices and monitors are important, as a split second of disconnection will contribute to accident or misstep. If the network is under Distributed-Denial-of-Service (DDoS) attack, the device may lose connection due to functional disruption of the server by overflooding it with excessive requests, resulting in traffic overflow which blocks bandwidth capacity. In this paper, we will discuss local Device-to-Device (D2D) communication rather than global D2D. To understand the performance of 5G networks under DDoS attack, we simulate the network model using mmWave module in ns-3 simulator and use Wireshark to obtain the data flow of traffic in the network. Finally, the traffic animation is displayed with NetAnim for better visualization.
[1] Nyuwireless-Unipd, “nyuwireless-unipd/ns3-mmwave,” GitHub. [Online]. Available: https://github.com/nyuwireless-unipd/ns3-mmwave. [Accessed: 14-Mar-2021].
[2] M. Mezzavilla et al., "End-to-End Simulation of 5G mmWave Networks," in IEEE Communications Surveys & Tutorials, vol. 20, no. 3, pp. 2237-2263, thirdquarter 2018, doi: 10.1109/COMST.2018.2828880. [Accessed: 14-Mar-2021].
[3] N. Tan, S. Makina, and M. Zaki, Simulation of DDoS attacks in 4G networks. [Online]. Available: https://sites.google.com/view/ensc427team05/. [Accessed: 14-Mar-2021].
[4] B. Nagpal, P. Sharma, N. Chauhan and A. Panesar, "DDoS tools: Classification, analysis and comparison," 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 2015, pp. 342-346. [Accessed: 14-Mar-2021].
[5] S. Alzahrani and L. Hong, “Generation of DDoS Attack Dataset for Effective IDS Development and Evaluation,” Journal of Information Security, vol. 09, no. 04, pp. 225–241, 2018. [Accessed: 14-Mar-2021].
[6] D. Fang, Y. Qian and R. Q. Hu, "Security for 5G Mobile Wireless Networks," in IEEE Access, vol. 6, pp. 4850-4874, 2018, doi: 10.1109/ACCESS.2017.2779146. [Accessed: 20-Mar-2021].
[7] “LTE Channels: Logical, Transport and Physical Channels Details and Mapping,” Techplayon, 21-Jul-2020. [Online]. Available: http://www.techplayon.com/2411-2/. [Accessed: 15-Mar-2021].
[8] “Design Documentation” Design Documentation - Model Library. [Online]. Available: https://www.nsnam.org/docs/models/html/lte-design.html#overview. [Accessed: 15-Mar-2021].
[9] S. U., “DDoS simulation in NS-3 [C++],” Medium, 07-Aug-2020. [Online]. Available: https://infosecwriteups.com/ddos-simulation-in-ns-3-c-12f031a7b38c. [Accessed: 18-Apr-2021].
[10] F. Lau, S. H. Rubin, M. H. Smith, and Lj. Trajkovic, ``Distributed denial of service attacks,'' (invited paper) Proc. IEEE Int. Conf. on Systems, Man, and Cybernetics, SMC 2000, Nashville, TN, Oct. 2000, pp. 2275-2280. [Accessed: 16-Mar-2021].
[11] M. Sung, J. Kim, E.-S. Kim, S.-H. Cho, Y.-J. Won, B.-C. Lim, S.-Y. Pyun, H. Lee, J. K. Lee, and J. H. Lee, “RoF-Based Radio Access Network for 5G Mobile Communication Systems in 28 GHz Millimeter-Wave,” Journal of Lightwave Technology, vol. 38, no. 2, pp. 409–420, 2020, doi: 10.1109/JLT.2019.2942636. [Accessed: 16-Mar-2021].