Autonomic protection of multi-tenant 5G mobile networks against UDP flooding DDoS attacks
نویسندگان
چکیده
منابع مشابه
Cognitive management of multi-service multi-tenant 5G mobile networks
Fifth generation (5G) mobile networks are expected to support diverse use cases beyond traditional voice and mobile broadband services. Efforts to connect anyone and anything have gained significant traction in several industries, among them automotive, logistics, manufacturing, and robotics. Exemplary use cases include eHealth, IoT (Internet of Things) applications, and V2X (vehicle-to-anythin...
متن کاملDiCoDefense: Distributed Collaborative Defense against DDoS Flooding attacks
Detecting Distributed Denial of Service (DDoS) flooding attacks as soon as possible before they affect the victims, identifying the sources of the attacks, and finally stopping them by blocking or rate limiting the attack traffic is the ultimate goal of current defense mechanisms. The success in detecting and responding to DDoS flooding attacks is highly dependent on the data monitored by the e...
متن کاملSYN Flooding Attacks in Mobile Adhoc Networks
Mobile Adhoc Networks (MANET) are special because of their self configuring and self maintenance capabilities. The highly dynamic network topology and the shared wireless medium are the main attractions and at the same time the main challenges of the MANET. These characters make MANET vulnerable to various attacks. There are several attacks on each layer of the protocol stack. Providing the sec...
متن کاملForensics of Random-UDP Flooding Attacks
Internet has great impact on various facets of everyone’s life. With the enormous advantage Internet provides to users all around the world, it has some inherent weaknesses because of the protocol stack on which it is built. It can be easily attacked by attackers who exploit the vulnerabilities in the protocols and compromise systems and remotely control them to do further damage. Major attacks...
متن کاملAnalysis of Entropy Based DDoS Attack Detection to Detect UDP Based DDoS Attacks in IPv6 Networks
Distributed Denial of Service (DDoS) attacks is an important thread in internet. In IPv6 internet worms are difficult to identify, because of the total amount of traffic which does not allow the instant investigation of fine points. In Internet Protocol Version 6 (IPv6) networks one of the common traffic flows occurs is UDP data flows. It is an unreliable data flow. This characteristic can be u...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Network and Computer Applications
سال: 2019
ISSN: 1084-8045
DOI: 10.1016/j.jnca.2019.102416