International Journal of Advanced Technology and Engineering Exploration (IJATEE) ISSN (P): 2394-5443 ISSN (O): 2394-7454 Vol - 8, Issue - 82, September 2021
  1. 1
    Google Scholar
Analysis of performance vulnerability of MAC scheduling algorithms due to SYN flood attack in 5G NR mmWave

Bhargabjyoti Saikia and Sudipta Majumder

Abstract

Fifth-Generation (5G) New Radio (NR) Millimetre Wave (mmWave) is a kind of 5G network that operates in the 24GHz to 100GHz frequency range. It offers several opportunities as well as numerous challenges. One of the most prominent challenges that a 5G network faces is an intrusion. Intrusion is possible because of existing vulnerabilities in the 5G NR mmWave network architecture. We exploited one such vulnerability to create Synchronise (SYN) flood intrusion into the network. The SYN flood intrusion is a Denial of Service (DoS) intrusion. The intruder involved in the SYN flood, depletes the network's available resources. As a result, it denies genuine User Equipment (UEs)/nodes access to the network services and resources. Since this attack produces many open connections with the server, it slows down Media Access Control (MAC) schedulers' ability to assign available channels to the user equipment. In this article, we proposed a method to exploit existing vulnerabilities of the 5G NR mmWave network to carry out SYN flood attacks. Further, we investigated the effect of the attack on the performance of the MAC schedulers, such as proportionate fair and round robin MAC schedulers. With the addition of SYN flood attack UEs/nodes, we observed that the throughput for proportional fair and round robin MAC schedulers drops dramatically. In the event of an attack, the throughput drops by 2.34% to 37.7%. However, in the event of a SYN flood attack, network delay and jitter increase. The performance of the network suffers as a result.

Keyword

SYN flood attack, Proportional fair scheduler, Round robin scheduler, Throughput, Delay, Jitter.

Cite this article

Saikia B, Majumder S

Refference

[1][1]Tu GH, Li CY, Peng C, Li Y, Lu S. New security threats caused by IMS-based SMS service in 4G LTE networks. In proceedings of the ACM SIGSAC conference on computer and communications security 2016 (pp. 1118-30).

[2][2]Tu GH, Li CY, Peng C, Lu S. How voice call technology poses security threats in 4g LTE networks. In conference on communications and network security 2015 (pp. 442-50). IEEE.

[3][3]Tu GH, Li Y, Peng C, Li CY, Raza MT, Tseng HY, et al. New threats to SMS-assisted mobile internet services from 4G LTE: lessons learnt from distributed mobile-initiated attacks towards facebook and other services. arXiv preprint arXiv:1510.08531. 2015.

[4][4]Bhattarai S, Wei S, Rook S, Yu W, Erbacher RF, Cam H. On simulation studies of jamming threats against LTE networks. In international conference on computing, networking and communications 2015 (pp. 99-103). IEEE.

[5][5]Li W, Wang N, Jiao L, Zeng K. Physical layer spoofing attack detection in MmWave massive MIMO 5G networks. IEEE Access. 2021; 9:60419-32.

[6][6]Sánchez JD, Urquiza-Aguiar L, Paredes MC, Osorio DP. Survey on physical layer security for 5G wireless networks. Annals of Telecommunications. 2021; 76(3):155-74.

[7][7]Grover K, Lim A, Yang Q. Jamming and anti–jamming techniques in wireless networks: a survey. International Journal of Ad Hoc and Ubiquitous Computing. 2014; 17(4):197-215.

[8][8]Shi Y, Sagduyu YE, Erpek T, Davaslioglu K, Lu Z, Li JH. Adversarial deep learning for cognitive radio security: jamming attack and defense strategies. In international conference on communications workshops 2018(pp. 1-6). IEEE.

[9][9]Erpek T, Sagduyu YE, Shi Y. Deep learning for launching and mitigating wireless jamming attacks. IEEE Transactions on Cognitive Communications and Networking. 2018; 5(1):2-14.

[10][10]Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, et al. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199. 2013.

[11][11]Goodfellow IJ, Shlens J, Szegedy C. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572. 2014.

[12][12]Sadeghi M, Larsson EG. Adversarial attacks on deep-learning based radio signal classification. IEEE Wireless Communications Letters. 2018; 8(1):213-6.

[13][13]Kokalj-filipovic S, Miller R, Morman J. Targeted adversarial examples against RF deep classifiers. In proceedings of the ACM workshop on wireless security and machine learning 2019 (pp. 6-11).

[14][14]Kokalj-filipovic S, Miller R, Vanhoy G. Adversarial examples in RF deep learning: Detection and physical robustness. In global conference on signal and information processing 2019 (pp. 1-5). IEEE.

[15][15]Flowers B, Buehrer RM, Headley WC. Evaluating adversarial evasion attacks in the context of wireless communications. IEEE Transactions on Information Forensics and Security. 2019; 15:1102-13.

[16][16]Lin Y, Zhao H, Tu Y, Mao S, Dou Z. Threats of adversarial attacks in DNN-based modulation recognition. In INFOCOM conference on computer communications 2020 (pp. 2469-78). IEEE.

[17][17]Kim B, Sagduyu YE, Davaslioglu K, Erpek T, Ulukus S. Over-the-air adversarial attacks on deep learning based modulation classifier over wireless channels. In annual conference on information sciences and systems 2020 (pp. 1-6). IEEE.

[18][18]Kim B, Sagduyu YE, Davaslioglu K, Erpek T, Ulukus S. Channel-aware adversarial attacks against deep learning-based wireless signal classifiers. arXiv preprint arXiv:2005.05321. 2020.

[19][19]Hameed MZ, György A, Gündüz D. Communication without interception: defense against modulation detection. In global conference on signal and information processing 2019 (pp. 1-5). IEEE.

[20][20]Hameed MZ, György A, Gündüz D. The best defense is a good offense: adversarial attacks to avoid modulation detection. IEEE Transactions on Information Forensics and Security. 2020; 16:1074-87.

[21][21]Kim B, Sagduyu YE, Davaslioglu K, Erpek T, Ulukus S. How to Make 5G communications invisible: adversarial machine learning for wireless privacy. In Asilomar conference on signals, systems, and computers 2020 (pp. 763-7). IEEE.

[22][22]Kim B, Sagduyu YE, Erpek T, Davaslioglu K, Ulukus S. Adversarial attacks with multiple antennas against deep learning-based modulation classifiers. In globecom workshops 2020 (pp. 1-6). IEEE.

[23][23]Kim B, Sagduyu YE, Erpek T, Davaslioglu K, Ulukus S. Channel effects on surrogate models of adversarial attacks against wireless signal classifiers. In ICC international conference on communications 2021 (pp. 1-6). IEEE.

[24][24]Sagduyu YE, Shi Y, Erpek T. IoT network security from the perspective of adversarial deep learning. In annual international conference on sensing, communication, and networking 2019 (pp. 1-9). IEEE.

[25][25]Adesina D, Hsieh CC, Sagduyu YE, Qian L. Adversarial machine learning in wireless communications using RF data: a review. arXiv preprint arXiv:2012.14392. 2020.

[26][26]Shi Y, Erpek T, Sagduyu YE, Li JH. Spectrum data poisoning with adversarial deep learning. In MILCOM military communications conference 2018(pp. 407-12). IEEE.

[27][27]Sagduyu Y, Shi Y, Erpek T. Adversarial deep learning for over-the-air spectrum poisoning attacks. IEEE Transactions on Mobile Computing. 2019; 20(2):306-19.

[28][28]Luo Z, Zhao S, Lu Z, Xu J, Sagduyu Y. When attackers meet AI: learning-empowered attacks in cooperative spectrum sensing. IEEE Transactions on Mobile Computing. 2020.

[29][29]Luo Z, Zhao S, Lu Z, Sagduyu YE, Xu J. Adversarial machine learning based partial-model attack in IoT. In proceedings of the ACM workshop on wireless security and machine learning 2020 (pp. 13-8).

[30][30]Shi Y, Davaslioglu K, Sagduyu YE. Over-the-air membership inference attacks as privacy threats for deep learning-based wireless signal classifiers. In proceedings of the ACM workshop on wireless security and machine learning 2020 (pp. 61-6).

[31][31]Davaslioglu K, Sagduyu YE. Trojan attacks on wireless signal classification with adversarial machine learning. In international symposium on dynamic spectrum access networks 2019 (pp. 1-6). IEEE.

[32][32]Gupta V, Krishnamurthy S, Faloutsos M. Denial of service attacks at the MAC layer in wireless ad hoc networks. In MILCOM 2002(pp. 1118-23). IEEE.

[33][33]Kyasanur P, Vaidya NH. Detection and handling of MAC layer misbehavior in wireless networks. In DSN 2003 (pp. 173-82).

[34][34]Bayraktaroglu E, King C, Liu X, Noubir G, Rajaraman R, Thapa B. Performance of IEEE 802.11 under jamming. Mobile Networks and Applications. 2013; 18(5):678-96.

[35][35]Li M, Koutsopoulos I, Poovendran R. Optimal jamming attacks and network defense policies in wireless sensor networks. In INFOCOM international conference on computer communications 2007 (pp. 1307-15). IEEE.

[36][36]Xu W, Trappe W, Zhang Y, Wood T. The feasibility of launching and detecting jamming attacks in wireless networks. In proceedings of the ACM international symposium on mobile ad hoc networking and computing 2005 (pp. 46-57).

[37][37]Zander J. Jamming in slotted ALOHA multihop packet radio networks. IEEE Transactions on Communications. 1991; 39(10):1525-31.

[38][38]Theodorakopoulos G, Baras JS. Game theoretic modeling of malicious users in collaborative networks. IEEE Journal on Selected Areas in Communications. 2008; 26(7):1317-27.

[39][39]Sagduyu YE, Berry RA, Ephremides A. Jamming games in wireless networks with incomplete information. IEEE Communications Magazine. 2011; 49(8):112-8.

[40][40]Sadeghi M, Larsson EG. Physical adversarial attacks against end-to-end autoencoder communication systems. IEEE Communications Letters. 2019; 23(5):847-50.

[41][41]Manoj BR, Sadeghi M, Larsson EG. Adversarial attacks on deep learning based power allocation in a massive mimo network. arXiv preprint arXiv:2101.12090. 2021.

[42][42]Zhong C, Wang F, Gursoy MC, Velipasalar S. Adversarial jamming attacks on deep reinforcement learning based dynamic multichannel access. In wireless communications and networking conference 2020 (pp. 1-6). IEEE.

[43][43]Wang F, Zhong C, Gursoy MC, Velipasalar S. Defense strategies against adversarial jamming attacks via deep reinforcement learning. In annual conference on information sciences and systems 2020 (pp. 1-6). IEEE.

[44][44]Lam J, Abbas R. Machine learning based anomaly detection for 5g networks. arXiv preprint arXiv:2003.03474. 2020.