(Publisher of Peer Reviewed Open Access Journals)

International Journal of Advanced Technology and Engineering Exploration (IJATEE)

ISSN (Print):2394-5443    ISSN (Online):2394-7454
Volume-8 Issue-82 September-2021
Full-Text PDF
Paper Title : Analysis of performance vulnerability of MAC scheduling algorithms due to SYN flood attack in 5G NR mmWave
Author Name : Bhargabjyoti Saikia and Sudipta Majumder
Abstract :

Fifth-Generation (5G) New Radio (NR) Millimetre Wave (mmWave) is a kind of 5G network that operates in the 24GHz to 100GHz frequency range. It offers several opportunities as well as numerous challenges. One of the most prominent challenges that a 5G network faces is an intrusion. Intrusion is possible because of existing vulnerabilities in the 5G NR mmWave network architecture. We exploited one such vulnerability to create Synchronise (SYN) flood intrusion into the network. The SYN flood intrusion is a Denial of Service (DoS) intrusion. The intruder involved in the SYN flood, depletes the network's available resources. As a result, it denies genuine User Equipment (UEs)/nodes access to the network services and resources. Since this attack produces many open connections with the server, it slows down Media Access Control (MAC) schedulers' ability to assign available channels to the user equipment. In this article, we proposed a method to exploit existing vulnerabilities of the 5G NR mmWave network to carry out SYN flood attacks. Further, we investigated the effect of the attack on the performance of the MAC schedulers, such as proportionate fair and round robin MAC schedulers. With the addition of SYN flood attack UEs/nodes, we observed that the throughput for proportional fair and round robin MAC schedulers drops dramatically. In the event of an attack, the throughput drops by 2.34% to 37.7%. However, in the event of a SYN flood attack, network delay and jitter increase. The performance of the network suffers as a result.

Keywords : SYN flood attack, Proportional fair scheduler, Round robin scheduler, Throughput, Delay, Jitter.
Cite this article : Saikia B, Majumder S. Analysis of performance vulnerability of MAC scheduling algorithms due to SYN flood attack in 5G NR mmWave. International Journal of Advanced Technology and Engineering Exploration. 2021; 8(82):1102-1119. DOI:10.19101/IJATEE.2021.874340.
References :
[1]Tu GH, Li CY, Peng C, Li Y, Lu S. New security threats caused by IMS-based SMS service in 4G LTE networks. In proceedings of the ACM SIGSAC conference on computer and communications security 2016 (pp. 1118-30).
[Crossref] [Google Scholar]
[2]Tu GH, Li CY, Peng C, Lu S. How voice call technology poses security threats in 4g LTE networks. In conference on communications and network security 2015 (pp. 442-50). IEEE.
[Crossref] [Google Scholar]
[3]Tu GH, Li Y, Peng C, Li CY, Raza MT, Tseng HY, et al. New threats to SMS-assisted mobile internet services from 4G LTE: lessons learnt from distributed mobile-initiated attacks towards facebook and other services. arXiv preprint arXiv:1510.08531. 2015.
[Google Scholar]
[4]Bhattarai S, Wei S, Rook S, Yu W, Erbacher RF, Cam H. On simulation studies of jamming threats against LTE networks. In international conference on computing, networking and communications 2015 (pp. 99-103). IEEE.
[Crossref] [Google Scholar]
[5]Li W, Wang N, Jiao L, Zeng K. Physical layer spoofing attack detection in MmWave massive MIMO 5G networks. IEEE Access. 2021; 9:60419-32.
[Crossref] [Google Scholar]
[6]Sánchez JD, Urquiza-Aguiar L, Paredes MC, Osorio DP. Survey on physical layer security for 5G wireless networks. Annals of Telecommunications. 2021; 76(3):155-74.
[Crossref] [Google Scholar]
[7]Grover K, Lim A, Yang Q. Jamming and anti–jamming techniques in wireless networks: a survey. International Journal of Ad Hoc and Ubiquitous Computing. 2014; 17(4):197-215.
[Crossref] [Google Scholar]
[8]Shi Y, Sagduyu YE, Erpek T, Davaslioglu K, Lu Z, Li JH. Adversarial deep learning for cognitive radio security: jamming attack and defense strategies. In international conference on communications workshops 2018(pp. 1-6). IEEE.
[Crossref] [Google Scholar]
[9]Erpek T, Sagduyu YE, Shi Y. Deep learning for launching and mitigating wireless jamming attacks. IEEE Transactions on Cognitive Communications and Networking. 2018; 5(1):2-14.
[Crossref] [Google Scholar]
[10]Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, et al. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199. 2013.
[Google Scholar]
[11]Goodfellow IJ, Shlens J, Szegedy C. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572. 2014.
[Google Scholar]
[12]Sadeghi M, Larsson EG. Adversarial attacks on deep-learning based radio signal classification. IEEE Wireless Communications Letters. 2018; 8(1):213-6.
[Crossref] [Google Scholar]
[13]Kokalj-filipovic S, Miller R, Morman J. Targeted adversarial examples against RF deep classifiers. In proceedings of the ACM workshop on wireless security and machine learning 2019 (pp. 6-11).
[Crossref] [Google Scholar]
[14]Kokalj-filipovic S, Miller R, Vanhoy G. Adversarial examples in RF deep learning: Detection and physical robustness. In global conference on signal and information processing 2019 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[15]Flowers B, Buehrer RM, Headley WC. Evaluating adversarial evasion attacks in the context of wireless communications. IEEE Transactions on Information Forensics and Security. 2019; 15:1102-13.
[Crossref] [Google Scholar]
[16]Lin Y, Zhao H, Tu Y, Mao S, Dou Z. Threats of adversarial attacks in DNN-based modulation recognition. In INFOCOM conference on computer communications 2020 (pp. 2469-78). IEEE.
[Crossref] [Google Scholar]
[17]Kim B, Sagduyu YE, Davaslioglu K, Erpek T, Ulukus S. Over-the-air adversarial attacks on deep learning based modulation classifier over wireless channels. In annual conference on information sciences and systems 2020 (pp. 1-6). IEEE.
[Crossref] [Google Scholar]
[18]Kim B, Sagduyu YE, Davaslioglu K, Erpek T, Ulukus S. Channel-aware adversarial attacks against deep learning-based wireless signal classifiers. arXiv preprint arXiv:2005.05321. 2020.
[Google Scholar]
[19]Hameed MZ, György A, Gündüz D. Communication without interception: defense against modulation detection. In global conference on signal and information processing 2019 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[20]Hameed MZ, György A, Gündüz D. The best defense is a good offense: adversarial attacks to avoid modulation detection. IEEE Transactions on Information Forensics and Security. 2020; 16:1074-87.
[Crossref] [Google Scholar]
[21]Kim B, Sagduyu YE, Davaslioglu K, Erpek T, Ulukus S. How to Make 5G communications invisible: adversarial machine learning for wireless privacy. In Asilomar conference on signals, systems, and computers 2020 (pp. 763-7). IEEE.
[Crossref] [Google Scholar]
[22]Kim B, Sagduyu YE, Erpek T, Davaslioglu K, Ulukus S. Adversarial attacks with multiple antennas against deep learning-based modulation classifiers. In globecom workshops 2020 (pp. 1-6). IEEE.
[Crossref] [Google Scholar]
[23]Kim B, Sagduyu YE, Erpek T, Davaslioglu K, Ulukus S. Channel effects on surrogate models of adversarial attacks against wireless signal classifiers. In ICC international conference on communications 2021 (pp. 1-6). IEEE.
[Crossref] [Google Scholar]
[24]Sagduyu YE, Shi Y, Erpek T. IoT network security from the perspective of adversarial deep learning. In annual international conference on sensing, communication, and networking 2019 (pp. 1-9). IEEE.
[Crossref] [Google Scholar]
[25]Adesina D, Hsieh CC, Sagduyu YE, Qian L. Adversarial machine learning in wireless communications using RF data: a review. arXiv preprint arXiv:2012.14392. 2020.
[Google Scholar]
[26]Shi Y, Erpek T, Sagduyu YE, Li JH. Spectrum data poisoning with adversarial deep learning. In MILCOM military communications conference 2018(pp. 407-12). IEEE.
[Crossref] [Google Scholar]
[27]Sagduyu Y, Shi Y, Erpek T. Adversarial deep learning for over-the-air spectrum poisoning attacks. IEEE Transactions on Mobile Computing. 2019; 20(2):306-19.
[Crossref] [Google Scholar]
[28]Luo Z, Zhao S, Lu Z, Xu J, Sagduyu Y. When attackers meet AI: learning-empowered attacks in cooperative spectrum sensing. IEEE Transactions on Mobile Computing. 2020.
[Crossref] [Google Scholar]
[29]Luo Z, Zhao S, Lu Z, Sagduyu YE, Xu J. Adversarial machine learning based partial-model attack in IoT. In proceedings of the ACM workshop on wireless security and machine learning 2020 (pp. 13-8).
[Crossref] [Google Scholar]
[30]Shi Y, Davaslioglu K, Sagduyu YE. Over-the-air membership inference attacks as privacy threats for deep learning-based wireless signal classifiers. In proceedings of the ACM workshop on wireless security and machine learning 2020 (pp. 61-6).
[Crossref] [Google Scholar]
[31]Davaslioglu K, Sagduyu YE. Trojan attacks on wireless signal classification with adversarial machine learning. In international symposium on dynamic spectrum access networks 2019 (pp. 1-6). IEEE.
[Crossref] [Google Scholar]
[32]Gupta V, Krishnamurthy S, Faloutsos M. Denial of service attacks at the MAC layer in wireless ad hoc networks. In MILCOM 2002(pp. 1118-23). IEEE.
[Crossref] [Google Scholar]
[33]Kyasanur P, Vaidya NH. Detection and handling of MAC layer misbehavior in wireless networks. In DSN 2003 (pp. 173-82).
[Google Scholar]
[34]Bayraktaroglu E, King C, Liu X, Noubir G, Rajaraman R, Thapa B. Performance of IEEE 802.11 under jamming. Mobile Networks and Applications. 2013; 18(5):678-96.
[Crossref] [Google Scholar]
[35]Li M, Koutsopoulos I, Poovendran R. Optimal jamming attacks and network defense policies in wireless sensor networks. In INFOCOM international conference on computer communications 2007 (pp. 1307-15). IEEE.
[Crossref] [Google Scholar]
[36]Xu W, Trappe W, Zhang Y, Wood T. The feasibility of launching and detecting jamming attacks in wireless networks. In proceedings of the ACM international symposium on mobile ad hoc networking and computing 2005 (pp. 46-57).
[Crossref] [Google Scholar]
[37]Zander J. Jamming in slotted ALOHA multihop packet radio networks. IEEE Transactions on Communications. 1991; 39(10):1525-31.
[Crossref] [Google Scholar]
[38]Theodorakopoulos G, Baras JS. Game theoretic modeling of malicious users in collaborative networks. IEEE Journal on Selected Areas in Communications. 2008; 26(7):1317-27.
[Crossref] [Google Scholar]
[39]Sagduyu YE, Berry RA, Ephremides A. Jamming games in wireless networks with incomplete information. IEEE Communications Magazine. 2011; 49(8):112-8.
[Crossref] [Google Scholar]
[40]Sadeghi M, Larsson EG. Physical adversarial attacks against end-to-end autoencoder communication systems. IEEE Communications Letters. 2019; 23(5):847-50.
[Crossref] [Google Scholar]
[41]Manoj BR, Sadeghi M, Larsson EG. Adversarial attacks on deep learning based power allocation in a massive mimo network. arXiv preprint arXiv:2101.12090. 2021.
[Google Scholar]
[42]Zhong C, Wang F, Gursoy MC, Velipasalar S. Adversarial jamming attacks on deep reinforcement learning based dynamic multichannel access. In wireless communications and networking conference 2020 (pp. 1-6). IEEE.
[Crossref] [Google Scholar]
[43]Wang F, Zhong C, Gursoy MC, Velipasalar S. Defense strategies against adversarial jamming attacks via deep reinforcement learning. In annual conference on information sciences and systems 2020 (pp. 1-6). IEEE.
[Crossref] [Google Scholar]
[44]Lam J, Abbas R. Machine learning based anomaly detection for 5g networks. arXiv preprint arXiv:2003.03474. 2020.
[Google Scholar]