Visible to the public Security Policy to Manage Responses to DDoS Attacks on 5G IoT Enabled Devices

TitleSecurity Policy to Manage Responses to DDoS Attacks on 5G IoT Enabled Devices
Publication TypeConference Paper
Year of Publication2022
AuthorsOnoja, Daniel, Hitchens, Michael, Shankaran, Rajan
Conference Name2022 13th International Conference on Information and Communication Systems (ICICS)
Date Publishedjun
Keywords5G, 5G mobile communication, codes, Communication systems, denial-of-service attack, distributed denial of service attack, events, human factors, Industries, IoT, Metrics, policy language, pubcrawl, Resiliency, resources, Scalability, security policies, security solution, Syntactics, Transportation
AbstractIn recent years, the need for seamless connectivity has increased across various network platforms with demands coming from industries, home, mobile, transportation and office networks. The 5th generation (5G) network is being deployed to meet such demand of high-speed seamless network device connections. The seamless connectivity 5G provides could be a security threat allowing attacks such as distributed denial of service (DDoS) because attackers might have easy access into the network infrastructure and higher bandwidth to enhance the effects of the attack. The aim of this research is to provide a security solution for 5G technology to DDoS attacks by managing the response to threats posed by DDoS. Deploying a security policy language which is reactive and event-oriented fits into a flexible, efficient, and lightweight security approach. A policy in our language consists of an event whose occurrence triggers a policy rule where one or more actions are taken.
DOI10.1109/ICICS55353.2022.9811193
Citation Keyonoja_security_2022