A Distributed Denial of Service (DDoS) attack aims at exhausting the resources of a communication system. A large amount of requests is sent to the targeted system by malicious users: the overload compromises the correct working of the structure. If the attack is successful, the system stops working. The assault does not provide the hacker with any sensitive information; so it does not appear as dangerous as it really is. Nevertheless, the denial of service is a huge security risk for Long Term Evolution (LTE) networks. In order to avoid this kind of risk, we present a mechanism that relocates the resources requested by the users, both voice and data. It is able to transfer the overload from congested eNodeBs to eNodeBs with free capacities. The mechanism is a Load Balancing Algorithm, fully integrated in the architecture of LTE networks. We simulated the attack scenario through Network Simulator 3 (ns-3). If the proposed algorithm is active, in case of a DDoS attack, communication services are always available for users.

A Load Balancing Algorithm against DDoS attacks in beyond 3G wireless networks

S. Zinno;DI STASI, GIOVANNI;AVALLONE, STEFANO;VENTRE, GIORGIO
2014

Abstract

A Distributed Denial of Service (DDoS) attack aims at exhausting the resources of a communication system. A large amount of requests is sent to the targeted system by malicious users: the overload compromises the correct working of the structure. If the attack is successful, the system stops working. The assault does not provide the hacker with any sensitive information; so it does not appear as dangerous as it really is. Nevertheless, the denial of service is a huge security risk for Long Term Evolution (LTE) networks. In order to avoid this kind of risk, we present a mechanism that relocates the resources requested by the users, both voice and data. It is able to transfer the overload from congested eNodeBs to eNodeBs with free capacities. The mechanism is a Load Balancing Algorithm, fully integrated in the architecture of LTE networks. We simulated the attack scenario through Network Simulator 3 (ns-3). If the proposed algorithm is active, in case of a DDoS attack, communication services are always available for users.
9788887237207
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11588/598419
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 4
  • ???jsp.display-item.citation.isi??? ND
social impact