DDoS Attacks Mitigation in 5G-V2X Networks: A Reinforcement Learning-based Approach

被引:0
|
作者
Bousalem, Badre [1 ]
Sakka, Mohamed Anis [2 ,3 ]
Silva, Vinicius F. [1 ]
Jaafar, Wael [2 ]
Ben Letaifa, Asma [3 ]
Langar, Rami [1 ,2 ]
机构
[1] Univ Gustave Eiffel, LIGM CNRS UMR 8049, F-77454 Marne La Vallee, France
[2] Ecole Technol Super ETS, Software & IT Engn Dept, Montreal, PQ H3C 1K3, Canada
[3] Higher Sch Commun Tunis SupCom, Mediatron Lab, Tunis, Tunisia
关键词
5G-V2X; attack mitigation; reinforcement learning;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicle-to-Everything (V2X) communication standards, which mainly rely on the 5G New Radio (NR) technology, can be subject to attacks such as Distributed Denial of Service (DDoS), which flood the network with non-expected control information. This causes network performance degradation and leads to accidents involving vehicles and/or vulnerable road users. A potential approach to mitigate DDoS attacks is to isolate the hijacked vehicular users in sinkhole-type slices that contain a small amount of network resources. Nevertheless, DDoS attacks may be unpredictable since it can modify its communication protocol for example, which makes it difficult to determine the proper moment to release mitigated users from the sinkhole-type slices once the security breach ceases to exist. In such a context, we propose a Reinforcement Learning-based approach that evaluates multiple types of DDoS attacks on sinkhole-type slices and estimates the optimal time to keep a mitigated user in such a slice before releasing it. The proposed approach is trained and tested with a dataset collected from a 5G-V2X testbed. Results show that our approach outperforms a benchmark of random actions, in terms of the mean cumulative reward and error over time.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] On the Training of Reinforcement Learning-based Algorithms in 5G and Beyond Radio Access Networks
    Vila, I
    Perez-Romero, J.
    Sallent, O.
    PROCEEDINGS OF THE 2022 IEEE 8TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2022): NETWORK SOFTWARIZATION COMING OF AGE: NEW CHALLENGES AND OPPORTUNITIES, 2022, : 207 - 215
  • [42] Modified Equilibrium Optimization Algorithm With Deep Learning-Based DDoS Attack Classification in 5G Networks
    Aljebreen, Mohammed
    Alrayes, Fatma S.
    Maray, Mohammed
    Aljameel, Sumayh S.
    Salama, Ahmed S.
    Motwakel, Abdelwahed
    IEEE ACCESS, 2023, 11 : 108561 - 108570
  • [43] Deep Reinforcement Learning-based Offloading for Latency Minimization in 3-tier V2X Networks
    Hieu Dinh
    Nang Hung Nguyen
    Trung Thanh Nguyen
    Thanh Hung Nguyen
    Nguyen, Truong Thao
    Phi Le Nguyen
    2022 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2022, : 1803 - 1808
  • [45] 基于5G-V2X车联网解决方案
    杨东
    通信与信息技术, 2021, (05) : 48 - 49+62
  • [46] Adaptive Numerology - A solution to address the demanding QoS in 5G-V2X
    Soni, Tapisha
    Ali, Ali Ramadan
    Ganesan, Karthikeyan
    Schellmann, Malte
    2018 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2018,
  • [47] A 5G-V2X Based Collaborative Motion Planning for Autonomous Industrial Vehicles at Road Intersections
    Shi, Yanjun
    Pan, Yaohui
    Zhang, Zihui
    Li, Yanqiang
    Xiao, Yu
    2018 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2018, : 3744 - 3748
  • [48] Fair and efficient resource allocation via vehicle-edge cooperation in 5G-V2X networks
    Avcil, Muhammed Nur
    Soyturk, Mujdat
    Kantarci, Burak
    VEHICULAR COMMUNICATIONS, 2024, 48
  • [49] An Intelligent Scheduling Access Privacy Protection Model of Electric Vehicle Based on 5G-V2X
    Xu, Cheng
    Wu, Hongjun
    Liu, Hongzhe
    Li, Xuewei
    Liu, Li
    Wang, Pengfei
    SCIENTIFIC PROGRAMMING, 2021, 2021
  • [50] Secure and efficient group handover authentication protocol based on trajectory prediction in 5G-V2X
    Zhang, Yinghui
    Qian, Jiale
    Cao, Jin
    Zheng, Dong
    Tongxin Xuebao/Journal on Communications, 2023, 44 (08): : 144 - 154