DDoS Amplification Attack Mitigation in 5G/6G Networks: A Taxonomy, Evaluation, and Defense Framework
-
https://doi.org/10.14419/qvspkq08
Received date: August 27, 2025
Accepted date: October 1, 2025
Published date: October 8, 2025
-
5G Security; 6G Networks; DDoS Amplification Attacks; Network Slicing; Anomaly Detection; Mitigation Framework; Post-Quantum Cryptography. -
Abstract
The evolution of 5G and emerging 6G networks has introduced unprecedented opportunities for connectivity, but also expanded the attack surface for Distributed Denial of Service (DDoS) amplification attacks. Service-Based Architecture (SBA), network slicing, and massive IoT (mMTC) environments create new vectors for reflection and amplification, making conventional defenses inadequate. This paper proposes a novel layered defense framework that integrates edge filtering, AI-driven anomaly detection, slice isolation, cloud scrubbing, and quantum-safe cryptography to mitigate DDoS amplification attacks in 5G/6G environments.
The framework is theoretically modeled through equations for amplification, mitigation efficiency, resilience, and defense cost, and evaluated experimentally using simulated signaling floods, IoT-driven amplification, slice-targeted floods, and hybrid attacks. Performance was measured using detection rate, false alarm rate, service availability, resilience score, and resource overhead. Two algorithms—pseudonymous authentication with zero-knowledge proof (ZKP) and layered mitigation orchestration—were implemented to operationalize the defense strategy.
The results demonstrate that the proposed framework achieves a detection accuracy of 95–97%, reduces false positives to 2%, and maintains a service availability of over 85% under prolonged amplification attacks. It scales efficiently in scenarios with up to 10,000 simulated IoT devices, retaining 70–80% throughput, and maintains URLLC latency below 10 ms, outperforming baseline defenses (firewalls, scrubbing, and AI-only) and state-of-the-art defenses from the literature. These findings validate the framework as a scalable, efficient, and future-ready solution for mitigating amplification attacks in 5G/6G networks, with strong alignment with 3GPP, GSMA, and NIST post-quantum standards.
-
References
- A. Abhishta, R. D. van der Mei, and L. J. M. Nieuwenhuis, “Understanding the impact of DDoS attacks on internet service providers,” J. Internet Serv. Appl., vol. 10, no. 1, pp. 1–17, 2019.
- K. Kalkan and S. Zeadally, “Securing Internet of Things (IoT) with software defined networking (SDN),” IEEE Commun. Mag., vol. 56, no. 9, pp. 186–192, Sep. 2018. https://doi.org/10.1109/MCOM.2017.1700714.
- ENISA, Threat Landscape for 5G Networks, European Union Agency for Cybersecurity, 2023.
- R. Hussain, S. H. Ahmed, S. Kim, and D. He, “5G security: Concepts and challenges,” IEEE Access, vol. 7, pp. 138200–138217, 2019.
- GSMA, 5G Security Guide (FS.40 v3.0), GSM Association, 2024.
- W. Saad, M. Bennis, and M. Chen, “A vision of 6G wireless systems: Applications, trends, technologies, and open research problems,” IEEE Netw., vol. 34, no. 3, pp. 134–142, 2020. https://doi.org/10.1109/MNET.001.1900287.
- ITU, IMT-2030 Framework for 6G, International Telecommunication Union, 2023.
- M. S. Farash and H. R. Nielson, “Towards secure 5G networks: A survey,” Comput. Netw., vol. 191, p. 107960, 2021.
- Akamai, State of the Internet: DDoS Attacks Report, 2023.
- R. Khan, P. Kumar, D. N. K. Jayakody, and M. Liyanage, “A survey on security and privacy of 5G technologies: Potential solutions, recent ad-vancements, and future directions,” IEEE Commun. Surveys Tuts., vol. 22, no. 1, pp. 196–248, 2020. https://doi.org/10.1109/COMST.2019.2933899.
- L. M. Ferrag, H. Derdour, and M. Mukherjee, “Blockchain and AI-based solutions to combat DDoS attacks in 6G networks,” IEEE Netw., vol. 35, no. 2, pp. 124–131, 2021.
- N. Papernot, P. McDaniel, and I. Goodfellow, “Practical black-box attacks against machine learning,” in Proc. ACM Asia CCS, 2017, pp. 506–519. https://doi.org/10.1145/3052973.3053009.
- NIST, Post-Quantum Cryptography Standards (FIPS 203/204/205), U.S. National Institute of Standards and Technology, 2024.
- A. Abhishta, R. D. van der Mei, and L. J. M. Nieuwenhuis, “Understanding the impact of DDoS attacks on Internet service providers,” J. Internet Serv. Appl., vol. 10, no. 1, pp. 1–17, 2019.
- M. S. Farash and H. R. Nielsen, “Towards secure 5G networks: A survey,” Comput. Netw., vol. 191, p. 107960, 2021.
- R. Hussain, S. H. Ahmed, S. Kim, and D. He, “5G security: Concepts and challenges,” IEEE Access, vol. 7, pp. 138200–138217, 2019.
- R. Khan, P. Kumar, D. N. K. Jayakody, and M. Liyanage, “A survey on security and privacy of 5G technologies: Potential solutions, recent ad-vancements, and future directions,” IEEE Commun. Surveys Tuts., vol. 22, no. 1, pp. 196–248, 2020. https://doi.org/10.1109/COMST.2019.2933899.
- ENISA, Threat Landscape for 5G Networks, European Union Agency for Cybersecurity, 2023.
- Akamai, State of the Internet: DDoS Attacks Report, 2023.
- GSMA, 5G Security Guide (FS.40 v3.0), GSM Association, 2024.
- W. Saad, M. Bennis, and M. Chen, “A vision of 6G wireless systems: Applications, trends, technologies, and open research problems,” IEEE Netw., vol. 34, no. 3, pp. 134–142, 2020. https://doi.org/10.1109/MNET.001.1900287.
- ITU, IMT-2030 Framework for 6G, International Telecommunication Union, 2023.
- A. Fadlullah, F. Tang, and N. Kato, “Threats to AI-driven 6G networks: Adversarial learning and defense strategies,” IEEE Wireless Commun., vol. 29, no. 5, pp. 114–121, 2022.
- A. Patel, M. Taghavi, K. Bakhtiyari, and J. Celestino Júnior, “An intrusion detection and prevention system in cloud computing: A systematic re-view,” J. Netw. Comput. Appl., vol. 36, no. 1, pp. 25–41, 2013. https://doi.org/10.1016/j.jnca.2012.08.007.
- Z. Yu, Y. Tian, and M. A. Orgun, “A survey on DDoS attacks and defense mechanisms in cloud computing,” Future Gener. Comput. Syst., vol. 80, pp. 682–697, 2018.
- L. M. Ferrag, H. Derdour, and M. Mukherjee, “Blockchain and AI-based solutions to combat DDoS attacks in 6G networks,” IEEE Netw., vol. 35, no. 2, pp. 124–131, 2021.
- N. Papernot, P. McDaniel, and I. Goodfellow, “Practical black-box attacks against machine learning,” in Proc. ACM Asia CCS, 2017, pp. 506–519. https://doi.org/10.1145/3052973.3053009.
- K. Kalkan and S. Zeadally, “Securing Internet of Things (IoT) with software defined networking (SDN),” IEEE Commun. Mag., vol. 56, no. 9, pp. 186–192, 2018. https://doi.org/10.1109/MCOM.2017.1700714.
- X. Xu, X. Wang, and Y. Zhang, “A blockchain-based DDoS mitigation framework in 6G,” in Proc. IEEE GLOBECOM, 2021, pp. 1–6.
- S. Singh and I. Chana, “QoS-aware autonomic resource management in cloud computing: A systematic review,” ACM Comput. Surveys, vol. 48, no. 3, pp. 1–46, 2016. https://doi.org/10.1145/2843889.
- R. Hussain et al., “Edge–cloud collaboration for resilient 6G security services,” IEEE Commun. Mag., vol. 61, no. 2, pp. 88–95, 2023.
- NIST, Post-Quantum Cryptography Standards (FIPS 203/204/205), U.S. NIST, 2024.
- D. Kreutz, F. Ramos, P. E. Veríssimo, C. E. Rothenberg, S. Azodolmolky, and S. Uhlig, “Software-defined networking: A comprehensive survey,” Proc. IEEE, vol. 103, no. 1, pp. 14–76, 2015. https://doi.org/10.1109/JPROC.2014.2371999.
- 3GPP TS 33.501, “Security architecture and procedures for 5G system,” 3rd Generation Partnership Project, 2023.
- M. S. Farash and H. R. Nielsen, “Towards secure 5G networks: A survey,” Comput. Netw., vol. 191, p. 107960, 2021.
- K. Kalkan and S. Zeadally, “Securing Internet of Things (IoT) with software defined networking (SDN),” IEEE Commun. Mag., vol. 56, no. 9, pp. 186–192, 2018. https://doi.org/10.1109/MCOM.2017.1700714.
- L. M. Ferrag, H. Derdour, and M. Mukherjee, “Blockchain and AI-based solutions to combat DDoS attacks in 6G networks,” IEEE Netw., vol. 35, no. 2, pp. 124–131, 2021.
- GSMA, 5G Security Guide (FS.40 v3.0), GSM Association, 2024.
- NIST, Post-Quantum Cryptography Standards (FIPS 203/204/205), U.S. NIST, 2024.
- Akamai, State of the Internet: DDoS Attacks Report, 2023.
- 3GPP TS 23.501, System architecture for the 5G system, 3rd Generation Partnership Project, 2023.
- Z. Yu, Y. Tian, and M. A. Orgun, “A survey on DDoS attacks and defense mechanisms in cloud computing,” Future Gener. Comput. Syst., vol. 80, pp. 682–697, 2018.
- M. S. Farash and H. R. Nielsen, “Towards secure 5G networks: A survey,” Comput. Netw., vol. 191, p. 107960, 2021.
- J. Camenisch and A. Lysyanskaya, “An efficient system for non-transferable anonymous credentials with optional anonymity revocation,” in Proc. EUROCRYPT, 2001, pp. 93–118. https://doi.org/10.1007/3-540-44987-6_7.
- Akamai, State of the Internet: DDoS Attacks Report, 2023.
- Z. Yu, Y. Tian, and M. A. Orgun, “A survey on DDoS attacks and defense mechanisms in cloud computing,” Future Gener. Comput. Syst., vol. 80, pp. 682–697, 2018.
- L. M. Ferrag, H. Derdour, and M. Mukherjee, “Blockchain and AI-based solutions to combat DDoS attacks in 6G networks,” IEEE Netw., vol. 35, no. 2, pp. 124–131, 2021.
- X. Xu, X. Wang, and Y. Zhang, “A blockchain-based DDoS mitigation framework in 6G,” in Proc. IEEE GLOBECOM, 2021, pp. 1–6.
- GSMA, 5G Security Guide (FS.40 v3.0), GSM Association, 2024.
- N. Papernot, P. McDaniel, and I. Goodfellow, “Practical black-box attacks against machine learning,” in Proc. ACM Asia CCS, 2017, pp. 506–519. https://doi.org/10.1145/3052973.3053009.
- NIST, Post-Quantum Cryptography Standards (FIPS 203/204/205), U.S. National Institute of Standards and Technology, 2024.
-
Downloads
-
How to Cite
Al-Balasmeh, H. (2025). DDoS Amplification Attack Mitigation in 5G/6G Networks: A Taxonomy, Evaluation, and Defense Framework. International Journal of Basic and Applied Sciences, 14(6), 139-151. https://doi.org/10.14419/qvspkq08
