{"id":"https://openalex.org/W4399120183","doi":"https://doi.org/10.1109/drcn60692.2024.10539153","title":"On the Impact of Flooding Attacks on 5G Slicing with Different VNF Sharing Configurations","display_name":"On the Impact of Flooding Attacks on 5G Slicing with Different VNF Sharing Configurations","publication_year":2024,"publication_date":"2024-05-06","ids":{"openalex":"https://openalex.org/W4399120183","doi":"https://doi.org/10.1109/drcn60692.2024.10539153"},"language":"en","primary_location":{"id":"doi:10.1109/drcn60692.2024.10539153","is_oa":false,"landing_page_url":"https://doi.org/10.1109/drcn60692.2024.10539153","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 20th International Conference on the Design of Reliable Communication Networks (DRCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013046960","display_name":"AbdulAziz AbdulGhaffar","orcid":"https://orcid.org/0000-0002-3888-3975"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"AbdulAziz AbdulGhaffar","raw_affiliation_strings":["Carleton University,Department of Systems and Computer Engineering,Canada","Department of Systems and Computer Engineering, Carleton University, Canada"],"affiliations":[{"raw_affiliation_string":"Carleton University,Department of Systems and Computer Engineering,Canada","institution_ids":["https://openalex.org/I67031392"]},{"raw_affiliation_string":"Department of Systems and Computer Engineering, Carleton University, Canada","institution_ids":["https://openalex.org/I67031392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061121632","display_name":"Mohammed Mahyoub","orcid":"https://orcid.org/0000-0002-5728-1814"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Mohammed Mahyoub","raw_affiliation_strings":["School of Information Technology, Carleton University,Canada","School of Information Technology, Carleton University, Canada"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Carleton University,Canada","institution_ids":["https://openalex.org/I67031392"]},{"raw_affiliation_string":"School of Information Technology, Carleton University, Canada","institution_ids":["https://openalex.org/I67031392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103160400","display_name":"Ashraf Matrawy","orcid":"https://orcid.org/0000-0001-9220-4630"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Ashraf Matrawy","raw_affiliation_strings":["School of Information Technology, Carleton University,Canada","School of Information Technology, Carleton University, Canada"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Carleton University,Canada","institution_ids":["https://openalex.org/I67031392"]},{"raw_affiliation_string":"School of Information Technology, Carleton University, Canada","institution_ids":["https://openalex.org/I67031392"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5013046960"],"corresponding_institution_ids":["https://openalex.org/I67031392"],"apc_list":null,"apc_paid":null,"fwci":2.5628,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.89820369,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"136","last_page":"142"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8081097602844238},{"id":"https://openalex.org/keywords/flooding","display_name":"Flooding (psychology)","score":0.6649258136749268},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5839954614639282},{"id":"https://openalex.org/keywords/forwarding-plane","display_name":"Forwarding plane","score":0.5034424662590027},{"id":"https://openalex.org/keywords/slicing","display_name":"Slicing","score":0.42808467149734497},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.329522967338562}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8081097602844238},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.6649258136749268},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5839954614639282},{"id":"https://openalex.org/C10597312","wikidata":"https://www.wikidata.org/wiki/Q5473302","display_name":"Forwarding plane","level":3,"score":0.5034424662590027},{"id":"https://openalex.org/C2776190703","wikidata":"https://www.wikidata.org/wiki/Q488148","display_name":"Slicing","level":2,"score":0.42808467149734497},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.329522967338562},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/drcn60692.2024.10539153","is_oa":false,"landing_page_url":"https://doi.org/10.1109/drcn60692.2024.10539153","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 20th International Conference on the Design of Reliable Communication Networks (DRCN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7900000214576721,"id":"https://metadata.un.org/sdg/13","display_name":"Climate action"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2969501197","https://openalex.org/W2970980649","https://openalex.org/W2988771967","https://openalex.org/W3183258167","https://openalex.org/W3214900114","https://openalex.org/W3217305211","https://openalex.org/W4239396298","https://openalex.org/W4281734774","https://openalex.org/W4283215963","https://openalex.org/W4311802933","https://openalex.org/W4312948783","https://openalex.org/W4323646088","https://openalex.org/W4323650424","https://openalex.org/W4392745102","https://openalex.org/W6791351995","https://openalex.org/W6850882482"],"related_works":["https://openalex.org/W2393746923","https://openalex.org/W2972496411","https://openalex.org/W4239223006","https://openalex.org/W3033662781","https://openalex.org/W2137530048","https://openalex.org/W2360869927","https://openalex.org/W2050876785","https://openalex.org/W2074642116","https://openalex.org/W3164401656","https://openalex.org/W2392031372"],"abstract_inverted_index":{"Virtualized":[0],"Network":[1],"Function":[2,79,84],"(VNF)":[3],"sharing":[4,25,64,70],"among":[5,88],"multiple":[6],"Fifth":[7],"Generation":[8],"(5G)":[9],"slices":[10,38,60,99,166],"allows":[11],"network":[12],"operators":[13],"to":[14],"increase":[15],"the":[16,21,34,37,40,50,56,73,76,89,93,98,103,127,141,153,159,165,172,176],"efficiency":[17],"and":[18,81,95,133,155,170],"utilization":[19],"of":[20,26,33,36,42,52,58,97,108,130,144,164,175],"network.":[22,146],"However,":[23],"this":[24,46],"VNFs":[27,163],"can":[28],"result":[29],"in":[30,39,72,102,152],"a":[31,122,134],"degradation":[32],"performance":[35,57,107,169],"presence":[41],"an":[43],"attack.":[44],"In":[45,158],"paper,":[47],"we":[48],"evaluate":[49],"impact":[51],"flooding":[53,119],"attacks":[54,177],"on":[55],"5G":[59,131,145],"with":[61],"different":[62,114,150],"VNF":[63,69],"configu-rations.":[65],"We":[66],"consider":[67],"two":[68,118],"configurations,":[71],"first":[74],"configuration,":[75],"Session":[77],"Management":[78],"(SMF)":[80],"User":[82],"Plane":[83],"(UPF)":[85],"are":[86,100],"shared":[87],"deployed":[90],"slices,":[91],"while":[92],"SMF":[94],"UPF":[96],"isolated":[101],"second":[104],"configuration.":[105],"The":[106],"these":[109],"configurations":[110],"is":[111],"evaluated":[112],"using":[113],"traffic":[115],"types":[116],"under":[117],"attack":[120,125,138],"scenarios;":[121],"ping":[123],"flood":[124,137],"targeting":[126],"data":[128,156,160],"plane":[129,143],"network,":[132],"registration":[135],"request":[136],"directed":[139],"at":[140],"control":[142,154],"Our":[147],"results":[148],"showed":[149],"responses":[151],"planes.":[157],"plane,":[161],"isolating":[162],"provides":[167],"better":[168],"mitigates":[171],"adverse":[173],"effects":[174],"studied.":[178]},"counts_by_year":[{"year":2025,"cited_by_count":7}],"updated_date":"2026-03-09T08:58:05.943551","created_date":"2025-10-10T00:00:00"}
