Mitigating DDoS Attacks in LEO Satellite Networks Through Bottleneck Minimize Routing
Abstract
:1. Introduction
1.1. System Context and Challenge
1.2. Motivation
1.3. Contribution
2. Background and Related Work
2.1. LEO Satellite Network
2.2. Denial of Service Attack
2.3. Satellite Security
3. Model
3.1. Attacker Model
3.1.1. Link and Path Discovery
3.1.2. Path Filtering
3.1.3. Calculation of Feasible Attack Flows
- For all target links the traffic needs slightly higher than the capacity to ensure congestion:
- For all non-target links , the traffic needs slightly higher than the capacity , to ensure that traffic does not become congested:
3.1.4. Iterative Solution
3.2. Defendence Model
4. Algorithm
Algorithm 1. K-Bottleneck Minimize |
Input: G (V, E); source satellite , target satellite , fiber length fiber_len Output: routing in G (V, E)
|
5. Simulation and Result
5.1. Simulation Setup
5.2. Result
5.3. Complexity Analysis
5.4. Limitation
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Lai, Z.; Wang, Y.; Li, H.; Wu, Q.; Zhang, Q.; Hou, Y.; Liu, J.; Li, Y. Your Mega-Constellations Can Be Slim: A Cost-Effective Approach for Constructing Survivable and Performant LEO Satellite Networks. In Proceedings of the IEEE INFOCOM 2024-IEEE Conference on Computer Communications, Vancouver, BC, Canada, 20–23 May 2024; pp. 521–530. [Google Scholar]
- Sun, Y.; Peng, M.; Zhang, S.; Lin, G.; Zhang, P. Integrated satellite-terrestrial networks: Architectures, key techniques, and experimental progress. IEEE Netw. 2022, 36, 191–198. [Google Scholar] [CrossRef]
- Kodheli, O.; Lagunas, E.; Maturo, N.; Sharma, S.K.; Shankar, B.; Montoya, J.F.M.; Duncan, J.C.M.; Spano, D.; Chatzinotas, S.; Kisseleff, S. Satellite communications in the new space era: A survey and future challenges. IEEE Commun. Surv. Tutor. 2020, 23, 70–109. [Google Scholar] [CrossRef]
- Luo, X.; Chen, H.-H.; Guo, Q. LEO/VLEO satellite communications in 6G and beyond networks–technologies, applications, and challenges. IEEE Netw. 2024, 38, 273–285. [Google Scholar] [CrossRef]
- Cui, Y.; Xi, Z.; Zhang, X. A Game Between Cyber Attack and Defense Under the Topology of Satellite Networks. In Proceedings of the International Conference on Guidance, Navigation and Control, Changsha, China, 9–11 August 2024; pp. 5113–5125. [Google Scholar]
- Starlink’s Soaring Subscriber Milestone in 2024: A Closer Look at the Satellite Internet Service’s Growth. Available online: https://newspaceeconomy.ca/2024/09/26/starlinks-soaring-subscriber-milestone-in-2024-a-closer-look-at-the-satellite-internet-services-growth/ (accessed on 30 April 2025).
- McDowell, J. Jonathan’s Space Pages. Available online: https://planet4589.org/space/stats/active.html (accessed on 8 April 2025).
- FCC. SpaceX Non-Geostationary Satellite System, Modification on Satellite Space Station Filing; FCC: Washington, DC, USA, 2019.
- Kim, H.; Lee, H.; Heo, J.; Bang, J.; Hong, D. Ephemeris-based Sum Capacity Enhancement in Multi-Satellite Communication Systems. IEEE Trans. Veh. Technol. 2025, 1–14. [Google Scholar] [CrossRef]
- Liu, K.; Wang, L.; Chen, M. Robust multifunctional single-tone training sequence for free-space optical communication in strong turbulence. Opt. Express 2025, 33, 21660–21677. [Google Scholar] [CrossRef]
- Do, P.H.; Le, T.D.; Berezkin, A.; Kirichek, R. Optimizing Resource Allocation for Multi-beam Satellites Using Genetic Algorithm Variations. In Proceedings of the International Conference on Distributed Computer and Communication Networks, Moscow, Russia, 23–27 September 2024; pp. 16–29. [Google Scholar]
- Yang, Y.; Wu, X.; Li, J.; Zang, J.; Lu, J.; Zgeib, R. Configuration Design Method of Mega Constellation for Low Earth Orbit Observation. Space Sci. Technol. 2024, 4, 0175. [Google Scholar] [CrossRef]
- Wang, R.; Kishk, M.A.; Alouini, M.-S. Stochastic geometry-based low latency routing in massive LEO satellite networks. IEEE Trans. Aerosp. Electron. Syst. 2022, 58, 3881–3894. [Google Scholar] [CrossRef]
- Kumar, R.; Arnon, S. Improving physical layer security of ground stations against geo satellite spoofing attacks. In Proceedings of the International Symposium on Cyber Security, Cryptology, and Machine Learning, Be’er Sheva, Israel, 19–20 December 2024; pp. 458–470. [Google Scholar]
- Salim, S.; Moustafa, N.; Reisslein, M. Cybersecurity of satellite communications systems: A comprehensive survey of the space, ground, and links segments. IEEE Commun. Surv. Tutor. 2024, 27, 372–425. [Google Scholar] [CrossRef]
- Manulis, M.; Bridges, C.P.; Harrison, R.; Sekar, V.; Davis, A. Cyber security in new space: Analysis of threats, key enabling technologies and challenges. Int. J. Inf. Secur. 2021, 20, 287–311. [Google Scholar] [CrossRef]
- Lu, T.; Ding, X.; Shang, J.; Zhao, P.; Zhang, H. DoSat: A DDoS Attack on the Vulnerable Time-Varying Topology of LEO Satellite Networks. In Proceedings of the International Conference on Applied Cryptography and Network Security, Munich, Germany, 23–26 June 2025; pp. 265–282. [Google Scholar]
- Guo, W.; Xu, J.; Pei, Y.; Yin, L.; Jiang, C.; Ge, N. A distributed collaborative entrance Defense framework against DDoS attacks on satellite internet. IEEE Internet Things J. 2022, 9, 15497–15510. [Google Scholar] [CrossRef]
- Wang, Y.; Li, H.; Lai, Z.; Li, J. StarMaze: Ring-based Attack in Satellite Internet Constellations. In Proceedings of the 2024 IEEE/ACM 32nd International Symposium on Quality of Service (IWQoS), Guangzhou, China, 19–21 June 2024; pp. 1–10. [Google Scholar]
- Ribeiro, A. Cydome Analyzes Lab Dookhtegan Cyber Attack on Iranian Oil Tankers, Provides Mitigation Action. Available online: https://industrialcyber.co/transport/cydome-analyzes-lab-dookhtegan-cyber-attack-on-iranian-oil-tankers-provides-mitigation-action/ (accessed on 19 March 2025).
- Giuliari, G.; Ciussani, T.; Perrig, A.; Singla, A. {ICARUS}: Attacking low earth orbit satellite networks. In Proceedings of the 2021 USENIX Annual Technical Conference (USENIX ATC 21), Santa Clara, CA, USA, 14–16 July 2021; pp. 317–331. [Google Scholar]
- Kim, J.; Nam, J.; Lee, S.; Yegneswaran, V.; Porras, P.; Shin, S. BottleNet: Hiding network bottlenecks using SDN-based topology deception. IEEE Trans. Inf. Forensics Secur. 2021, 16, 3138–3153. [Google Scholar] [CrossRef]
- Yan, Y.; Han, G.; Xu, H. A survey on secure routing protocols for satellite network. J. Netw. Comput. Appl. 2019, 145, 102415. [Google Scholar] [CrossRef]
- Ibrahim, H.; Shouman, M.A.; El-Fishawy, N.A.; Ahmed, A. Literature review of blockchain technology in space industry: Challenges and applications. In Proceedings of the 2021 International Conference on Electronic Engineering (ICEEM), Menouf, Egypt, 3–4 July 2021; pp. 1–8. [Google Scholar]
- Sharafian, A.; Ali, A.; Ullah, I.; Khalifa, T.R.; Bai, X.; Qiu, L. Fuzzy adaptive control for consensus tracking in multiagent systems with incommensurate fractional-order dynamics: Application to power systems. Inf. Sci. 2025, 689, 121455. [Google Scholar] [CrossRef]
- Sharafian, A.; Naeem, H.Y.; Ullah, I.; Ali, A.; Qiu, L.; Bai, X. Resilience to deception attacks in consensus tracking control of incommensurate fractional-order power systems via adaptive RBF neural network. Expert Syst. Appl. 2025, 283, 127763. [Google Scholar] [CrossRef]
- Zhuo, M.; Liu, L.; Zhou, S.; Tian, Z. Survey on security issues of routing and anomaly detection for space information networks. Sci. Rep. 2021, 11, 22261. [Google Scholar] [CrossRef]
- Yang, Y.; Yin, X.; Shi, X.; Wang, Z.; He, J.; Fu, T.Z.; Winslett, M. Inter-domain routing bottlenecks and their aggravation. Comput. Netw. 2019, 162, 106839. [Google Scholar] [CrossRef]
- Deng, Y.; Wu, Q.; Lai, Z.; Gu, C.; Li, H.; Li, Y.; Liu, J. Time-varying Bottleneck Links in LEO Satellite Networks: Identification, Exploits, and Countermeasures. In Proceedings of the Network and Distributed System Security Symposium, San Diego, CA, USA, 16–17 February 1995. [Google Scholar]
- Zhang, Y.; Wu, Q.; Lai, Z.; Li, H. Enabling low-latency-capable satellite-ground topology for emerging LEO satellite networks. In Proceedings of the IEEE INFOCOM 2022-IEEE Conference on Computer Communications, Virtual, 2–5 May 2022; pp. 1329–1338. [Google Scholar]
- Guo, B.; Zhang, Z.; Atapattu, S.; Pan, M.; Yan, Y.; Xiong, Z.; Li, H. Enabling Real-time Computing and Transmission Services in Large-Scale LEO Satellite Networks. IEEE Trans. Veh. Technol. 2025. [Google Scholar] [CrossRef]
- Pultarova, T. Starlink Satellites: Facts, Tracking and Impact on Astronomy. Available online: https://www.space.com/spacex-starlink-satellites.html (accessed on 30 April 2025).
- Pearlman, R.Z. SpaceX Launches 28 Starlink Satellites to Orbit on 1st Half of Spaceflight Doubleheader (Video, Photos). Available online: https://www.space.com/space-exploration/launches-spacecraft/spacex-launches-28-starlink-satellites-to-orbit-on-1st-half-of-spaceflight-doubleheader-photos (accessed on 30 April 2025).
- How Many Satellites Does Musk‘s Starlink Have in Orbit? An Expert Analysis. Available online: https://www.historytools.org/companies/how-many-satellites-does-musks-starlink-have-in-orbit?utm_source (accessed on 30 April 2025).
- Chen, Q.; Giambene, G.; Yang, L.; Fan, C.; Chen, X. Analysis of inter-satellite link paths for LEO mega-constellation networks. IEEE Trans. Veh. Technol. 2021, 70, 2743–2755. [Google Scholar] [CrossRef]
- Gomez-del-Hoyo, P.; Samczynski, P. Starlink-based passive radar for Earth’s surface imaging: First experimental results. IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens. 2024, 17, 13949–13965. [Google Scholar] [CrossRef]
- Studer, A.; Perrig, A. The coremelt attack. In Proceedings of the European Symposium on Research in Computer Security, Bydgoszcz, Poland, 16–20 September 2024; pp. 37–52. [Google Scholar]
- Kang, M.S.; Lee, S.B.; Gligor, V.D. The crossfire attack. In Proceedings of the 2013 IEEE symposium on security and privacy, San Francisco, CA, USA, 19–22 May 2013; pp. 127–141. [Google Scholar]
- Hildebrand, C. Satellite Companies, ISPs Feeling the Heat from Hackers. Available online: https://www.netscout.com/blog/satellite-companies-isps-feeling-heat-hackers (accessed on 30 April 2025).
- Sarkar, S.; Datta, R. A secure and energy-efficient stochastic multipath routing for self-organized mobile ad hoc networks. Ad Hoc Netw. 2016, 37, 209–227. [Google Scholar] [CrossRef]
- Bhattacharya, A.; Sinha, K. An efficient protocol for load-balanced multipath routing in mobile ad hoc networks. Ad Hoc Netw. 2017, 63, 104–114. [Google Scholar] [CrossRef]
- Nie, W.; Chen, Y.; Wang, Y.; Wang, P.; Li, M.; Ning, L. Routing networking technology based on improved ant colony algorithm in space-air-ground integrated network. EURASIP J. Adv. Signal Process. 2024, 2024, 34. [Google Scholar] [CrossRef]
- Zhang, S.; Li, X.; Yeung, K.L. Segment routing for traffic engineering and effective recovery in low-earth orbit satellite constellations. Digit. Commun. Netw. 2024, 10, 706–715. [Google Scholar] [CrossRef]
- Fratty, R.; Saar, Y.; Kumar, R.; Arnon, S. Random routing algorithm for enhancing the cybersecurity of LEO satellite networks. Electronics 2023, 12, 518. [Google Scholar] [CrossRef]
- de La Beaujardiere, J.; Mital, R.; Mital, R. Blockchain application within a multi-sensor satellite architecture. In Proceedings of the IGARSS 2019-2019 IEEE International Geoscience and Remote Sensing Symposium, Yokohama, Japan, 28 July–2 August 2019; pp. 5293–5296. [Google Scholar]
- Song, J.; Ju, Y.; Wang, Y.; Zou, Y.; Deng, C.; Yuan, X.; Chen, C. Blockchain Identity Authentication-Aided Trustworthy Multicast Routing Strategy for LEO Satellite Networks. In Proceedings of the 2023 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics), Danzhou, China, 17–21 December 2023; pp. 256–261. [Google Scholar]
- Huang, Y.; Yang, D.; Feng, B.; Tian, A.; Dong, P.; Yu, S.; Zhang, H. A GNN-enabled multipath routing algorithm for spatial-temporal varying LEO satellite networks. IEEE Trans. Veh. Technol. 2023, 73, 5454–5468. [Google Scholar] [CrossRef]
- Liu, Z.; Rong, J.; Jiang, Y.; Zhang, L. Satellite network security routing technology based on deep learning and trust management. Sensors 2023, 23, 8474. [Google Scholar] [CrossRef]
- Li, H.; Shi, D.; Wang, W.; Liao, D.; Gadekallu, T.R.; Yu, K. Secure routing for LEO satellite network survivability. Comput. Netw. 2022, 211, 109011. [Google Scholar] [CrossRef]
- Liu, Z.; Zhu, J.; Zhang, J.; Liu, Q. Routing algorithm design of satellite network architecture based on SDN and ICN. Int. J. Satell. Commun. Netw. 2020, 38, 1–15. [Google Scholar] [CrossRef]
- Tanveer, H.B.; Puchol, M.; Singh, R.; Bianchi, A.; Nithyanand, R. Making sense of constellations: Methodologies for understanding starlink’s scheduling algorithms. In Proceedings of the Companion of the 19th International Conference on Emerging Networking EXperiments and Technologies, Paris, France, 5–8 December 2023; pp. 37–43. [Google Scholar]
- Brodkin, J. SpaceX Starlink Speeds Revealed as Beta Users Get Downloads of 11 to 60 Mbps. Available online: https://arstechnica.com/information-technology/2020/08/spacex-starlink-beta-tests-show-speeds-up-to-60mbps-latency-as-low-as-31ms/ (accessed on 25 May 2025).
- Singla, A.; Chandrasekaran, B.; Godfrey, P.B.; Maggs, B. The internet at the speed of light. In Proceedings of the 13th ACM Workshop on Hot Topics in Networks, Los Angeles, CA, USA, 27–28 October 2014; pp. 1–7. [Google Scholar]
Paper | Key Idea | Limitation |
---|---|---|
[40] | Randomized BFS to build multiple disjoint paths and disperse DDoS traffic | The randomized path is often not the shortest and may go around distant satellites |
[41] | Least Common Multiple-based dynamic billing to balance load | Cannot reflect real-time or historical risk |
[42] | Enhanced ant-colony: pheromone on congested nodes decays, steering traffic away | DDoS attacks may cause routing to suboptimal or wrong paths by distorting heuristic |
[43] | Segment Routing with pre-installed snapshots for latency-aware detours | Reliant on terrestrial relays and not suited for sparse or long-haul networks |
[44] | Bayesian optimization to mix shortest-path and randomized routing dynamically | Routing strategies change frequently, and forwarding tables frequently fluctuate |
[45] | Integrated Blockchain in satellite node, verify the legitimacy of data sources | Smart contracts and a distributed ledger bring delays of more than seconds |
[46] | Combining Blockchain and ant-colony, building multicast trees to isolate attackers. | High blockchain latency and communication overhead limit real-time defense |
[47] | GNN-driven, latency and stability-aware traffic splitting/dropping of attack flows | Training and updating rely on historical snapshots, difficult to respond to changing attacks |
[48] | Combining D-S preprocessing and VAE anomaly detection to generate security factors guiding routing | Only fluctuations in trust vectors and does not track sudden traffic spikes, thus failing to distinguish legitimate bursts from DDoS floods |
[49] | Distributed D–S trust fusion in OSPF to automatically isolate suspicious nodes | Collection and fusion of interactive data is heavy; convergence speed is slow in large network |
[50] | SDN flow rules and ICN edge caching to redirect malicious requests and offload core routers | Requires SDN and ICN deployment, with controller scalability and cache challenges |
Parameters | Values |
---|---|
Satellite | 1584 |
Orbits | 72 |
Satellites per orbit | 22 |
Elevation | 550 km |
Inclination | 53° |
Satellite-to-satellite Bandwidth | 20 Gbps |
Satellite-to-ground Bandwidth | 4 Gbps |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Meng, F.; Yan, X.; Zhang, Y.; Yang, J.; Cao, A.; Liu, R.; Zhao, Y. Mitigating DDoS Attacks in LEO Satellite Networks Through Bottleneck Minimize Routing. Electronics 2025, 14, 2376. https://doi.org/10.3390/electronics14122376
Meng F, Yan X, Zhang Y, Yang J, Cao A, Liu R, Zhao Y. Mitigating DDoS Attacks in LEO Satellite Networks Through Bottleneck Minimize Routing. Electronics. 2025; 14(12):2376. https://doi.org/10.3390/electronics14122376
Chicago/Turabian StyleMeng, Fangzhou, Xiaodan Yan, Yuanjian Zhang, Jian Yang, Ang Cao, Ruiqi Liu, and Yongli Zhao. 2025. "Mitigating DDoS Attacks in LEO Satellite Networks Through Bottleneck Minimize Routing" Electronics 14, no. 12: 2376. https://doi.org/10.3390/electronics14122376
APA StyleMeng, F., Yan, X., Zhang, Y., Yang, J., Cao, A., Liu, R., & Zhao, Y. (2025). Mitigating DDoS Attacks in LEO Satellite Networks Through Bottleneck Minimize Routing. Electronics, 14(12), 2376. https://doi.org/10.3390/electronics14122376