scispace - formally typeset
Journal ArticleDOI

Intelligent Cache Pollution Attacks Detection for Edge Computing Enabled Mobile Social Networks

Reads0
Chats0
TLDR
A hidden Markov model (HMM) based CPAttack detection scheme in edge-enabled MSNs is proposed and simulation results demonstrate that the proposed scheme can efficiently improve edge devices’ abilities to sense the CPATTack.
Abstract
With the rapid advances of wireless technologies and popularization of smart mobile devices, edge-enabled mobile social networks (MSNs) have emerged as a promising network paradigm for mobile users to deliver, share, and exchange contents with each other. By leveraging edge caching technology, various content services can be provided to mobile users for improving their quality of experience (QoE). However, edge caching is vulnerable to cache pollution attacks (CPAttacks) with the result of disruptive content delivery. To tackle this problem, we propose a hidden Markov model (HMM) based CPAttack detection scheme in edge-enabled MSNs. Specifically, we first present the CPAttack model based on observations of attacking behaviors. According to the CPAttack model, the caching state of the edge device is characterized by two parameters-content request rate and cache missing rate. Then, with observation sequence constructed by caching states, we develop an HMM-based detection algorithm to distinguish the CPAttack in the approximately time-invariant content request process. To deal with the lack of training data and dynamic of caching states, an adaptive HMM (AHMM) based algorithm is designed to detect the CPAttack in the time-varying content request process. The simulation results demonstrate that the proposed scheme can efficiently improve edge devices’ abilities to sense the CPAttack.

read more

Citations
More filters
Journal ArticleDOI

Edge Computing Technology Enablers: A Systematic Lecture Study

TL;DR: A detailed, thorough, and well-structured assessment of Edge Computing and its enabling technologies is presented, starting with Edge Intelligence, the branch of Artificial Intelligence that integrates AI models at resource-constrained edge nodes with significant heterogeneity and mobility.
Journal ArticleDOI

Request pattern change-based cache pollution attack detection and defense in edge computing

TL;DR: Wang et al. as discussed by the authors proposed an eavesdropping-based CPA strategy, which integrated the dynamic nature of content request and mobile devices into the edge caching framework, and introduced an edge caching mechanism, which contains a Request Pattern Change-based Cache Pollution Detection (RPC2PD) algorithm and an Attack-aware Cache Defense (ACD) algorithm, to defend against CPAs.
Book ChapterDOI

Privacy Issues in Edge Computing

TL;DR: In this article, the authors proposed edge computing extends computing from the cloud to the end near the user and directly processes and makes decisions on the data locally to avoid the long-distance transmission of data in the network and reduce the risk of privacy disclosure.
Journal ArticleDOI

A Survey on Digital Twins: Architecture, Enabling Technologies, Security and Privacy, and Future Prospects

TL;DR: In this article , the authors present an in-depth review of the Internet of digital twins (IoDT) with respect to system architecture, enabling technologies, and security/privacy issues.
Journal ArticleDOI

Collaborative and Intelligent Resource Optimization for Computing and Caching in IoV With Blockchain and MEC Using A3C Approach

TL;DR: In this article , the authors developed an intelligent framework of resource allocation about computing and caching for blockchain-enabled MEC systems in IoV, where the offloading decision of computation task carried by vehicle, caching decision, the number of offloaded consensus nodes, block interval and block size, the weighted consumption costs of energy consumption and computation overheads can be decreased, and the transactional throughput of the blockchain can be increased.
References
More filters

Interest flooding attack and countermeasures in Named Data Networking

TL;DR: This paper investigates effective solutions to mitigate Interest flooding and shows that NDN's inherent properties of storing per packet state on each router and maintaining flow balance provides the basis for effective DDoS mitigation algorithms.
Journal ArticleDOI

Software-Defined Networks with Mobile Edge Computing and Caching for Smart Cities: A Big Data Deep Reinforcement Learning Approach

TL;DR: An integrated framework that can enable dynamic orchestration of networking, caching, and computing resources to improve the performance of applications for smart cities is proposed and a novel big data deep reinforcement learning approach is presented.
Proceedings ArticleDOI

Pollution in P2P file sharing systems

TL;DR: A measurement study of the nature and magnitude of pollution in the FastTrack P2P network, currently the most popular P1P file sharing system, and an automated procedure to detect whether a given version is polluted or not.
Proceedings ArticleDOI

Approximate Models for General Cache Networks

TL;DR: A new algorithm is proposed, termed a-Net, that approximates the behavior of multi-cache networks by leveraging existing approximation algorithms for isolated LRU caches and it is demonstrated the utility of a- net using both per- cache and network-wide performance measures.
Posted Content

Security, Privacy, and Access Control in Information-Centric Networking: A Survey

TL;DR: In this article, the authors survey the existing literature in security and privacy sub-space in ICN and explore three broad areas: security threats, privacy risks, and access control enforcement mechanisms.
Related Papers (5)