Journal ArticleDOI
Intelligent Cache Pollution Attacks Detection for Edge Computing Enabled Mobile Social Networks
Qichao Xu,Zhou Su,Kuan Zhang,Peng Li +3 more
- Vol. 4, Iss: 3, pp 241-252
Reads0
Chats0
TLDR
A hidden Markov model (HMM) based CPAttack detection scheme in edge-enabled MSNs is proposed and simulation results demonstrate that the proposed scheme can efficiently improve edge devices’ abilities to sense the CPATTack.Abstract:
With the rapid advances of wireless technologies and popularization of smart mobile devices, edge-enabled mobile social networks (MSNs) have emerged as a promising network paradigm for mobile users to deliver, share, and exchange contents with each other. By leveraging edge caching technology, various content services can be provided to mobile users for improving their quality of experience (QoE). However, edge caching is vulnerable to cache pollution attacks (CPAttacks) with the result of disruptive content delivery. To tackle this problem, we propose a hidden Markov model (HMM) based CPAttack detection scheme in edge-enabled MSNs. Specifically, we first present the CPAttack model based on observations of attacking behaviors. According to the CPAttack model, the caching state of the edge device is characterized by two parameters-content request rate and cache missing rate. Then, with observation sequence constructed by caching states, we develop an HMM-based detection algorithm to distinguish the CPAttack in the approximately time-invariant content request process. To deal with the lack of training data and dynamic of caching states, an adaptive HMM (AHMM) based algorithm is designed to detect the CPAttack in the time-varying content request process. The simulation results demonstrate that the proposed scheme can efficiently improve edge devices’ abilities to sense the CPAttack.read more
Citations
More filters
Journal ArticleDOI
Edge Computing Technology Enablers: A Systematic Lecture Study
TL;DR: A detailed, thorough, and well-structured assessment of Edge Computing and its enabling technologies is presented, starting with Edge Intelligence, the branch of Artificial Intelligence that integrates AI models at resource-constrained edge nodes with significant heterogeneity and mobility.
Journal ArticleDOI
Request pattern change-based cache pollution attack detection and defense in edge computing
TL;DR: Wang et al. as discussed by the authors proposed an eavesdropping-based CPA strategy, which integrated the dynamic nature of content request and mobile devices into the edge caching framework, and introduced an edge caching mechanism, which contains a Request Pattern Change-based Cache Pollution Detection (RPC2PD) algorithm and an Attack-aware Cache Defense (ACD) algorithm, to defend against CPAs.
Book ChapterDOI
Privacy Issues in Edge Computing
TL;DR: In this article, the authors proposed edge computing extends computing from the cloud to the end near the user and directly processes and makes decisions on the data locally to avoid the long-distance transmission of data in the network and reduce the risk of privacy disclosure.
Journal ArticleDOI
A Survey on Digital Twins: Architecture, Enabling Technologies, Security and Privacy, and Future Prospects
TL;DR: In this article , the authors present an in-depth review of the Internet of digital twins (IoDT) with respect to system architecture, enabling technologies, and security/privacy issues.
Journal ArticleDOI
Collaborative and Intelligent Resource Optimization for Computing and Caching in IoV With Blockchain and MEC Using A3C Approach
TL;DR: In this article , the authors developed an intelligent framework of resource allocation about computing and caching for blockchain-enabled MEC systems in IoV, where the offloading decision of computation task carried by vehicle, caching decision, the number of offloaded consensus nodes, block interval and block size, the weighted consumption costs of energy consumption and computation overheads can be decreased, and the transactional throughput of the blockchain can be increased.
References
More filters
Interest flooding attack and countermeasures in Named Data Networking
TL;DR: This paper investigates effective solutions to mitigate Interest flooding and shows that NDN's inherent properties of storing per packet state on each router and maintaining flow balance provides the basis for effective DDoS mitigation algorithms.
Journal ArticleDOI
Software-Defined Networks with Mobile Edge Computing and Caching for Smart Cities: A Big Data Deep Reinforcement Learning Approach
TL;DR: An integrated framework that can enable dynamic orchestration of networking, caching, and computing resources to improve the performance of applications for smart cities is proposed and a novel big data deep reinforcement learning approach is presented.
Proceedings ArticleDOI
Pollution in P2P file sharing systems
TL;DR: A measurement study of the nature and magnitude of pollution in the FastTrack P2P network, currently the most popular P1P file sharing system, and an automated procedure to detect whether a given version is polluted or not.
Proceedings ArticleDOI
Approximate Models for General Cache Networks
TL;DR: A new algorithm is proposed, termed a-Net, that approximates the behavior of multi-cache networks by leveraging existing approximation algorithms for isolated LRU caches and it is demonstrated the utility of a- net using both per- cache and network-wide performance measures.
Posted Content
Security, Privacy, and Access Control in Information-Centric Networking: A Survey
TL;DR: In this article, the authors survey the existing literature in security and privacy sub-space in ICN and explore three broad areas: security threats, privacy risks, and access control enforcement mechanisms.