[go: up one dir, main page]

Lin et al., 2022 - Google Patents

AI-based mean field game against resource-consuming attacks in edge computing

Lin et al., 2022

View HTML @Full View
Document ID
8486995086866398573
Author
Lin K
Liu J
Han G
Publication year
Publication venue
ACM Transactions on Sensor Networks

External Links

Snippet

With the rapid development of edge computing, a new paradigm has formed for providing the nearest end service close to the data source. However, insufficient supply of resources makes edge computing devices vulnerable to attacks, especially sensitive to resource …
Continue reading at dl.acm.org (HTML) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources

Similar Documents

Publication Publication Date Title
Kumar et al. A Distributed framework for detecting DDoS attacks in smart contract‐based Blockchain‐IoT Systems by leveraging Fog computing
Liu et al. CPSS LR-DDoS detection and defense in edge computing utilizing DCNN Q-learning
Sedjelmaci et al. Zero trust architecture empowered attack detection framework to secure 6G edge computing
An et al. Sample selected extreme learning machine based intrusion detection in fog computing and MEC
Meng Intrusion detection in the era of IoT: Building trust via traffic filtering and sampling
Wang et al. A polymorphic heterogeneous security architecture for edge-enabled smart grids
Chaudhary et al. Analysis of fuzzy logic based intrusion detection systems in mobile ad hoc networks
Shen et al. MFGD3QN: Enhancing edge intelligence defense against DDoS with mean-field games and dueling double deep Q-network
Kumar et al. An effective DDoS attack mitigation strategy for IoT using an optimization-based adaptive security model
Cruz et al. An intelligent mechanism to detect cyberattacks of Mirai botnet in IoT networks
Sivasakthi et al. HybridRobustNet: enhancing detection of hybrid attacks in IoT networks through advanced learning approach
Dinh et al. Dynamic economic-denial-of-sustainability (EDoS) detection in SDN-based cloud
Harikrishna et al. Rival-Model Penalized Self-Organizing Map enforced DDoS attack prevention mechanism for software defined network-based cloud computing environment
Sedjelmaci et al. On cooperative federated defense to secure multiaccess edge computing
Shen et al. Joint mean-field game and multiagent asynchronous advantage actor-critic for edge intelligence-based IoT malware propagation defense
Sanlı Detection and mitigation of denial of service attacks in internet of things networks
Alkwai et al. Blockchain-based secure 5G/6G communication for internet of things devices in consumer electronic systems
Ning et al. Defense against advanced persistent threats in smart grids: A reinforcement learning approach
Shaker et al. A comparative study of ids-based deep learning models for IoT network
Suthar et al. A survey on ddos detection and prevention mechanism
Fenil et al. Towards a secure software defined network with adaptive mitigation of DDoS attacks by machine learning approaches
Wang et al. Optimal repair strategy against advanced persistent threats under time-varying networks
Lin et al. AI-based mean field game against resource-consuming attacks in edge computing
Kabdjou et al. Cyber deception system based on Monte Carlo simulation in the mobile edge computing (MEC)
Azizpour et al. Nada: new architecture for detecting dos and ddos attacks in fog computing