Lin et al., 2022 - Google Patents
AI-based mean field game against resource-consuming attacks in edge computingLin et al., 2022
View HTML- Document ID
- 8486995086866398573
- Author
- Lin K
- Liu J
- Han G
- Publication year
- Publication venue
- ACM Transactions on Sensor Networks
External Links
Snippet
With the rapid development of edge computing, a new paradigm has formed for providing the nearest end service close to the data source. However, insufficient supply of resources makes edge computing devices vulnerable to attacks, especially sensitive to resource …
- 238000004422 calculation algorithm 0 abstract description 45
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Kumar et al. | A Distributed framework for detecting DDoS attacks in smart contract‐based Blockchain‐IoT Systems by leveraging Fog computing | |
| Liu et al. | CPSS LR-DDoS detection and defense in edge computing utilizing DCNN Q-learning | |
| Sedjelmaci et al. | Zero trust architecture empowered attack detection framework to secure 6G edge computing | |
| An et al. | Sample selected extreme learning machine based intrusion detection in fog computing and MEC | |
| Meng | Intrusion detection in the era of IoT: Building trust via traffic filtering and sampling | |
| Wang et al. | A polymorphic heterogeneous security architecture for edge-enabled smart grids | |
| Chaudhary et al. | Analysis of fuzzy logic based intrusion detection systems in mobile ad hoc networks | |
| Shen et al. | MFGD3QN: Enhancing edge intelligence defense against DDoS with mean-field games and dueling double deep Q-network | |
| Kumar et al. | An effective DDoS attack mitigation strategy for IoT using an optimization-based adaptive security model | |
| Cruz et al. | An intelligent mechanism to detect cyberattacks of Mirai botnet in IoT networks | |
| Sivasakthi et al. | HybridRobustNet: enhancing detection of hybrid attacks in IoT networks through advanced learning approach | |
| Dinh et al. | Dynamic economic-denial-of-sustainability (EDoS) detection in SDN-based cloud | |
| Harikrishna et al. | Rival-Model Penalized Self-Organizing Map enforced DDoS attack prevention mechanism for software defined network-based cloud computing environment | |
| Sedjelmaci et al. | On cooperative federated defense to secure multiaccess edge computing | |
| Shen et al. | Joint mean-field game and multiagent asynchronous advantage actor-critic for edge intelligence-based IoT malware propagation defense | |
| Sanlı | Detection and mitigation of denial of service attacks in internet of things networks | |
| Alkwai et al. | Blockchain-based secure 5G/6G communication for internet of things devices in consumer electronic systems | |
| Ning et al. | Defense against advanced persistent threats in smart grids: A reinforcement learning approach | |
| Shaker et al. | A comparative study of ids-based deep learning models for IoT network | |
| Suthar et al. | A survey on ddos detection and prevention mechanism | |
| Fenil et al. | Towards a secure software defined network with adaptive mitigation of DDoS attacks by machine learning approaches | |
| Wang et al. | Optimal repair strategy against advanced persistent threats under time-varying networks | |
| Lin et al. | AI-based mean field game against resource-consuming attacks in edge computing | |
| Kabdjou et al. | Cyber deception system based on Monte Carlo simulation in the mobile edge computing (MEC) | |
| Azizpour et al. | Nada: new architecture for detecting dos and ddos attacks in fog computing |