Real-time monitoring model of DDoS attacks using distance thresholds in Edge cooperation networks

被引:0
作者
Li, Mingyue [1 ,2 ]
Zheng, Liudong [1 ,2 ]
Ma, Xiaoxue [3 ]
Li, Shuang [1 ,2 ]
机构
[1] Hebei Univ, Sch Cyber Secur & Comp, Baoding 071002, Peoples R China
[2] Hebei Univ, Hebei Prov Key Lab High Confidence Informat Syst, Baoding 071002, Peoples R China
[3] Hebei Univ, Dept Comp Teaching, Baoding 071002, Hebei, Peoples R China
关键词
Edge computing; DDoS attack; Distance threshold; Real-time monitoring; Independent model;
D O I
10.1016/j.jisa.2025.103972
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Edge networks have an increasing demand for real-time attack detection as the duration of Distributed Denial- of-Service (DDoS) attacks decreases and causes missing of reporting insecure cases. However, the training and testing time of the existing detection model deployed on the edge server side is more expensive and cannot be well applied in practice. In this paper, we propose a real-time monitoring framework for DDoS attacks with edge server-device collaboration to solve these problems. Specifically, the edge server uses the k-means algorithm to represent the model boundaries and builds a separate group of recognition and monitoring models for each device by splitting the feature vectors. Furthermore, each device monitors the generated data in realtime through the model and submits suspicious data to the edge server for analysis. Finally, the server utilizes the k-neighbor algorithm which adds threshold selection and judgment to fine-grained identify updated benign data and specific categories of attack data. Experimental results show that the proposed scheme can effectively monitor benign data and attack data and identify attack types while the train time, test time and storage cost are less than that of the centralized model.
引用
收藏
页数:10
相关论文
共 31 条
  • [1] Agarwal A, 2022, Wirel Pers Commun, P1
  • [2] Ahmad I., 2020, A Survey on DDoS Attacks in Edge Servers
  • [3] Composite and efficient DDoS attack detection framework for B5G networks
    Amaizu, G. C.
    Nwakanma, C., I
    Bhardwaj, S.
    Lee, J. M.
    Kim, D. S.
    [J]. COMPUTER NETWORKS, 2021, 188
  • [4] Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC
    An, Xingshuo
    Zhou, Xianwei
    Lu, Xing
    Lin, Fuhong
    Yang, Lei
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [5] Babar M, 2022, IEEE Internet Things J
  • [6] Edge Computing Perspectives: Architectures, Technologies, and Open Security Issues
    Caprolu, Maurantonio
    Di Pietro, Roberto
    Lombardi, Flavio
    Raponi, Simone
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING (IEEE EDGE), 2019, : 116 - 123
  • [7] SGPL: An Intelligent Game-Based Secure Collaborative Communication Scheme for Metaverse Over 5G and Beyond Networks
    Chen, Miaojiang
    Liu, Anfeng
    Xiong, Neal N.
    Song, Houbing
    Leung, Victor C. M.
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2024, 42 (03) : 767 - 782
  • [8] GPDS: A multi-agent deep reinforcement learning game for anti-jamming secure computing in MEC network
    Chen, Miaojiang
    Liu, Wei
    Zhang, Ning
    Li, Junling
    Ren, Yingying
    Yi, Meng
    Liu, Anfeng
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2022, 210
  • [9] Novel approach for detection of IoT generated DDoS traffic
    Cvitic, Ivan
    Perakovic, Dragan
    Perisa, Marko
    Botica, Mate
    [J]. WIRELESS NETWORKS, 2021, 27 (03) : 1573 - 1586
  • [10] Timely Detection and Mitigation of Stealthy DDoS Attacks Via IoT Networks
    Doshi, Keval
    Yilmaz, Yasin
    Uludag, Suleyman
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (05) : 2164 - 2176