当前位置: X-MOL 学术J. Ambient Intell. Smart Environ. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
DDoS prevention architecture using anomaly detection in fog-empowered networks
Journal of Ambient Intelligence and Smart Environments ( IF 1.8 ) Pub Date : 2021-05-19 , DOI: 10.3233/ais-210600
Deepak Kumar Sharma 1 , Manish Devgan 2 , Gaurav Malik 2 , Prashant Dutt 2 , Aarti Goel 1 , Deepak Gupta 3 , Fadi Al-Turjman 4
Affiliation  

The world of computation has shown wide variety of wonders in the past decade with Internet of Things (IoT) being one of the most promising technology. Emergence of IoT brings a lot of good to the technology pool with its capability to provide intelligent services to the users. With ease to use, IoT is backed by a strong Cloud based infrastructure which allows the sensory IoT devices to perform specific functions. Important features of cloud are its reliability and security where the latter must be dealt with proper care. Cloud centric systems are susceptible to Denial of Service (DoS) attacks wherein the cloud server is subjected to an overwhelming number of incoming requests by a malicious device. If the same attack is carried out by a network of devices such as IoT devices then it becomes a Distributed DoS (DDoS) attack. A DDoS attack may render the server useless for a long period of time causing the services to crash due to extensive load. This paper proposes a lightweight, efficient and robust method for DDoS attack by detecting the compromised node connected to the Fog node or edge devices before it reaches the cloud by taking advantage of the Fog layer and prevent it from harming any information recorded or from increasing the unnecessary traffic in a network. The chosen technology stack consists of languages and frameworks which allow proposed approach to works in real time complexity for faster execution and is flexible enough to work on low level systems such as the Fog nodes. The proposed approach uses mathematical models for forecasting data points and therefore does not rely on a computationally heavy approach such as neural networks for predicting the expected values. This approach can be easily modelled into the firmware of the system and can help make cloud services more reliable by cutting off rogue nodes that try to attack the cloud at any given point of time.

中文翻译:

雾增强网络中使用异常检测的DDoS预防架构

在过去的十年中,随着物联网(IoT)是最有前途的技术之一,计算世界展现了各种各样的奇迹。物联网的出现为其向用户提供智能服务的能力为技术池带来了很多好处。IoT易于使用,并具有强大的基于云的基础架构支持,该基础架构允许感官IoT设备执行特定功能。云的重要特征是其可靠性和安全性,必须对它们进行适当的处​​理。以云为中心的系统容易受到拒绝服务(DoS)攻击,其中云服务器受到恶意设备大量传入请求的攻击。如果由设备网络(例如IoT设备)进行相同的攻击,则它将成为分布式DoS(DDoS)攻击。DDoS攻击可能会使服务器长时间无法使用,从而由于大量负载而导致服务崩溃。本文提出了一种轻量级,高效且健壮的DDoS攻击方法,该方法通过利用Fog层检测连接到Fog节点或边缘设备的受害节点在到达云之前,先检测其是否受害,并防止其损害记录的任何信息或增加攻击的可能性。网络中不必要的流量。所选的技术堆栈由语言和框架组成,这些语言和框架允许所建议的方法实时复杂地工作以加快执行速度,并且足够灵活以在低级系统(例如Fog节点)上工作。所提出的方法使用数学模型来预测数据点,因此不依赖于诸如神经网络之类的计算量大的方法来预测期望值。这种方法可以轻松地建模到系统的固件中,并且可以通过切断在任何给定时间点尝试攻击云的恶意节点来帮助使云服务更加可靠。
更新日期:2021-05-22
down
wechat
bug