Complex Attack Linkage Decision-Making in Edge Computing Networks

The edge computing network refers to a new paradigm of edge-side big data computing networks, which integrates networks, computing, storage, and business core capabilities. It is close to users, the Internet of Things (IoT), or data source side. The edge computing network is generated by the common...

Full description

Bibliographic Details
Main Authors: Qianmu Li, Shunmei Meng, Sainan Zhang, Jun Hou, Lianyong Qi
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8607977/
id doaj-cd50a7e82350427abaac5417b607ba44
record_format Article
spelling doaj-cd50a7e82350427abaac5417b607ba442021-03-29T22:02:39ZengIEEEIEEE Access2169-35362019-01-017120581207210.1109/ACCESS.2019.28915058607977Complex Attack Linkage Decision-Making in Edge Computing NetworksQianmu Li0https://orcid.org/0000-0002-0998-1517Shunmei Meng1https://orcid.org/0000-0002-6173-9787Sainan Zhang2Jun Hou3Lianyong Qi4https://orcid.org/0000-0001-9875-9856Intelligent Manufacturing Department, Wuyi University, Jiangmen, ChinaSchool of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, ChinaSchool of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, ChinaSchool of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, ChinaSchool of Information Science and Engineering, Qufu Normal University, Rizhao, ChinaThe edge computing network refers to a new paradigm of edge-side big data computing networks, which integrates networks, computing, storage, and business core capabilities. It is close to users, the Internet of Things (IoT), or data source side. The edge computing network is generated by the common development of cloud computing and the IoT. The core is the massive uplink monitoring collection and downlink decision-making control big data generated by intelligent sensing devices, solving the problem of low data computing efficiency and performance under the centralized cloud computing model. Compared with traditional cloud computing networks, the edge computing network has more abundant terminal types, more frequent data real-time interaction, more complex transmission network technology systems, and more intelligent and interconnected business systems. Moreover, this situation is aggravated with the mobile edge computing, e.g., model proximity service increasingly prevalent in daily life. However, the ubiquitous and open features of edge computing networks expose network security risks to all parts of the system, facing severe security protection challenges. To solve the linkage disposal and minimum cost response of complex attacks, we propose an attack linkage disposal decision-making method for edge computing network systems based on attribute attack graphs. A simplified attribute attack graph is constructed through the network security alarm association and false-alarm determination, and formal correlation analysis is performed on the causal relationship of the alarm information. On this basis, the linkage defense strategy decision computing is transformed into the minimum dominance set solution of the attribute attack graph. Finally, a linkage disposal strategy execution point decision algorithm based on the greedy algorithm is designed, which constructs a set of attack linkage disposal decision-making technologies with optimal defense cost. It provides a powerful guarantee for timely and effectively active defense.https://ieeexplore.ieee.org/document/8607977/Edge computing networkcomplex attack detectionattribute attack graphlinkage defense
collection DOAJ
language English
format Article
sources DOAJ
author Qianmu Li
Shunmei Meng
Sainan Zhang
Jun Hou
Lianyong Qi
spellingShingle Qianmu Li
Shunmei Meng
Sainan Zhang
Jun Hou
Lianyong Qi
Complex Attack Linkage Decision-Making in Edge Computing Networks
IEEE Access
Edge computing network
complex attack detection
attribute attack graph
linkage defense
author_facet Qianmu Li
Shunmei Meng
Sainan Zhang
Jun Hou
Lianyong Qi
author_sort Qianmu Li
title Complex Attack Linkage Decision-Making in Edge Computing Networks
title_short Complex Attack Linkage Decision-Making in Edge Computing Networks
title_full Complex Attack Linkage Decision-Making in Edge Computing Networks
title_fullStr Complex Attack Linkage Decision-Making in Edge Computing Networks
title_full_unstemmed Complex Attack Linkage Decision-Making in Edge Computing Networks
title_sort complex attack linkage decision-making in edge computing networks
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2019-01-01
description The edge computing network refers to a new paradigm of edge-side big data computing networks, which integrates networks, computing, storage, and business core capabilities. It is close to users, the Internet of Things (IoT), or data source side. The edge computing network is generated by the common development of cloud computing and the IoT. The core is the massive uplink monitoring collection and downlink decision-making control big data generated by intelligent sensing devices, solving the problem of low data computing efficiency and performance under the centralized cloud computing model. Compared with traditional cloud computing networks, the edge computing network has more abundant terminal types, more frequent data real-time interaction, more complex transmission network technology systems, and more intelligent and interconnected business systems. Moreover, this situation is aggravated with the mobile edge computing, e.g., model proximity service increasingly prevalent in daily life. However, the ubiquitous and open features of edge computing networks expose network security risks to all parts of the system, facing severe security protection challenges. To solve the linkage disposal and minimum cost response of complex attacks, we propose an attack linkage disposal decision-making method for edge computing network systems based on attribute attack graphs. A simplified attribute attack graph is constructed through the network security alarm association and false-alarm determination, and formal correlation analysis is performed on the causal relationship of the alarm information. On this basis, the linkage defense strategy decision computing is transformed into the minimum dominance set solution of the attribute attack graph. Finally, a linkage disposal strategy execution point decision algorithm based on the greedy algorithm is designed, which constructs a set of attack linkage disposal decision-making technologies with optimal defense cost. It provides a powerful guarantee for timely and effectively active defense.
topic Edge computing network
complex attack detection
attribute attack graph
linkage defense
url https://ieeexplore.ieee.org/document/8607977/
work_keys_str_mv AT qianmuli complexattacklinkagedecisionmakinginedgecomputingnetworks
AT shunmeimeng complexattacklinkagedecisionmakinginedgecomputingnetworks
AT sainanzhang complexattacklinkagedecisionmakinginedgecomputingnetworks
AT junhou complexattacklinkagedecisionmakinginedgecomputingnetworks
AT lianyongqi complexattacklinkagedecisionmakinginedgecomputingnetworks
_version_ 1724192320097615872