Complex Attack Linkage Decision-Making in Edge Computing Networks
The edge computing network refers to a new paradigm of edge-side big data computing networks, which integrates networks, computing, storage, and business core capabilities. It is close to users, the Internet of Things (IoT), or data source side. The edge computing network is generated by the common...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8607977/ |
id |
doaj-cd50a7e82350427abaac5417b607ba44 |
---|---|
record_format |
Article |
spelling |
doaj-cd50a7e82350427abaac5417b607ba442021-03-29T22:02:39ZengIEEEIEEE Access2169-35362019-01-017120581207210.1109/ACCESS.2019.28915058607977Complex Attack Linkage Decision-Making in Edge Computing NetworksQianmu Li0https://orcid.org/0000-0002-0998-1517Shunmei Meng1https://orcid.org/0000-0002-6173-9787Sainan Zhang2Jun Hou3Lianyong Qi4https://orcid.org/0000-0001-9875-9856Intelligent Manufacturing Department, Wuyi University, Jiangmen, ChinaSchool of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, ChinaSchool of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, ChinaSchool of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, ChinaSchool of Information Science and Engineering, Qufu Normal University, Rizhao, ChinaThe edge computing network refers to a new paradigm of edge-side big data computing networks, which integrates networks, computing, storage, and business core capabilities. It is close to users, the Internet of Things (IoT), or data source side. The edge computing network is generated by the common development of cloud computing and the IoT. The core is the massive uplink monitoring collection and downlink decision-making control big data generated by intelligent sensing devices, solving the problem of low data computing efficiency and performance under the centralized cloud computing model. Compared with traditional cloud computing networks, the edge computing network has more abundant terminal types, more frequent data real-time interaction, more complex transmission network technology systems, and more intelligent and interconnected business systems. Moreover, this situation is aggravated with the mobile edge computing, e.g., model proximity service increasingly prevalent in daily life. However, the ubiquitous and open features of edge computing networks expose network security risks to all parts of the system, facing severe security protection challenges. To solve the linkage disposal and minimum cost response of complex attacks, we propose an attack linkage disposal decision-making method for edge computing network systems based on attribute attack graphs. A simplified attribute attack graph is constructed through the network security alarm association and false-alarm determination, and formal correlation analysis is performed on the causal relationship of the alarm information. On this basis, the linkage defense strategy decision computing is transformed into the minimum dominance set solution of the attribute attack graph. Finally, a linkage disposal strategy execution point decision algorithm based on the greedy algorithm is designed, which constructs a set of attack linkage disposal decision-making technologies with optimal defense cost. It provides a powerful guarantee for timely and effectively active defense.https://ieeexplore.ieee.org/document/8607977/Edge computing networkcomplex attack detectionattribute attack graphlinkage defense |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Qianmu Li Shunmei Meng Sainan Zhang Jun Hou Lianyong Qi |
spellingShingle |
Qianmu Li Shunmei Meng Sainan Zhang Jun Hou Lianyong Qi Complex Attack Linkage Decision-Making in Edge Computing Networks IEEE Access Edge computing network complex attack detection attribute attack graph linkage defense |
author_facet |
Qianmu Li Shunmei Meng Sainan Zhang Jun Hou Lianyong Qi |
author_sort |
Qianmu Li |
title |
Complex Attack Linkage Decision-Making in Edge Computing Networks |
title_short |
Complex Attack Linkage Decision-Making in Edge Computing Networks |
title_full |
Complex Attack Linkage Decision-Making in Edge Computing Networks |
title_fullStr |
Complex Attack Linkage Decision-Making in Edge Computing Networks |
title_full_unstemmed |
Complex Attack Linkage Decision-Making in Edge Computing Networks |
title_sort |
complex attack linkage decision-making in edge computing networks |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2019-01-01 |
description |
The edge computing network refers to a new paradigm of edge-side big data computing networks, which integrates networks, computing, storage, and business core capabilities. It is close to users, the Internet of Things (IoT), or data source side. The edge computing network is generated by the common development of cloud computing and the IoT. The core is the massive uplink monitoring collection and downlink decision-making control big data generated by intelligent sensing devices, solving the problem of low data computing efficiency and performance under the centralized cloud computing model. Compared with traditional cloud computing networks, the edge computing network has more abundant terminal types, more frequent data real-time interaction, more complex transmission network technology systems, and more intelligent and interconnected business systems. Moreover, this situation is aggravated with the mobile edge computing, e.g., model proximity service increasingly prevalent in daily life. However, the ubiquitous and open features of edge computing networks expose network security risks to all parts of the system, facing severe security protection challenges. To solve the linkage disposal and minimum cost response of complex attacks, we propose an attack linkage disposal decision-making method for edge computing network systems based on attribute attack graphs. A simplified attribute attack graph is constructed through the network security alarm association and false-alarm determination, and formal correlation analysis is performed on the causal relationship of the alarm information. On this basis, the linkage defense strategy decision computing is transformed into the minimum dominance set solution of the attribute attack graph. Finally, a linkage disposal strategy execution point decision algorithm based on the greedy algorithm is designed, which constructs a set of attack linkage disposal decision-making technologies with optimal defense cost. It provides a powerful guarantee for timely and effectively active defense. |
topic |
Edge computing network complex attack detection attribute attack graph linkage defense |
url |
https://ieeexplore.ieee.org/document/8607977/ |
work_keys_str_mv |
AT qianmuli complexattacklinkagedecisionmakinginedgecomputingnetworks AT shunmeimeng complexattacklinkagedecisionmakinginedgecomputingnetworks AT sainanzhang complexattacklinkagedecisionmakinginedgecomputingnetworks AT junhou complexattacklinkagedecisionmakinginedgecomputingnetworks AT lianyongqi complexattacklinkagedecisionmakinginedgecomputingnetworks |
_version_ |
1724192320097615872 |