Mobile Computing, Applications, and Services. 10th EAI International Conference, MobiCASE 2019, Hangzhou, China, June 14–15, 2019, Proceedings

Research Article

An Active Defense Model in Edge Computing Based on Network Topology Mimetic Correlation

  • @INPROCEEDINGS{10.1007/978-3-030-28468-8_15,
        author={Shuo Wang and Qianmu Li and Shunmei Meng and Bo Zhang and Cangqi Zhou},
        title={An Active Defense Model in Edge Computing Based on Network Topology Mimetic Correlation},
        proceedings={Mobile Computing, Applications, and Services. 10th EAI International Conference, MobiCASE 2019, Hangzhou, China, June 14--15, 2019, Proceedings},
        proceedings_a={MOBICASE},
        year={2019},
        month={9},
        keywords={Network attack Active defense Edge computing},
        doi={10.1007/978-3-030-28468-8_15}
    }
    
  • Shuo Wang
    Qianmu Li
    Shunmei Meng
    Bo Zhang
    Cangqi Zhou
    Year: 2019
    An Active Defense Model in Edge Computing Based on Network Topology Mimetic Correlation
    MOBICASE
    Springer
    DOI: 10.1007/978-3-030-28468-8_15
Shuo Wang1, Qianmu Li,*, Shunmei Meng1, Bo Zhang1, Cangqi Zhou1
  • 1: Nanjing University of Science and Technology
*Contact email: qianmu@njust.edu.cn

Abstract

A large amount of real-time data, including user privacy information, control commands, and other sensitive data, are transmitted in edge computing networks. Aiming at the high-speed and reliable transmission requirements of data in the uncontrollable environment of edge computing networks, and maximizing the defense revenue, this paper proposes an active defense method for data interaction attacks in edge computing networks based on network topology mimic correlation, by pseudo-randomly constructing a moving communication path alliance and combining the network security state with a reliable prediction of transmission. A network topology mimetic association diagram and a communication path alliance mimetic transformation method based on dynamic threshold are proposed to ensure the data transmission service quality of the active defense technology of edge computing networks. The active defense model of the edge data network interaction process against the new attack and with the optimal defense cost is constructed, which provides a powerful guarantee for the active defense before the attack. The experimental results show that our method outperforms the popular methods in terms of transmission efficiency, reliability, and anti-attack performance.