2021
DOI: 10.1007/s40747-021-00498-4
|View full text |Cite
|
Sign up to set email alerts
|

An edge based hybrid intrusion detection framework for mobile edge computing

Abstract: The Mobile Edge Computing (MEC) model attracts more users to its services due to its characteristics and rapid delivery approach. This network architecture capability enables users to access the information from the edge of the network. But, the security of this edge network architecture is a big challenge. All the MEC services are available in a shared manner and accessed by users via the Internet. Attacks like the user to root, remote login, Denial of Service (DoS), snooping, port scanning, etc., can be poss… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 34 publications
(11 citation statements)
references
References 91 publications
0
7
0
Order By: Relevance
“…The extra functions given by the SDN innovation empower coordination of an original security instrument like the filtering of the traffic. While in the network function virtualization (NFV) scope, a couple of assessment papers focused on evaluating the presentation and believability of running virtual security machines on the edge using holders like IDS and firewalls [21]. Yet this light virtualization development showed exceptional productivity, it ended up being testing representing the asset obliged IoT devices.…”
Section: Methodsmentioning
confidence: 99%
“…The extra functions given by the SDN innovation empower coordination of an original security instrument like the filtering of the traffic. While in the network function virtualization (NFV) scope, a couple of assessment papers focused on evaluating the presentation and believability of running virtual security machines on the edge using holders like IDS and firewalls [21]. Yet this light virtualization development showed exceptional productivity, it ended up being testing representing the asset obliged IoT devices.…”
Section: Methodsmentioning
confidence: 99%
“…Two main tasks of support layer are authentication and forwarding information towards network layer. Five layer IoT architecture mainly concentrated over the constraints of security as well as memory [35]. Additional two layers are business and processing.…”
Section: Iot Basic Components and Architecturementioning
confidence: 99%
“…Cases of security breaches are widespread in IoT systems as it is overlooked in the framework design process. Figure 1 shows the conceptual overview of edge computing-based IDS detection 5 . In 2016, hackers used the Mirai virus to launch DDoS attacks on a large number of IoT devices (Source: https://www.theguardian.com/technology/2016/oct/ .).…”
Section: Introductionmentioning
confidence: 99%