2019
DOI: 10.1109/tii.2019.2907754
|View full text |Cite
|
Sign up to set email alerts
|

Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment

Abstract: Edge computing is providing higher class intelligent service and computing capabilities at the edge of the network. The aim is to ease the backhaul impacts and offer an improved user experience, however, the edge artificial intelligence exacerbates the security of the cloud computing environment due to the dissociation of data, access control and service stages. In order to prevent users from using the edge-cloud computing environment to carry out lateral movement attacks, we proposed a method named CloudSEC m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
89
0
1

Year Published

2019
2019
2021
2021

Publication Types

Select...
7
2

Relationship

4
5

Authors

Journals

citations
Cited by 192 publications
(90 citation statements)
references
References 28 publications
0
89
0
1
Order By: Relevance
“…With the communication capacity provided by the smart grid and VANET, the charging pile can negotiate with an EV based on these running data. It can also sense the distribution of nearby EVs and their charging demands [24][25][26]. Charging pile may advertise the quality and availability of service to the EVs which can make decision of charging choice to eliminate the waste of time and energy in case of choosing another pile due to capacity limit and profile mismatch.…”
Section: Modeling Of Charging Pilementioning
confidence: 99%
“…With the communication capacity provided by the smart grid and VANET, the charging pile can negotiate with an EV based on these running data. It can also sense the distribution of nearby EVs and their charging demands [24][25][26]. Charging pile may advertise the quality and availability of service to the EVs which can make decision of charging choice to eliminate the waste of time and energy in case of choosing another pile due to capacity limit and profile mismatch.…”
Section: Modeling Of Charging Pilementioning
confidence: 99%
“…As shown above, the rise of new technologies (e.g. Internet of Vehicles, [34][35][36][37] Heterogeneous Sensor Networks, [38][39][40][41][42][43] Edge Computing, 44,45 Smart City, 46 Blockchain) [47][48][49] makes CIA unsuitable. In this section, we will answer two fundamental problems: which security properties are fundamental?…”
Section: Connotation Of Information Securitymentioning
confidence: 99%
“…In order to achieve better results, the defense decisionmaking approach based on WoLF-PHC needs to set four parameters Ī±, Ī“, Ī», and c reasonably. (1) e range of the payoff learning rate is 0 < Ī± < 1. e bigger the representative Ī± is, the more important the cumulative reward is. e faster the learning speed is, the smaller Ī± is and the better the stability of the algorithm is.…”
Section: Defense Decision-making Algorithm Based On Improvedmentioning
confidence: 99%
“…With the continuous strengthening of social informatization, cyber attacks are becoming more frequent, causing tremendous losses to defenders [1]. Because of the complexity of the network itself and the limitation of the defender's ability, the network cannot achieve absolute security.…”
Section: Introductionmentioning
confidence: 99%