Discover the SciOpen Platform and Achieve Your Research Goals with Ease.
Search articles, authors, keywords, DOl and etc.
Mobile Edge Computing (MEC) is a pivotal technology that provides agile-response services by deploying computation and storage resources in proximity to end-users. However, resource-constrained edge servers fall victim to Denial-of-Service (DoS) attacks easily. Failures to mitigate DoS attacks effectively hinder the delivery of reliable and sustainable edge services. Conventional DoS mitigation solutions in cloud computing environments are not directly applicable in MEC environments because their design did not factor in the unique characteristics of MEC environments, e.g., constrained resources on edge servers and requirements for low service latency. Existing solutions mitigate edge DoS attacks by transferring user requests from edge servers under attacks to others for processing. Furthermore, the heterogeneity in end-users’ resource demands can cause resource fragmentation on edge servers and undermine the ability of these solutions to mitigate DoS attacks effectively. User requests often have to be transferred far away for processing, which increases the service latency. To tackle this challenge, this paper presents a fragmentation-aware gaming approach called HEDMGame that attempts to minimize service latency by matching user requests to edge servers’ remaining resources while making request-transferring decisions. Through theoretical analysis and experimental evaluation, we validate the effectiveness and efficiency of HEDMGame, and demonstrate its superiority over the state-of-the-art solution.
P. Mach and Z. Becvar, Mobile edge computing: A survey on architecture and computation offloading, IEEE Commun. Surv. Tutor., vol. 19, no. 3, pp. 1628–1656, 2017.
G. Mitsis, E. E. Tsiropoulou, and S. Papavassiliou, Price and risk awareness for data offloading decision-making in edge computing systems, IEEE Syst. J., vol. 16, no. 4, pp. 6546–6557, 2022.
Y. Chen, K. Li, Y. Wu, J. Huang, and L. Zhao, Energy efficient task offloading and resource allocation in air-ground integrated MEC systems: A distributed online approach, IEEE Trans. Mob. Comput., vol. 23, no. 8, pp. 8129–8142, 2024.
X. Xia, F. Chen, Q. He, J. Grundy, A. Mohamed, and H. Jin, Online collaborative data caching in edge computing, IEEE Trans. Parallel Distrib. Syst., vol. 32, no. 2, pp. 281–294, 2021.
Y. Xiao, Y. Jia, C. Liu, X. Cheng, J. Yu, and W. Lv, Edge computing security: State of the art and challenges, Proc. IEEE, vol. 107, no. 8, pp. 1608–1631, 2019.
P. Ranaweera, A. D. Jurcut, and M. Liyanage, Survey on multi-access edge computing security and privacy, IEEE Commun. Surv. Tutor., vol. 23, no. 2, pp. 1078–1124, 2021.
Y. Al-Hadhrami and F. K. Hussain, DDoS attacks in IoT networks: A comprehensive systematic literature review, World Wide Web, vol. 24, no. 3, pp. 971–1001, 2021.
Q. He, G. Cui, X. Zhang, F. Chen, S. Deng, H. Jin, Y. Li, and Y. Yang, A game-theoretical approach for user allocation in edge computing environment, IEEE Trans. Parallel Distrib. Syst., vol. 31, no. 3, pp. 515–529, 2020.
G. S. Kushwah and V. Ranga, Optimized extreme learning machine for detecting DDoS attacks in cloud computing, Comput. Secur., vol. 105, p. 102260, 2021.
S. Yu, Y. Tian, S. Guo, and D. O. Wu, Can we beat DDoS attacks in clouds? IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 9, pp. 2245–2254, 2014.
L. Gu, M. Cui, L. Xu, and X. Xu, Collaborative offloading method for digital twin empowered cloud edge computing on Internet of vehicles, Tsinghua Science and Technology, vol. 28, no. 3, pp. 433–451, 2023.
Q. He, C. Wang, G. Cui, B. Li, R. Zhou, Q. Zhou, Y. Xiang, H. Jin, and Y. Yang, A game-theoretical approach for mitigating edge DDoS attack, IEEE Trans. Depend. Secur. Comput., vol. 19, no. 4, pp. 2333–2348, 2022.
J. Huang, B. Ma, M. Wang, X. Zhou, L. Yao, S. Wang, L. Qi, and Y. Chen, Incentive mechanism design of federated learning for recommendation systems in MEC, IEEE Trans. Consum. Electr., vol. 70, no. 1, pp. 2596–2607, 2024.
Y. Chen, J. Xu, Y. Wu, J. Gao, and L. Zhao, Dynamic task offloading and resource allocation for NOMA-aided mobile edge computing: An energy efficient design, IEEE Trans. Serv. Comput., vol. 17, no. 4, pp. 1492–1503, 2024.
J. Mirkovic and P. Reiher, A taxonomy of DDoS attack and DDoS defense mechanisms, SIGCOMM Comput. Commun. Rev., vol. 34, no. 2, pp. 39–53, 2004.
M. S. El Sayed, N.-A. Le-Khac, M. A. Azer, and A. D. Jurcut, A flow-based anomaly detection approach with feature selection method against DDoS attacks in SDNs, IEEE Trans. Cogn. Commun. Netw., vol. 8, no. 4, pp. 1862–1880, 2022.
B. Hussain, Q. Du, B. Sun, and Z. Han, Deep learning-based DDoS-attack detection for cyber–physical system over 5G network, IEEE Trans. Ind. Inf., vol. 17, no. 2, pp. 860–870, 2021.
I. Farris, T. Taleb, Y. Khettab, and J. Song, A survey on emerging SDN and NFV security mechanisms for IoT systems, IEEE Commun. Surv. Tutorials, vol. 21, no. 1, pp. 812–837, 2019.
S. Myneni, A. Chowdhary, D. Huang, and A. Alshamrani, SmartDefense: A distributed deep defense against DDoS attacks with edge computing, Comput. Netw., vol. 209, p. 108874, 2022.
H. Li, C. Yang, L. Wang, N. Ansari, D. Tang, X. Huang, Z. Xu, and D. Hu, A cooperative defense framework against application-level DDoS attacks on mobile edge computing services, IEEE Trans. Mob. Comput., vol. 22, no. 1, pp. 1–18, 2023.
A. Scherrer, N. Larrieu, P. Owezarski, P. Borgnat, and P. Abry, Non-gaussian and long memory statistical characterizations for Internet traffic with anomalies, IEEE Trans. Depend. Secur. Comput., vol. 4, no. 1, pp. 56–70, 2007.
The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).