Improved security solutions for DDoS mitigation in 5G Multi-access Edge Computing

11/08/2021
by   Marian Gusatu, et al.
0

Multi-access Edge Computing (MEC) is a 5G-enabling solution that aims to bring cloud-computing capabilities closer to the end-users. This paper focuses on mitigation techniques against Distributed Denial-of-Service (DDoS) attacks in the context of 5G MEC, providing solutions that involve the virtualized environment and the management entities from the MEC architecture. The proposed solutions aim to reduce the risk of affecting legitimate traffic in the context of DDoS attacks. Our work supports the idea of using a network flow collector that sends the data to an anomaly detection system based on artificial intelligence techniques and, as an improvement over the previous work, it contributes to redirecting detected anomalies for isolation to a separate virtual machine. This virtual machine uses deep packet inspection tools to analyze the traffic and provides services until the final verdict. We decrease the risk of compromising the virtual machine that provides services to legitimate users by isolating the suspicious traffic. The management entities of the MEC architecture allow to re-instantiate or reconfigure the virtual machines. Hence, if the machine inspecting the isolated traffic crashes because of an attack, the damaged machine can be restored while the services provided to legitimate users are not affected.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/12/2019

Real Time Lateral Movement Detection based on Evidence Reasoning Network for Edge Computing Environment

Edge computing is providing higher class intelligent service and computi...
research
11/17/2021

Edge Computing in IoT: A 6G Perspective

Edge computing is one of the key driving forces to enable Beyond 5G (B5G...
research
04/11/2019

On Machine Learning DoS Attack Identification from Cloud Computing Telemetry

The detection of Denial of Service (DoS) attacks remains a challenge for...
research
10/10/2021

Dynamic Process Isolation

In the quest for efficiency and performance, edge-computing providers el...
research
07/31/2021

Edge Intelligence in Softwarized 6G: Deep Learning-enabled Network Traffic Predictions

The 6G vision is envisaged to enable agile network expansion and rapid d...
research
07/28/2021

5G Multi-access Edge Computing: Security, Dependability, and Performance

The main innovation of the Fifth Generation (5G) of mobile networks is t...
research
04/14/2021

Phishing Mitigation Techniques: A Literature Survey

Email is a channel of communication which is considered to be a confiden...

Please sign up or login with your details

Forgot password? Click here to reset