DeepAI AI Chat
Log In Sign Up

Improved security solutions for DDoS mitigation in 5G Multi-access Edge Computing

by   Marian Gusatu, et al.
Universitatea din Bucuresti

Multi-access Edge Computing (MEC) is a 5G-enabling solution that aims to bring cloud-computing capabilities closer to the end-users. This paper focuses on mitigation techniques against Distributed Denial-of-Service (DDoS) attacks in the context of 5G MEC, providing solutions that involve the virtualized environment and the management entities from the MEC architecture. The proposed solutions aim to reduce the risk of affecting legitimate traffic in the context of DDoS attacks. Our work supports the idea of using a network flow collector that sends the data to an anomaly detection system based on artificial intelligence techniques and, as an improvement over the previous work, it contributes to redirecting detected anomalies for isolation to a separate virtual machine. This virtual machine uses deep packet inspection tools to analyze the traffic and provides services until the final verdict. We decrease the risk of compromising the virtual machine that provides services to legitimate users by isolating the suspicious traffic. The management entities of the MEC architecture allow to re-instantiate or reconfigure the virtual machines. Hence, if the machine inspecting the isolated traffic crashes because of an attack, the damaged machine can be restored while the services provided to legitimate users are not affected.


page 1

page 2

page 3

page 4


Real Time Lateral Movement Detection based on Evidence Reasoning Network for Edge Computing Environment

Edge computing is providing higher class intelligent service and computi...

Edge Computing in IoT: A 6G Perspective

Edge computing is one of the key driving forces to enable Beyond 5G (B5G...

On Machine Learning DoS Attack Identification from Cloud Computing Telemetry

The detection of Denial of Service (DoS) attacks remains a challenge for...

Dynamic Process Isolation

In the quest for efficiency and performance, edge-computing providers el...

Edge Intelligence in Softwarized 6G: Deep Learning-enabled Network Traffic Predictions

The 6G vision is envisaged to enable agile network expansion and rapid d...

Comparative Analysis of State-of-the-Art EDoS Mitigation Techniques in Cloud Computing Environment

A new variant of the DDoS attack, called Economic Denial of Sustainabili...

DCRoute: Speeding up Inter-Datacenter Traffic Allocation while Guaranteeing Deadlines

Datacenters provide the infrastructure for cloud computing services used...