Identification of a Malicious Optical Edge Device in the SDN-Based Optical Fog/Cloud Computing Network

被引:0
|
作者
Sood, Sandeep K. [2 ]
Deep Singh, Kiran [1 ]
机构
[1] Guru Nanak Dev University, Amritsar Punjab, India
[2] Guru Nanak Dev University, Regional Campus Gurdaspur, Punjab, India
关键词
Cost effectiveness - Light transmission - MATLAB - Network security - Optical communication - Virtual reality - Fog computing - Passive optical networks - Software defined networking - Hidden Markov models - Intrusion detection - Quality of service;
D O I
暂无
中图分类号
学科分类号
摘要
Software-defined networking (SDN) and optical transmission are the most cost-effective technologies for implementing high-bandwidth-based communication in the fog/cloud computing environment. The passive optical network uses optical line terminals and optical network units as optical edge devices (OEDs) to deliver fog/cloud-based services effectively. The security of such OEDs is one of the key issues for successful implementation of fog/cloud computing over the SDN-based optical network. The main security challenge is to detect and prevent the malicious OED that transmitting abusing data-frames in the SDN-based optical fog/cloud computing network. An OED can be easily hacked by the attacker to launch intrusive attacks those affect the quality of service of the optical channel. In this paper, a secure framework is proposed for identifying malicious OED in the fog/cloud computing over the SDN-based optical network. It identifies the malicious OED and shifts it to the honeypot to mitigate and analyze the attack. It uses two-stage hidden Markov model (HMM), intrusion detection system (IDS)-based fog manager and an optical virtual honeypot device (OVHD). A two-stage HMM is effectively used to reduce the false alarms of IDS in the identification of malicious OED and shifting it onto the OVHD. The OVHD is created in the SDN-based optical network by using the concept of free-available-resource and optical network virtualization. The proposed OVHD logs all malicious activities as well as attacker's path for preventing future attacks. In order to validate the proposed framework, the simulation of two-stage HMM is implemented in MATLAB and mitigation impacts of the internal attacks are studied by using iFogSim toolkit. The results show the effectiveness of the proposed framework. © 2018 Walter de Gruyter GmbH, Berlin/Boston 2018.
引用
收藏
页码:91 / 102
相关论文
共 50 条
  • [1] Resource Management in SDN-Based Cloud and SDN-Based Fog Computing: Taxonomy Study
    Alomari, Amirah
    Subramaniam, Shamala K.
    Samian, Normalia
    Latip, Rohaya
    Zukarnain, Zuriati
    SYMMETRY-BASEL, 2021, 13 (05):
  • [2] Poster: A SDN-based Network Layer for Edge Computing
    Wang, An
    Zha, Zili
    Guo, Yang
    Chen, Songqing
    SEC'19: PROCEEDINGS OF THE 4TH ACM/IEEE SYMPOSIUM ON EDGE COMPUTING, 2019, : 334 - 336
  • [3] SDN-Based Cloud Computing Networking
    Azodolmolky, Siamak
    Wieder, Philipp
    Yahyapour, Ramin
    2013 15TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS (ICTON 2013), 2013,
  • [4] Applications of SDN-enabled optical transport network and cloud/edge computing technology
    Yoshikane, Noboru
    2019 OPTICAL FIBER COMMUNICATIONS CONFERENCE AND EXHIBITION (OFC), 2019,
  • [5] Analyzing SDN-based Vehicular Network Framework in 5G Services: Fog and Mobile Edge Computing
    Habibi, Jafar Alim
    Djohar, Fahrizal
    Hakimi, Rifqy
    PROCEEDINGS OF 2018 4TH INTERNATIONAL CONFERENCE ON WIRELESS AND TELEMATICS (ICWT), 2018,
  • [6] In-Network Placement of Reusable Computing Tasks in an SDN-Based Network Edge
    Amadeo, Marica
    Campolo, Claudia
    Lia, Gianmarco
    Molinaro, Antonella
    Ruggeri, Giuseppe
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (02) : 1456 - 1471
  • [7] Dynamic fog-to-fog offloading in SDN-based fog computing systems
    Linh-An Phan
    Duc-Thang Nguyen
    Lee, Meonghun
    Park, Dae-Heon
    Kim, Taehong
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 117 : 486 - 497
  • [8] SDN-Based Secure VANETs Communication with Fog Computing
    Arif, Muhammad
    Wang, Guojun
    Wang, Tian
    Peng, Tao
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE (SPACCS 2018), 2018, 11342 : 46 - 59
  • [9] SDN-based fog and cloud interplay for stream processing
    Rzepka, Michal
    Borylo, Piotr
    Assuncao, Marcos D.
    Lason, Artur
    Lefevre, Laurent
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 131 : 1 - 17
  • [10] A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments
    Sohal, Amandeep Singh
    Sandhu, Rajinder
    Sood, Sandeep K.
    Chang, Victor
    COMPUTERS & SECURITY, 2018, 74 : 340 - 354