A security event description of intelligent applications in edge-cloud environment

被引:0
|
作者
Qianmu Li
Xiaochun Yin
Shunmei Meng
Yaozong Liu
Zijian Ying
机构
[1] Nanjing University of Science and Technology,School of Cyber Science and Engineering
[2] WeiFang University of Science & Technology,Facility Horticulture Laboratory of Universities in Shandong
[3] Jiangsu Graduate Workstation of Nanjing University of Science and Technology,Nanjing Liancheng Technology Development Co., Ltd.
[4] Wuyi University,Intelligent Manufacturing Department
[5] Jiangsu Zhongtian Technology Co. Ltd.,undefined
关键词
Security event description; CORAS modeling; Petri-net;
D O I
暂无
中图分类号
学科分类号
摘要
In traditional network environment, the attack topology of the network is usually obtained based on a graph traversal algorithm. It uses connection relationships to describe the process of the attack, thus completing the description of network security event. However, in the edge-cloud environment, the control logic and data forwarding of network devices are separated from each other. The control layer is responsible for the centralized management of network edge nodes. After acquiring the entire network topology, it can automatically generate a visualized network structure. This architecture extends traditional cloud computing architecture to the edge of the network, helping to handle some latency-sensitive service requirements, especially for most IoT applications. Therefore, security analysts can grasp the connection status of the devices on the entire network in the control domain. This network topology generation method based on the control layer information is directly and efficiently, which can greatly simplify the description of security events in the edge-cloud environment. At the same time, the separate structure also hides specific details of the underlying network device. Petri-net, as a formal description tool, can be used to describe such structure. Among existing security event description methods, the CORAS modeling tool has the advantages of graphical description, reusability and refinement description. And it also provides analysis guides to guide the operation steps. Based on the edge-cloud environment, this paper combines the advantages of CORAS modeling and analysis with Object-oriented Petri-net theory, and proposes a COP (CORAS-based Object-oriented Petri-net)-based Intelligent Applications security event description method. Experiments verify that this method is suitable for describing the complexity and dynamics of security events in edge cloud environment.
引用
收藏
相关论文
共 50 条
  • [1] A security event description of intelligent applications in edge-cloud environment
    Li, Qianmu
    Yin, Xiaochun
    Meng, Shunmei
    Liu, Yaozong
    Ying, Zijian
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2020, 9 (01):
  • [2] Guaranteed Latency Applications in Edge-Cloud Environment
    Hnetynka, Petr
    Kubat, Petr
    Al-Ali, Rima
    Gerostathopoulos, Ilias
    Khalyeyev, Danylo
    [J]. ECSA 2018: PROCEEDINGS OF THE 12TH EUROPEAN CONFERENCE ON SOFTWARE ARCHITECTURE: COMPANION PROCEEDINGS, 2018,
  • [3] Managing latency in edge-cloud environment
    Bulej, Lubomir
    Bures, Tomas
    Filandr, Adam
    Hnetynka, Petr
    Hnetynkova, Iveta
    Pacovsky, Jan
    Sandor, Gabor
    Gerostathopoulos, Ilias
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2021, 172 (172)
  • [4] Intelligent and Scalable IoT Edge-Cloud System
    Manihar, Shifa
    Patel, Ravindra
    Rehman, Tasneem Bano
    Agrawal, Sanjay
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (08) : 359 - 364
  • [5] Intelligent and scalable IoT edge-cloud system
    Manihar S.
    Patel R.
    Rehman T.B.
    Agrawal S.
    [J]. 1600, Science and Information Organization (11): : 359 - 364
  • [6] Profit maximization for security-aware task offloading in edge-cloud environment
    Li, Zhongjin
    Chang, Victor
    Hu, Haiyang
    Yu, Dongjin
    Ge, Jidong
    Huang, Binbin
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2021, 157 : 43 - 55
  • [7] Intelligent Security on the Edge of the Cloud
    Zissis, Dimitrios
    [J]. 2017 INTERNATIONAL CONFERENCE ON ENGINEERING, TECHNOLOGY AND INNOVATION (ICE/ITMC), 2017, : 1066 - 1070
  • [8] Optimized resource allocation in edge-cloud environment
    Randriamasinoro, Njakarison Menja
    Nguyen, Kim Khoa
    Cheriet, Mohamed
    [J]. 12TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON2018), 2018, : 816 - 823
  • [9] Intelligent Machine Tool Based on Edge-Cloud Collaboration
    Lou, Ping
    Liu, Shiyu
    Hu, Jianmin
    Li, Ruiya
    Xiao, Zheng
    Yan, Junwei
    [J]. IEEE ACCESS, 2020, 8 (08): : 139953 - 139965
  • [10] An Intelligent Edge-Cloud Collaborative Framework for Communication Security in Distributed Cyber-Physical Systems
    Chen, Cen
    Li, Yangfan
    Wang, Qinyu
    Yang, Xulei
    Wang, Xiaokang
    Yang, Laurence T.
    [J]. IEEE NETWORK, 2024, 38 (01): : 172 - 179