A security event description of intelligent applications in edge-cloud environment

被引:0
|
作者
Qianmu Li
Xiaochun Yin
Shunmei Meng
Yaozong Liu
Zijian Ying
机构
[1] Nanjing University of Science and Technology,School of Cyber Science and Engineering
[2] WeiFang University of Science & Technology,Facility Horticulture Laboratory of Universities in Shandong
[3] Jiangsu Graduate Workstation of Nanjing University of Science and Technology,Nanjing Liancheng Technology Development Co., Ltd.
[4] Wuyi University,Intelligent Manufacturing Department
[5] Jiangsu Zhongtian Technology Co. Ltd.,undefined
关键词
Security event description; CORAS modeling; Petri-net;
D O I
暂无
中图分类号
学科分类号
摘要
In traditional network environment, the attack topology of the network is usually obtained based on a graph traversal algorithm. It uses connection relationships to describe the process of the attack, thus completing the description of network security event. However, in the edge-cloud environment, the control logic and data forwarding of network devices are separated from each other. The control layer is responsible for the centralized management of network edge nodes. After acquiring the entire network topology, it can automatically generate a visualized network structure. This architecture extends traditional cloud computing architecture to the edge of the network, helping to handle some latency-sensitive service requirements, especially for most IoT applications. Therefore, security analysts can grasp the connection status of the devices on the entire network in the control domain. This network topology generation method based on the control layer information is directly and efficiently, which can greatly simplify the description of security events in the edge-cloud environment. At the same time, the separate structure also hides specific details of the underlying network device. Petri-net, as a formal description tool, can be used to describe such structure. Among existing security event description methods, the CORAS modeling tool has the advantages of graphical description, reusability and refinement description. And it also provides analysis guides to guide the operation steps. Based on the edge-cloud environment, this paper combines the advantages of CORAS modeling and analysis with Object-oriented Petri-net theory, and proposes a COP (CORAS-based Object-oriented Petri-net)-based Intelligent Applications security event description method. Experiments verify that this method is suitable for describing the complexity and dynamics of security events in edge cloud environment.
引用
收藏
相关论文
共 50 条
  • [21] Security Energy Efficiency Analysis of CR-NOMA Enabled IoT Systems for Edge-cloud Environment
    Rui She
    Mengyu Sun
    [J]. International Journal of Computational Intelligence Systems, 16
  • [22] Security Energy Efficiency Analysis of CR-NOMA Enabled IoT Systems for Edge-cloud Environment
    She, Rui
    Sun, Mengyu
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2023, 16 (01)
  • [23] Computation offloading for object-oriented applications in a UAV-based edge-cloud environment
    Zhang, Jianshan
    Li, Ming
    Chen, Zheyi
    Lin, Bing
    [J]. JOURNAL OF SUPERCOMPUTING, 2022, 78 (08): : 10829 - 10853
  • [24] Computation offloading for object-oriented applications in a UAV-based edge-cloud environment
    Jianshan Zhang
    Ming Li
    Zheyi Chen
    Bing Lin
    [J]. The Journal of Supercomputing, 2022, 78 : 10829 - 10853
  • [25] Investigating and Modelling of Task Offloading Latency in Edge-Cloud Environment
    Almutairi, Jaber
    Aldossary, Mohammad
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (03): : 4143 - 4160
  • [26] A metaheuristic-based computation offloading in edge-cloud environment
    Ali Shahidinejad
    Mostafa Ghobaei-Arani
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 2785 - 2794
  • [27] Edge-cloud collaborative intelligent production scheduling based on digital twin
    Yifan, Han
    Tao, Feng
    Xiaokai, Liü
    Fangmin, Xu
    Chenglin, Zhao
    [J]. Journal of China Universities of Posts and Telecommunications, 2022, 29 (02): : 108 - 120
  • [28] A metaheuristic-based computation offloading in edge-cloud environment
    Shahidinejad, Ali
    Ghobaei-Arani, Mostafa
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 13 (5) : 2785 - 2794
  • [29] Resource Management and Task Offloading Issues in the Edge-Cloud Environment
    Almutairi, Jaber
    Aldossary, Mohammad
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2021, 30 (01): : 129 - 145
  • [30] Learning to Optimize Workflow Scheduling for an Edge-Cloud Computing Environment
    Zhu, Kaige
    Zhang, Zhenjiang
    Zeadally, Sherali
    Sun, Feng
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2024, 12 (03) : 897 - 912