A security event description of intelligent applications in edge-cloud environment

被引:0
|
作者
Qianmu Li
Xiaochun Yin
Shunmei Meng
Yaozong Liu
Zijian Ying
机构
[1] Nanjing University of Science and Technology,School of Cyber Science and Engineering
[2] WeiFang University of Science & Technology,Facility Horticulture Laboratory of Universities in Shandong
[3] Jiangsu Graduate Workstation of Nanjing University of Science and Technology,Nanjing Liancheng Technology Development Co., Ltd.
[4] Wuyi University,Intelligent Manufacturing Department
[5] Jiangsu Zhongtian Technology Co. Ltd.,undefined
关键词
Security event description; CORAS modeling; Petri-net;
D O I
暂无
中图分类号
学科分类号
摘要
In traditional network environment, the attack topology of the network is usually obtained based on a graph traversal algorithm. It uses connection relationships to describe the process of the attack, thus completing the description of network security event. However, in the edge-cloud environment, the control logic and data forwarding of network devices are separated from each other. The control layer is responsible for the centralized management of network edge nodes. After acquiring the entire network topology, it can automatically generate a visualized network structure. This architecture extends traditional cloud computing architecture to the edge of the network, helping to handle some latency-sensitive service requirements, especially for most IoT applications. Therefore, security analysts can grasp the connection status of the devices on the entire network in the control domain. This network topology generation method based on the control layer information is directly and efficiently, which can greatly simplify the description of security events in the edge-cloud environment. At the same time, the separate structure also hides specific details of the underlying network device. Petri-net, as a formal description tool, can be used to describe such structure. Among existing security event description methods, the CORAS modeling tool has the advantages of graphical description, reusability and refinement description. And it also provides analysis guides to guide the operation steps. Based on the edge-cloud environment, this paper combines the advantages of CORAS modeling and analysis with Object-oriented Petri-net theory, and proposes a COP (CORAS-based Object-oriented Petri-net)-based Intelligent Applications security event description method. Experiments verify that this method is suitable for describing the complexity and dynamics of security events in edge cloud environment.
引用
收藏
相关论文
共 50 条
  • [31] Adaptive Scheduling Based on Intelligent Agents in Edge-Cloud Computing Environments
    Lim, JongBeom
    [J]. Journal of Internet Technology, 2024, 25 (04): : 609 - 617
  • [32] Edge-cloud collaborative intelligent production scheduling based on digital twin
    Han Yifan
    Feng Tao
    Liu Xiaokai
    Xu Fangmin
    Zhao Chenglin
    [J]. The Journal of China Universities of Posts and Telecommunications, 2022, 29 (02) : 108 - 120
  • [33] Federated Sensing: Edge-Cloud Elastic Collaborative Learning for Intelligent Sensing
    Gao, Yujia
    Liu, Liang
    Zheng, Xiaolong
    Zhang, Chi
    Ma, Huadong
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (14) : 11100 - 11111
  • [34] Toward Replicated and Asynchronous Data Streams for Edge-Cloud Applications
    Qayyum, Owais
    Yu, Weihai
    [J]. 37TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2022, : 339 - 346
  • [35] ECO: Edge-Cloud Optimization of 5G applications
    Rao, Kunal
    Coviello, Giuseppe
    Hsiung, Wang-Pin
    Chakradhar, Srimat
    [J]. 21ST IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2021), 2021, : 649 - 659
  • [36] Cloud-Native Applications' Workload Placement over the Edge-Cloud Continuum
    Kontos, Georgios
    Soumplis, Polyzois
    Kokkinos, Panagiotis
    Varvarigos, Emmanouel
    [J]. PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, CLOSER 2023, 2023, : 57 - 66
  • [37] Effective Data Sharing in an Edge-Cloud Model: Security Challenges and Solutions
    Karati, Arijit
    Das, Sajal K.
    [J]. COMPUTER, 2024, 57 (07) : 53 - 65
  • [38] An Efficient Low Complexity Edge-Cloud Framework for Security in IoT Networks
    Truong Thu Huong
    Ta Phuong Bac
    Dao Minh Long
    Bui Doan Thang
    Tran Duc Luong
    Nguyen Thanh Binh
    [J]. IEEE ICCE 2020: 2020 IEEE EIGHTH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND ELECTRONICS (ICCE), 2021, : 533 - 539
  • [39] Cost-optimized data placement strategy for social network with security awareness in edge-cloud computing environment
    Shi, Wenyu
    Tang, Qiang
    [J]. JOURNAL OF COMBINATORIAL OPTIMIZATION, 2023, 45 (01)
  • [40] Towards Edge-Cloud Computing
    Tianfield, Huaglory
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 4883 - 4885