Intelligent Cache Pollution Attacks Detection for Edge Computing Enabled Mobile Social Networks
ABSTARCT :
With the rapid advances of wireless technologies and popularization of smart mobile devices, edge-enabled mobile social networks (MSNs) have emerged as a promising network paradigm for mobile users to deliver, share, and exchange contents with each other. By leveraging edge caching technology, various content services can be provided to mobile users for improving their quality of experience (QoE). However, edge caching is vulnerable to cache pollution attacks (CPAttacks) with the result of disruptive content delivery. To tackle this problem, we propose a hidden Markov model (HMM) based CPAttack detection scheme in edge-enabled MSNs. Specifically, we first present the CPAttack model based on observations of attacking behaviors. According to the CPAttack model, the caching state of the edge device is characterized by two parameters-content request rate and cache missing rate..
Then, with observation sequence constructed by caching states, we develop an HMM-based detection algorithm to distinguish the CPAttack in the approximately time-invariant content request process. To deal with the lack of training data and dynamic of caching states, an adaptive HMM (AHMM) based algorithm is designed to detect the CPAttack in the time-varying content request process. The simulation results demonstrate that the proposed scheme can efficiently improve edge devices’ abilities to sense the CPAttack
EXISTING SYSTEM :
Mobile edge caching is a promising technology for the next-generation mobile networks to effectively offer service environment and cloud-storage capabilities at the edge of networks. By exploiting the storage and computing resources at the network edge, mobile edge caching can significantly reduce service latency, decrease network load, and improve user experience. On the other hand, edge caching is subject to a number of threats regarding privacy violation and security breach.
DISADVANTAGE :
.. Cache spaces are deployed at both BBU and RRH that form a distributed edge caching architecture. Besides, at wireless network edge, caching can be located at wireless routers for enabling various applications, e.g., smart home and smart office.
The attacker can make the same request to retrieve the account details. Thus, the private data of the victim will be disclosed.
PROPOSED SYSTEM :
. In this paper, we first introduce the architecture of mobile edge caching, and address the key problems regarding why, where, what, and how to cache. Then, we examine the potential cyber threats, including cache poisoning attacks, cache pollution attacks, cache side-channel attacks, and cache deception attacks, which result in huge concerns about privacy, security, and trust in content placement, content delivery, and content usage for mobile users, respectively. After that, we propose a service-oriented and location-based efficient key distribution protocol (SOLEK) as an example in response to efficient and secure content delivery in mobile edge caching. Finally, we discuss the potential techniques for privacy-preserving content placement, efficient and secure content delivery, and trustful content usage, which are expected to draw more attention and efforts into secure edge caching
ADVANTAGE :
Service Delay Reduction: By storing content close to mobile users, the service delay can be significantly reduced. This feature is quite attractive for data delivery of latencysensitive applications, such as video streaming that will account for 78% of all mobile traffic by 2021. •
Traffic Burden Releasing: As duplicate contents cause severe traffic burden over hackhaul links, the traffic can be reduced up to 35% by storing the requested contents at the network edge . Caching in 3G and 4G LTE networks can reduce mobile traffic up to two thirds
|