Runtime verification approach for DoS attack detection in edge servers

Aiming at the DoS (denial of service) attacks against edge servers in an edge computing system, a parallel runtime verification approach for DoS attack detection was proposed.First, PPTL (propositional projection temporal logic) formulas were utilized to formally describe expected behaviors of an ed...

Full description

Saved in:
Bibliographic Details
Main Authors: Bin YU, Nan ZHANG, Xu LU, Zhenhua DUAN, Cong TIAN
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2021-09-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021169/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539274381459456
author Bin YU
Nan ZHANG
Xu LU
Zhenhua DUAN
Cong TIAN
author_facet Bin YU
Nan ZHANG
Xu LU
Zhenhua DUAN
Cong TIAN
author_sort Bin YU
collection DOAJ
description Aiming at the DoS (denial of service) attacks against edge servers in an edge computing system, a parallel runtime verification approach for DoS attack detection was proposed.First, PPTL (propositional projection temporal logic) formulas were utilized to formally describe expected behaviors of an edge server and DoS attack characteristics.Then, for the PPTL formulas to be verified, a parallel runtime verification framework was adopted to make use of the computing and storage resources of an edge server to conduct anomaly detection and misuse detection.The proposed attack detection approach was performed for an actual P2P (peer-to-peer) network based on smart parking system using edge computing which was supposed to suffer from a DoS attack.Experiments show that the proposed method can accurately and efficiently identify abnormal behaviors of edge servers and types of DoS attacks.
format Article
id doaj-art-4ce0f1acf2b941fe84fd14fa4fe70fbf
institution Kabale University
issn 1000-436X
language zho
publishDate 2021-09-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-4ce0f1acf2b941fe84fd14fa4fe70fbf2025-01-14T07:22:42ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2021-09-0142758659744574Runtime verification approach for DoS attack detection in edge serversBin YUNan ZHANGXu LUZhenhua DUANCong TIANAiming at the DoS (denial of service) attacks against edge servers in an edge computing system, a parallel runtime verification approach for DoS attack detection was proposed.First, PPTL (propositional projection temporal logic) formulas were utilized to formally describe expected behaviors of an edge server and DoS attack characteristics.Then, for the PPTL formulas to be verified, a parallel runtime verification framework was adopted to make use of the computing and storage resources of an edge server to conduct anomaly detection and misuse detection.The proposed attack detection approach was performed for an actual P2P (peer-to-peer) network based on smart parking system using edge computing which was supposed to suffer from a DoS attack.Experiments show that the proposed method can accurately and efficiently identify abnormal behaviors of edge servers and types of DoS attacks.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021169/edge computingedge serverpropositional projection temporal logicDoS attackruntime verification
spellingShingle Bin YU
Nan ZHANG
Xu LU
Zhenhua DUAN
Cong TIAN
Runtime verification approach for DoS attack detection in edge servers
Tongxin xuebao
edge computing
edge server
propositional projection temporal logic
DoS attack
runtime verification
title Runtime verification approach for DoS attack detection in edge servers
title_full Runtime verification approach for DoS attack detection in edge servers
title_fullStr Runtime verification approach for DoS attack detection in edge servers
title_full_unstemmed Runtime verification approach for DoS attack detection in edge servers
title_short Runtime verification approach for DoS attack detection in edge servers
title_sort runtime verification approach for dos attack detection in edge servers
topic edge computing
edge server
propositional projection temporal logic
DoS attack
runtime verification
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021169/
work_keys_str_mv AT binyu runtimeverificationapproachfordosattackdetectioninedgeservers
AT nanzhang runtimeverificationapproachfordosattackdetectioninedgeservers
AT xulu runtimeverificationapproachfordosattackdetectioninedgeservers
AT zhenhuaduan runtimeverificationapproachfordosattackdetectioninedgeservers
AT congtian runtimeverificationapproachfordosattackdetectioninedgeservers