A security event description of intelligent applications in edge-cloud environment

Author:

Li Qianmu,Yin Xiaochun,Meng Shunmei,Liu Yaozong,Ying Zijian

Abstract

AbstractIn traditional network environment, the attack topology of the network is usually obtained based on a graph traversal algorithm. It uses connection relationships to describe the process of the attack, thus completing the description of network security event. However, in the edge-cloud environment, the control logic and data forwarding of network devices are separated from each other. The control layer is responsible for the centralized management of network edge nodes. After acquiring the entire network topology, it can automatically generate a visualized network structure. This architecture extends traditional cloud computing architecture to the edge of the network, helping to handle some latency-sensitive service requirements, especially for most IoT applications. Therefore, security analysts can grasp the connection status of the devices on the entire network in the control domain. This network topology generation method based on the control layer information is directly and efficiently, which can greatly simplify the description of security events in the edge-cloud environment. At the same time, the separate structure also hides specific details of the underlying network device. Petri-net, as a formal description tool, can be used to describe such structure. Among existing security event description methods, the CORAS modeling tool has the advantages of graphical description, reusability and refinement description. And it also provides analysis guides to guide the operation steps. Based on the edge-cloud environment, this paper combines the advantages of CORAS modeling and analysis with Object-oriented Petri-net theory, and proposes a COP (CORAS-based Object-oriented Petri-net)-based Intelligent Applications security event description method. Experiments verify that this method is suitable for describing the complexity and dynamics of security events in edge cloud environment.

Funder

Industrial Internet Innovation and Development Project from Ministry of Industry and Information Technology of China

Fundamental Research Funds for the Central Universities

Military Common Information System Equipment Pre-research Special Technology Project

Publisher

Springer Science and Business Media LLC

Subject

Computer Networks and Communications,Software

Cited by 6 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. A Secure Protocol Authentication Method Based on the Strand Space Model for Blockchain-Based Industrial Internet of Things;Symmetry;2024-07-05

2. When Security Risk Assessment Meets Advanced Metering Infrastructure: Identifying the Appropriate Method;Sustainability;2023-06-20

3. Cloud computing security based on OWASP;2022 5th International Conference on Computing and Informatics (ICCI);2022-03-09

4. Data Privacy Protection of Industrial Blockchain;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2021

5. Behavior Prediction and Its Design for Safe Departure Intervals Based on Huang Yan-Pei Thought;Communications in Computer and Information Science;2020

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3