Font Size: a A A

Research On Mimicry Defense For Multi-access Edge Computing

Posted on:2022-07-08Degree:MasterType:Thesis
Country:ChinaCandidate:Y Y YueFull Text:PDF
GTID:2518306557967859Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In recent years,edge computing has gradually emerged as the development of the Internet of Things.Edge computing refers to a distributed computing platform measured at the edge of the network,which is closer to user terminals.Multi-access edge computing serves as a supplement to cloud computing and edge computing.It expands the definition and application of edge computing,provides various services about information technology at network edge nodes.It also provides edge computing services for mobile users and fixed users at the same time.It migrates computing tasks and data to edge nodes for processing,which saving transmission to the bandwidth of the remote data center effectively.In the environment where the multi-access edge computing industry is booming,security issues becomes a difficult problem hindering its development.Unknown vulnerabilities or backdoors have become the most important threats in multi-access edge computing.It can improve security and user experience significantly by resisting attack from unknown vulnerabilities.Multiaccess edge computing security issues have important significance to research.This thesis is oriented to mimic defense of multi-access edge computing,which focuses on the difficulty of quantifying the heterogeneity of heterogeneous executive sets and the scheduling problem of heterogeneous executive sets in mimic defense.The main work is divided into three parts.The first part is proposing a heterogeneity quantification algorithm named TLA,the model based on tree hierarchical.It decomposes the heterogeneity of the execution sets into two parts to calculation.Based on the complexity of the Shannon index and the difference based on the tree hierarchy model,experiment shows that the algorithm can quantify the heterogeneity of heterogeneous execution set more accurately.The second part is proposing a scheduling algorithm named SACH,which based on reliability and heterogeneity.Whether to schedule it is determined according to the reliability of the server.During scheduling,it ensures that the difference between the replacement executive body and the original executive body is not too low,and the set of heterogeneous execution bodies after scheduling maintains a certain degree of heterogeneity.The experiment shows that the algorithm can be dynamic and reliable in the scheduling of heterogeneous execution sets.The third part is designing and achieving a mimic defense system oriented to multi-access edge computing,which can realize the heterogeneity quantification of heterogeneous server sets and the secure scheduling of heterogeneous servers.The experiment shows that the system has a good defense capability in the face of attacks.
Keywords/Search Tags:Edge Computing, Mimic Defense, Server, Heterogeneous, Schedule
PDF Full Text Request
Related items