ログイン
Language:

WEKO3

  • トップ
  • ランキング
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

  1. 学術雑誌論文
  2. 5 技術(工学)

Hardening the Security of Multi-Access Edge Computing through Bio-Inspired VM Introspection

http://hdl.handle.net/10228/00008551
http://hdl.handle.net/10228/00008551
76dfe083-407d-4bd4-909a-6b0bdd5a67ac
名前 / ファイル ライセンス アクション
RECN_2021-20.pdf RECN_2021-20.pdf (881.1 kB)
アイテムタイプ 学術雑誌論文 = Journal Article(1)
公開日 2021-11-16
資源タイプ
資源タイプ識別子 http://purl.org/coar/resource_type/c_6501
資源タイプ journal article
タイトル
タイトル Hardening the Security of Multi-Access Edge Computing through Bio-Inspired VM Introspection
言語 en
言語
言語 eng
著者 Huseynov, Huseyn

× Huseynov, Huseyn

WEKO 31765

en Huseynov, Huseyn

Search repository
Saadawi, Tarek

× Saadawi, Tarek

WEKO 31766

en Saadawi, Tarek

Search repository
光来, 健一

× 光来, 健一

WEKO 20772
e-Rad_Researcher 60372463
Scopus著者ID 12143198700
ORCiD 0000-0002-5455-4418
九工大研究者情報 303

en Kourai, Kenichi

ja 光来, 健一

ja-Kana コウライ, ケンイチ


Search repository
抄録
内容記述タイプ Abstract
内容記述 The extreme bandwidth and performance of 5G mobile networks changes the way we develop and utilize digital services. Within a few years, 5G will not only touch technology and applications, but dramatically change the economy, our society and individual life. One of the emerging technologies that enables the evolution to 5G by bringing cloud capabilities near to the end users is Edge Computing or also known as Multi-Access Edge Computing (MEC) that will become pertinent towards the evolution of 5G. This evolution also entails growth in the threat landscape and increase privacy in concerns at different application areas, hence security and privacy plays a central role in the evolution towards 5G. Since MEC application instantiated in the virtualized infrastructure, in this paper we present a distributed application that aims to constantly introspect multiple virtual machines (VMs) in order to detect malicious activities based on their anomalous behavior. Once suspicious processes detected, our IDS in real-time notifies system administrator about the potential threat. Developed software is able to detect keyloggers, rootkits, trojans, process hiding and other intrusion artifacts via agent-less operation, by operating remotely or directly from the host machine. Remote memory introspection means no software to install, no notice to malware to evacuate or destroy data. Experimental results of remote VMI on more than 50 different malicious code demonstrate average anomaly detection rate close to 97%. We have established wide testbed environment connecting networks of two universities Kyushu Institute of Technology and The City College of New York through secure GRE tunnel. Conducted experiments on this testbed deliver high response time of the proposed system.
言語 en
書誌情報 en : Big Data and Cognitive Computing

巻 5, 号 4, p. 52-1-52-21, 発行日 2021-10-08
出版社
出版者 MDPI
DOI
関連タイプ isIdenticalTo
識別子タイプ DOI
関連識別子 https://doi.org/10.3390/bdcc5040052
ISSN
収録物識別子タイプ EISSN
収録物識別子 2504-2289
著作権関連情報
権利情報 Copyright (c) 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
キーワード
主題Scheme Other
主題 security and privacy
キーワード
主題Scheme Other
主題 virtualization
キーワード
主題Scheme Other
主題 intrusion detection
キーワード
主題Scheme Other
主題 artificial immune system
キーワード
主題Scheme Other
主題 virtual machine introspection
キーワード
主題Scheme Other
主題 cloud security
出版タイプ
出版タイプ VoR
出版タイプResource http://purl.org/coar/version/c_970fb48d4fbd8a85
査読の有無
値 yes
連携ID
値 9780
戻る
0
views
See details
Views

Versions

Ver.1 2023-05-15 13:12:11.082626
Show All versions

Share

Share
tweet

Cite as

Other

print

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR 2.0
  • OAI-PMH JPCOAR 1.0
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX
  • ZIP

コミュニティ

確認

確認

確認


Powered by WEKO3


Powered by WEKO3