Request pattern change-based cache pollution attack detection and defense in edge computing

Through caching popular contents at the network edge, wireless edge caching can greatly reduce both the content request latency at mobile devices and the traffic burden at the core network. However, popularity-based caching strategies are vulnerable to Cache Pollution Attacks (CPAs) due to the weak...

Full description

Bibliographic Details
Main Authors: Junwei Wang, Xianglin Wei, Jianhua Fan, Qiang Duan, Jianwei Liu, Yangang Wang
Format: Article
Language:English
Published: KeAi Communications Co., Ltd. 2023-10-01
Series:Digital Communications and Networks
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2352864822000402
_version_ 1797640298025713664
author Junwei Wang
Xianglin Wei
Jianhua Fan
Qiang Duan
Jianwei Liu
Yangang Wang
author_facet Junwei Wang
Xianglin Wei
Jianhua Fan
Qiang Duan
Jianwei Liu
Yangang Wang
author_sort Junwei Wang
collection DOAJ
description Through caching popular contents at the network edge, wireless edge caching can greatly reduce both the content request latency at mobile devices and the traffic burden at the core network. However, popularity-based caching strategies are vulnerable to Cache Pollution Attacks (CPAs) due to the weak security protection at both edge nodes and mobile devices. In CPAs, through initiating a large number of requests for unpopular contents, malicious users can pollute the edge caching space and degrade the caching efficiency. This paper firstly integrates the dynamic nature of content request and mobile devices into the edge caching framework, and introduces an eavesdropping-based CPA strategy. Then, an edge caching mechanism, which contains a Request Pattern Change-based Cache Pollution Detection (RPC2PD) algorithm and an Attack-aware Cache Defense (ACD) algorithm, is proposed to defend against CPAs. Simulation results show that the proposed mechanism could effectively suppress the effects of CPAs on the caching performance and improve the cache hit ratio.
first_indexed 2024-03-11T13:29:54Z
format Article
id doaj.art-dbaac4d4be054ae28f5f022b83b0f9d4
institution Directory Open Access Journal
issn 2352-8648
language English
last_indexed 2024-03-11T13:29:54Z
publishDate 2023-10-01
publisher KeAi Communications Co., Ltd.
record_format Article
series Digital Communications and Networks
spelling doaj.art-dbaac4d4be054ae28f5f022b83b0f9d42023-11-03T04:15:09ZengKeAi Communications Co., Ltd.Digital Communications and Networks2352-86482023-10-019512121220Request pattern change-based cache pollution attack detection and defense in edge computingJunwei Wang0Xianglin Wei1Jianhua Fan2Qiang Duan3Jianwei Liu4Yangang Wang5The 63rd Research Institute, National University of Defense Technology, Nanjing, 210007, ChinaCorresponding author.; The 63rd Research Institute, National University of Defense Technology, Nanjing, 210007, ChinaThe 63rd Research Institute, National University of Defense Technology, Nanjing, 210007, ChinaThe 63rd Research Institute, National University of Defense Technology, Nanjing, 210007, ChinaThe 63rd Research Institute, National University of Defense Technology, Nanjing, 210007, ChinaThe 63rd Research Institute, National University of Defense Technology, Nanjing, 210007, ChinaThrough caching popular contents at the network edge, wireless edge caching can greatly reduce both the content request latency at mobile devices and the traffic burden at the core network. However, popularity-based caching strategies are vulnerable to Cache Pollution Attacks (CPAs) due to the weak security protection at both edge nodes and mobile devices. In CPAs, through initiating a large number of requests for unpopular contents, malicious users can pollute the edge caching space and degrade the caching efficiency. This paper firstly integrates the dynamic nature of content request and mobile devices into the edge caching framework, and introduces an eavesdropping-based CPA strategy. Then, an edge caching mechanism, which contains a Request Pattern Change-based Cache Pollution Detection (RPC2PD) algorithm and an Attack-aware Cache Defense (ACD) algorithm, is proposed to defend against CPAs. Simulation results show that the proposed mechanism could effectively suppress the effects of CPAs on the caching performance and improve the cache hit ratio.http://www.sciencedirect.com/science/article/pii/S2352864822000402Mobile edge computingCache pollution attackFlash crowd
spellingShingle Junwei Wang
Xianglin Wei
Jianhua Fan
Qiang Duan
Jianwei Liu
Yangang Wang
Request pattern change-based cache pollution attack detection and defense in edge computing
Digital Communications and Networks
Mobile edge computing
Cache pollution attack
Flash crowd
title Request pattern change-based cache pollution attack detection and defense in edge computing
title_full Request pattern change-based cache pollution attack detection and defense in edge computing
title_fullStr Request pattern change-based cache pollution attack detection and defense in edge computing
title_full_unstemmed Request pattern change-based cache pollution attack detection and defense in edge computing
title_short Request pattern change-based cache pollution attack detection and defense in edge computing
title_sort request pattern change based cache pollution attack detection and defense in edge computing
topic Mobile edge computing
Cache pollution attack
Flash crowd
url http://www.sciencedirect.com/science/article/pii/S2352864822000402
work_keys_str_mv AT junweiwang requestpatternchangebasedcachepollutionattackdetectionanddefenseinedgecomputing
AT xianglinwei requestpatternchangebasedcachepollutionattackdetectionanddefenseinedgecomputing
AT jianhuafan requestpatternchangebasedcachepollutionattackdetectionanddefenseinedgecomputing
AT qiangduan requestpatternchangebasedcachepollutionattackdetectionanddefenseinedgecomputing
AT jianweiliu requestpatternchangebasedcachepollutionattackdetectionanddefenseinedgecomputing
AT yangangwang requestpatternchangebasedcachepollutionattackdetectionanddefenseinedgecomputing