Request pattern change-based cache pollution attack detection and defense in edge computing
Through caching popular contents at the network edge, wireless edge caching can greatly reduce both the content request latency at mobile devices and the traffic burden at the core network. However, popularity-based caching strategies are vulnerable to Cache Pollution Attacks (CPAs) due to the weak...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
KeAi Communications Co., Ltd.
2023-10-01
|
Series: | Digital Communications and Networks |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S2352864822000402 |
_version_ | 1797640298025713664 |
---|---|
author | Junwei Wang Xianglin Wei Jianhua Fan Qiang Duan Jianwei Liu Yangang Wang |
author_facet | Junwei Wang Xianglin Wei Jianhua Fan Qiang Duan Jianwei Liu Yangang Wang |
author_sort | Junwei Wang |
collection | DOAJ |
description | Through caching popular contents at the network edge, wireless edge caching can greatly reduce both the content request latency at mobile devices and the traffic burden at the core network. However, popularity-based caching strategies are vulnerable to Cache Pollution Attacks (CPAs) due to the weak security protection at both edge nodes and mobile devices. In CPAs, through initiating a large number of requests for unpopular contents, malicious users can pollute the edge caching space and degrade the caching efficiency. This paper firstly integrates the dynamic nature of content request and mobile devices into the edge caching framework, and introduces an eavesdropping-based CPA strategy. Then, an edge caching mechanism, which contains a Request Pattern Change-based Cache Pollution Detection (RPC2PD) algorithm and an Attack-aware Cache Defense (ACD) algorithm, is proposed to defend against CPAs. Simulation results show that the proposed mechanism could effectively suppress the effects of CPAs on the caching performance and improve the cache hit ratio. |
first_indexed | 2024-03-11T13:29:54Z |
format | Article |
id | doaj.art-dbaac4d4be054ae28f5f022b83b0f9d4 |
institution | Directory Open Access Journal |
issn | 2352-8648 |
language | English |
last_indexed | 2024-03-11T13:29:54Z |
publishDate | 2023-10-01 |
publisher | KeAi Communications Co., Ltd. |
record_format | Article |
series | Digital Communications and Networks |
spelling | doaj.art-dbaac4d4be054ae28f5f022b83b0f9d42023-11-03T04:15:09ZengKeAi Communications Co., Ltd.Digital Communications and Networks2352-86482023-10-019512121220Request pattern change-based cache pollution attack detection and defense in edge computingJunwei Wang0Xianglin Wei1Jianhua Fan2Qiang Duan3Jianwei Liu4Yangang Wang5The 63rd Research Institute, National University of Defense Technology, Nanjing, 210007, ChinaCorresponding author.; The 63rd Research Institute, National University of Defense Technology, Nanjing, 210007, ChinaThe 63rd Research Institute, National University of Defense Technology, Nanjing, 210007, ChinaThe 63rd Research Institute, National University of Defense Technology, Nanjing, 210007, ChinaThe 63rd Research Institute, National University of Defense Technology, Nanjing, 210007, ChinaThe 63rd Research Institute, National University of Defense Technology, Nanjing, 210007, ChinaThrough caching popular contents at the network edge, wireless edge caching can greatly reduce both the content request latency at mobile devices and the traffic burden at the core network. However, popularity-based caching strategies are vulnerable to Cache Pollution Attacks (CPAs) due to the weak security protection at both edge nodes and mobile devices. In CPAs, through initiating a large number of requests for unpopular contents, malicious users can pollute the edge caching space and degrade the caching efficiency. This paper firstly integrates the dynamic nature of content request and mobile devices into the edge caching framework, and introduces an eavesdropping-based CPA strategy. Then, an edge caching mechanism, which contains a Request Pattern Change-based Cache Pollution Detection (RPC2PD) algorithm and an Attack-aware Cache Defense (ACD) algorithm, is proposed to defend against CPAs. Simulation results show that the proposed mechanism could effectively suppress the effects of CPAs on the caching performance and improve the cache hit ratio.http://www.sciencedirect.com/science/article/pii/S2352864822000402Mobile edge computingCache pollution attackFlash crowd |
spellingShingle | Junwei Wang Xianglin Wei Jianhua Fan Qiang Duan Jianwei Liu Yangang Wang Request pattern change-based cache pollution attack detection and defense in edge computing Digital Communications and Networks Mobile edge computing Cache pollution attack Flash crowd |
title | Request pattern change-based cache pollution attack detection and defense in edge computing |
title_full | Request pattern change-based cache pollution attack detection and defense in edge computing |
title_fullStr | Request pattern change-based cache pollution attack detection and defense in edge computing |
title_full_unstemmed | Request pattern change-based cache pollution attack detection and defense in edge computing |
title_short | Request pattern change-based cache pollution attack detection and defense in edge computing |
title_sort | request pattern change based cache pollution attack detection and defense in edge computing |
topic | Mobile edge computing Cache pollution attack Flash crowd |
url | http://www.sciencedirect.com/science/article/pii/S2352864822000402 |
work_keys_str_mv | AT junweiwang requestpatternchangebasedcachepollutionattackdetectionanddefenseinedgecomputing AT xianglinwei requestpatternchangebasedcachepollutionattackdetectionanddefenseinedgecomputing AT jianhuafan requestpatternchangebasedcachepollutionattackdetectionanddefenseinedgecomputing AT qiangduan requestpatternchangebasedcachepollutionattackdetectionanddefenseinedgecomputing AT jianweiliu requestpatternchangebasedcachepollutionattackdetectionanddefenseinedgecomputing AT yangangwang requestpatternchangebasedcachepollutionattackdetectionanddefenseinedgecomputing |