Volume 33 Issue 1
Jan.  2024
Turn off MathJax
Article Contents
Ke SHANG, Weizhen HE, Shuai ZHANG, “Review on Security Defense Technology Research in Edge Computing Environment,” Chinese Journal of Electronics, vol. 33, no. 1, pp. 1–18, 2024 doi: 10.23919/cje.2022.00.170
Citation: Ke SHANG, Weizhen HE, Shuai ZHANG, “Review on Security Defense Technology Research in Edge Computing Environment,” Chinese Journal of Electronics, vol. 33, no. 1, pp. 1–18, 2024 doi: 10.23919/cje.2022.00.170

Review on Security Defense Technology Research in Edge Computing Environment

doi: 10.23919/cje.2022.00.170
More Information
  • Author Bio:

    Ke SHANG was born in 1995. She received the M.E. degree from University of Sydney, Australia, in 2018. She is currently an Assistant Professor of the Information Engineering University, Zhengzhou, China. Her research interests focus on edge computing security. (Email: keshan1995@163.com)

    Weizhen HE was born in 1996. He received the M.E. degree from the Information Engineering University, Zhengzhou, China, in 2020. He is currently a Ph.D. candidate of the Information Engineering University. His research interests include cloud security and deception. (Email: heweizhen@alu.hit.edu.cn)

    Shuai ZHANG was born in 1994. He received the Ph.D. degree from the Information Engineering University, Zhengzhou, China, in 2021. He is currently an Assistant Professor of the Information Engineering University. His research interests focus on cloud native security. (Email: 2012301200229@whu.edu.cn)

  • Corresponding author: Email: heweizhen@alu.hit.edu.cn
  • Received Date: 2022-06-14
  • Accepted Date: 2023-01-17
  • Available Online: 2023-07-19
  • Publish Date: 2024-01-05
  • Edge computing, which achieves quick data processing by sinking data computing and storage to the network edge, has grown rapidly along with the Internet of things. The new network architecture of edge computing brings new security challenges. Based on this, this paper investigates the edge computing security literature published in recent years and summarizes and analyzes research work on edge computing security from different attack surfaces. We start with the definition and architecture of edge computing. From the attack surface between device and edge server, as well as on edge servers, the research describes the security threats and defense methods of edge computing. In addition, the cause of the attack and the pros and cons of defense methods is introduced. The challenges and future research directions of edge computing are given.
  • loading
  • [1]
    J. R. David Reinsel and J. Gantz, “The digitization of the world-from edge to core,” Available at: https://www.seagate.com/files/www-content/ourstory/trends/files/idc-seagate-dataage-whitepaper.pdf, 2018.
    [2]
    J. L. Zhang, Y. C. Zhao, B. Chen, et al., “Survey on data security and privacy-preserving for the research of edge computing,” Journal on Communications, vol. 39, no. 3, pp. 1–21, 2018. (in Chinese) doi: 10.11959/j.issn.1000-436x.2018037
    [3]
    X. W. Li, B. H. Chen, D. Q. Yang, et al., “Review of security protocols in edge computing environments,” Journal of Computer Research and Development, vol. 59, no. 4, pp. 765–780, 2022. (in Chinese) doi: 10.7544/issn1000-1239.20210644
    [4]
    Y. H. Xiao, Y. Z. Jia, C. C. Liu, et al., “Edge computing security: State of the art and challenges,” Proceedings of the IEEE, vol. 107, no. 8, pp. 1608–1631, 2019. doi: 10.1109/JPROC.2019.2918437
    [5]
    Z. Y. Huang, G. M. Xia, Z. H. Wang, et al., “Survey on edge computing security, ” in Proceedings of 2020 International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering, Fuzhou, China, pp. 96–105, 2020.
    [6]
    I. N. Releases, “Ibm and nokia siemens networks announce worlds first mobile edge computing platform,” Available at: http://www-03.ibm.com/press/us/en/pressrelease/40490.wss.15, 2016.
    [7]
    ETSI, “Mobile-edge computing-introductory technical white paper,” Available at: https://max.book118.com/html/2018/1006/8013022103001125.shtm, 2014.
    [8]
    ETSI, “Mobile edge computing: A key technology towards 5g,” Available at: https://docslib.org/doc/612752/mobile-edge-computinga-key-technology-towards-5g, 2015.
    [9]
    E. C. I. Alliance, “Edge computing industry alliance white paper,” Available at: https://www.digitalelite.cn/h-nd-921.html, 2016.
    [10]
    Alibaba Cloud Computing Ltd and China Electronics Standardization Institute, “Edge cloud computing technology and standardization white paper,” Available at: http://www.cesi.cn/images/editor/20181214/20181214115429307.pdf, 2018-12-12. (in Chinese)
    [11]
    ISO, “Information technology-cloud computing-edge computing landscape,” Available at: https://webstore.iec.ch/preview/info_isoiectr23188%7Bed1.0%7Den.pdf, 2020.
    [12]
    ECC and AII, “Edge computing reference architecture 3.0,” Available at: http://www.ecconsortium.org/Uploads/file/20181214/20181214104331_73917.pdf, 2018. (in Chinese)
    [13]
    A. Greenberg, “100mb password dictionary,” Available at: https://github.com/danielmiessler/SecLists/tree/master/Passwords, 2018.
    [14]
    A. Cassola, W. K. Robertson, E. Kirda, et al., “A practical, targeted, and stealthy attack against WPA enterprise authentication,” in Proceedings of the 20th Annual Network and Distributed System Security Symposium, San Diego, CA, USA, pp. 1–15, 2013.
    [15]
    K. Bhargavan and G. Leurent, “Transcript collision attacks: Breaking authentication in TLS, IKE, and SSH,” in Proceedings of the Network and Distributed System Security Symposium, San Diego, CA, USA, pp. 1–17, 2016.
    [16]
    T. T. Zhu, L. Fu, Q. Liu, et al., “One cycle attack: Fool sensor-based personal gait authentication with clustering,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 553–568, 2020. doi: 10.1109/TIFS.2020.3016819
    [17]
    E. Hammer-Lahav, “The OAuth 1.0 protocol,” RFC5849, 2010.
    [18]
    D. Hardt, “The OAuth 2.0 authorization framework,” RFC 6749, 2012.
    [19]
    A. Greenberg, “Oauth security advisory,” Available at: http://oauth.net/advisories/2009–1/, 2009.
    [20]
    S. T. Sun and K. Beznosov, “The devil is in the (implementation) details: An empirical analysis of OAuth SSO systems,” in Proceedings of the 2012 ACM Conference on Computer and Communications Security, Raleigh North, CA, USA, pp. 378–390, 2012.
    [21]
    H. Li, Y. H. He, L. M. Sun, et al., “Side-channel information leakage of encrypted video stream in video surveillance systems,” in Proceedings of the 35th Annual IEEE International Conference on Computer Communications, San Francisco, CA, USA, pp. 1–9, 2016.
    [22]
    N. Apthorpe, D. Reisman, and N. Feamster, “A smart home is no castle: Privacy vulnerabilities of encrypted IoT traffic,” arXiv preprint, arXiv: 1705.06805, 2017.
    [23]
    W. T. Chen and Z. Y. Qian, “Off-Path TCP exploit: How wireless routers can jeopardize your secrets,” in Proceedings of the 27th USENIX Conference on Security Symposium, Baltimore, MD, USA, pp. 1581–1598, 2018.
    [24]
    M. Lopez-Martin, B. Carro, A. Sanchez-Esguevillas, et al., “Network traffic classifier with convolutional and recurrent neural networks for internet of things,” IEEE Access, vol. 5, pp. 18042–18050, 2017. doi: 10.1109/ACCESS.2017.2747560
    [25]
    A. Acar, H. Fereidooni, T. Abera, et al., “Peek-a-boo: I see your smart home activities, even encrypted!,” in Proceed-ings of the 13th ACM Conference on Security and Pri-vacy in Wireless and Mobile Networks, Linz, Austria, pp. 207–218, 2020.
    [26]
    M. Enev, S. Gupta, T. Kohno, et al., “Televisions, video privacy, and powerline electromagnetic interference,” in Proceedings of the 18th ACM Conference on Computer and Communications Security, Chicago, IL, USA, pp. 537–550, 2011.
    [27]
    Y. Meng, J. L. Li, H. J. Zhu, et al., “Revealing your mobile password via WiFi signals: Attacks and countermeasures,” IEEE Transactions on Mobile Computing, vol. 19, no. 2, pp. 432–449, 2020. doi: 10.1109/TMC.2019.2893338
    [28]
    G. W. Hart, “Nonintrusive appliance load monitoring,” Proceedings of the IEEE, vol. 80, no. 12, pp. 1870–1891, 1992. doi: 10.1109/5.192069
    [29]
    L. Stankovic, V. Stankovic, J. Liao, et al., “Measuring the energy intensity of domestic activities from smart meter data,” Applied Energy, vol. 183, pp. 1565–1580, 2016. doi: 10.1016/j.apenergy.2016.09.087
    [30]
    E. Ronen, A. Shamir, A. O. Weingarten, et al., “IoT goes nuclear: Creating a zigbee chain reaction,” in Proceedings of 2017 IEEE Symposium on Security and Privacy, San Jose, CA, USA, pp. 195–212, 2017.
    [31]
    A. Greenberg, “The reaper IoT botnet has already infected a million networks,” Available at: https://www.wired.com/story/reaper-iotbotnet-infectedmillion-networks/, 2018-01-13.
    [32]
    J. Maskiewicz, B. Ellis, J. Mouradian, et al., “Mouse trap: Exploiting firmware updates in USB peripherals, ” in Proceedings of the 8th USENIX Conference on Offensive Technologies, San Diego, CA, USA, pp. 1–10, 2014.
    [33]
    R. Wang, L. Y. Xing, X. F. Wang, et al., “Unauthorized origin crossing on mobile platforms: Threats and mitigation,” in Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, Germany, pp. 635–646, 2013.
    [34]
    C. G. Ren, Y. L. Zhang, H. Xue, et al., “Towards discovering and understanding task hijacking in android,” in Proceedings of the 24th USENIX Conference on Security Symposium, Washington, DC, USA, pp. 945–959, 2015.
    [35]
    Y. H. Xiao, G. D. Bai, J. Mao, et al., “Privilege leakage and information stealing through the android task mechanism,” in Proceedings of 2017 IEEE Symposium on Privacy-Aware Computing, Washington, DC, USA, pp. 152–163, 2017.
    [36]
    K. Chen, X. Q. Wang, Y. Chen, et al., “Following devil’s footprints: Cross-platform analysis of potentially harmful libraries on android and iOS,” in Proceedings of 2016 IEEE Symposium on Security and Privacy, San Jose, CA, USA, pp. 357–376, 2016.
    [37]
    M. Antonakakis, T. April, M. Bailey, et al., “Understanding the mirai botnet,” in Proceedings of the 26th USENIX Conference on Security Symposium, Vancouver, Canada, pp. 1093–1110, 2017.
    [38]
    C. Kolias, G. Kambourakis, A. Stavrou, et al., “DDoS in the IoT: Mirai and other botnets,” Computer, vol. 50, no. 7, pp. 80–84, 2017. doi: 10.1109/MC.2017.201
    [39]
    S. Rizvi, A. Kurtz, J. Pfeffer, et al., “Securing the internet of things (IoT): A security taxonomy for IoT,” in Proceedings of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering, New York, NY, USA, pp. 163–168, 2018.
    [40]
    Cisco, “Cisco fog director cross-site scripting vulnerability,” Available at: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160201-fd, 2016-02-01.
    [41]
    A. Costin, “IoT/embedded vs. security: Learn from the past, apply to the present, prepare for the future,” in Proceedings of the 22nd Conference of Open Innovations Association, Jyvaskyla, Finland, pp. 1-13, 2018.
    [42]
    M. S. Ansari, S. H. Alsamhi, Y. S. Qiao, et al., “Security of distributed intelligence in edge computing: Threats and countermeasures,” in The Cloud-to-Thing Continuum: Opportunities and Challenges in Cloud, Fog and Edge Computing, Eds. Springer, Cham, Germany, pp. 95–122, 2020.
    [43]
    B. Pinkas and T. Sander, “Securing passwords against dictionary attacks,” in Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, pp. 161–170, 2002.
    [44]
    A. T. B. Jin, D. N. C. Ling, and A. Goh, “Biohashing: Two factor authentication featuring fingerprint data and tokenised random number,” Pattern Recognition, vol. 37, no. 11, pp. 2245–2255, 2004. doi: 10.1016/j.patcog.2004.04.011
    [45]
    F. Schroff, D. Kalenichenko, and J. Philbin, “FaceNet: A unified embedding for face recognition and clustering,” in Proceedings of 2015 IEEE Conference on Computer Vision and Pattern Recognition, Boston, MA, USA, pp. 815–823, 2015.
    [46]
    F. Aloul, S. Zahidi, and W. El-Hajj, “Two factor authentication using mobile phones,” in Proceedings of 2009 IEEE/ACS International Conference on Computer Systems and Applications, Rabat, Morocco, pp. 641–644, 2009.
    [47]
    M. Dailey and C. Namprempre, “A text graphics character CAPTCHA for password authentication,” in Proceedings of 2004 IEEE Region 10 Conference TENCON 2004, Chiang Mai, Thailand, pp. 45–48, 2004.
    [48]
    N. Karapanos, C. Marforio, C. Soriente, et al., “Sound-Proof: Usable two-factor authentication based on ambient sound,” in Proceedings of the 24th USENIX Security Symposium, Washington, DC, USA, pp. 483–498, 2015.
    [49]
    C. Mulliner, R. Borgaonkar, P. Stewin, et al., “SMS-based one-time passwords: Attacks and defense,” in International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Berlin, Germany, pp. 150–159, 2013.
    [50]
    D. Wang, J. Ming, T. Chen, et al., “Cracking IoT device user account via brute-force attack to SMS authentication code,” in Proceedings of the First Workshop on Radical and Experiential Security, Incheon, Republic of Korea, pp. 57–60, 2018.
    [51]
    M. Joshi, B. Mazumdar, and S. Dey, “Security vulnerabilities against fingerprint biometric system,” arXiv preprint, arXiv: 1805.07116, 2018.
    [52]
    Y. L. Liu, “Defense of WPA/WPA2-psk brute forcer,” in Proceedings of 2015 2nd International Conference on Information Science and Control Engineering, Shanghai, China, pp. 185–188, 2015.
    [53]
    J. Noh, J. Kim, G. Kwon, et al., “Secure key exchange scheme for WPA/WPA2-psk using public key cryptography,” in Proceedings of 2016 IEEE International Conference on Consumer Electronics-Asia, Seoul, Korea (South), pp. 1–4, 2016.
    [54]
    S. Sivakorn, G. Argyros, K. X. Pei, et al., “HVLearn: Automated black-box analysis of hostname verification in SSL/TLS implementations,” in Proceedings of 2017 IEEE Symposium on Security and Privacy, San Jose, CA, USA, pp. 521–538, 2017.
    [55]
    K. Bhargavan, B. Blanchet, and N. Kobeissi, “Verified models and reference implementations for the TLS 1.3 standard candidate,” in Proceedings of 2017 IEEE Symposium on Security and Privacy, San Jose, CA, USA, pp. 483–502, 2017.
    [56]
    M. Shehab and F. Mohsen, “Securing OAuth implementations in smart phones,” in Proceedings of the 4th ACM Conference on Data and Application Security and Privacy, San Antonio, TX, USA, pp. 167–170, 2014.
    [57]
    S. Cirani, M. Picone, P. Gonizzi, et al., “IoT-OAS: An OAuth-based authorization service architecture for secure services in IoT scenarios,” IEEE Sensors Journal, vol. 15, no. 2, pp. 1224–1234, 2015. doi: 10.1109/JSEN.2014.2361406
    [58]
    V. Prakash, A. V. Singh, and S. K. Khatri, “A new model of light weight hybrid cryptography for internet of things,” in Proceedings of 2019 3rd International conference on Electronics, Communication and Aerospace Technology, Coimbatore, India, pp. 282–285, 2019.
    [59]
    R. Chatterjee and R. Chakraborty, “A modified lightweight PRESENT cipher for IoT security,” in Proceedings of 2020 International Conference on Computer Science, Engineering and Applications, Gunupur, India, pp. 1–6, 2020.
    [60]
    H. Noura, A. Chehab, L. Sleem, et al., “One round cipher algorithm for multimedia IoT devices,” Multimedia Tools and Applications, vol. 77, no. 14, pp. 18383–18413, 2018. doi: 10.1007/s11042-018-5660-y
    [61]
    L. Sweeney, “k-anonymity: A model for protecting privacy,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557–570, 2002. doi: 10.1142/S0218488502001648
    [62]
    Z. Ling, J. Z. Luo, Y. Zhang, et al., “A novel network delay based side-channel attack: Modeling and defense,” in Proceedings of 2012 Proceedings IEEE INFOCOM, Orlando, FL, USA, pp. 2390–2398, 2012.
    [63]
    Y. Zhang, Y. L. Mao, M. Z. Xu, et al., “Towards thwarting template side-channel attacks in secure cloud deduplications,” IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 3, pp. 1008–1018, 2021. doi: 10.1109/TDSC.2019.2911502
    [64]
    A. Machanavajjhala, J. Gehrke, D. Kifer, et al., “L-diversity: Privacy beyond k-anonymity,” in Proceedings of 22nd International Conference on Data Engineering, Atlanta, GA, USA, pp. 3–19, 2006.
    [65]
    N. H. Li, T. C. Li, and S. Venkatasubramanian, “t-closeness: Privacy beyond k-anonymity and l-diversity,” in Proceedings of 2007 IEEE 23rd International Conference on Data Engineering, Istanbul, Turkey, pp. 106–115, 2007.
    [66]
    A. Sivanathan, H. H. Gharakheili, F. Loi, et al., “Classifying IoT devices in smart environments using network traffic characteristics,” IEEE Transactions on Mobile Computing, vol. 18, no. 8, pp. 1745–1759, 2019. doi: 10.1109/TMC.2018.2866249
    [67]
    D. Wood, N. Apthorpe, and N. Feamster, “Cleartext data transmissions in consumer IoT medical devices,” in Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, Dallas, TX, USA, pp. 7–12, 2017.
    [68]
    W. Zhang, Y. Meng, Y. G. Liu, et al., “HoMonit: Monitoring smart home apps from encrypted traffic,” in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, Canada, pp. 1074–1088, 2018.
    [69]
    Q. Chen, Y. Zhuang, J. Liang, et al. “Research on dns encryption technology”, in International Conference on Computer Engineering and Networks, Singapore, pp. 1395–1405, 2022.
    [70]
    D. Molnar, M. Piotrowski, D. Schultz, et al., “The program counter security model: Automatic detection and removal of control-flow side channel attacks,” in Proceedings of the 8th International Conference on Information Security and Cryptology, Seoul, Korea, pp. 156–168, 2005.
    [71]
    R. Strackx and F. Piessens, “The Heisenberg defense: Proactively defending SGX enclaves against page-table-based side-channel attacks,” arXiv preprint, arXiv: 1712.08519, 2017.
    [72]
    Y. C. Fu, E. Bauman, R. Quinonez, et al., “SGX-LAPD: Thwarting controlled side channel attacks via enclave verifiable page faults,” in International Symposium on Research in Attacks, Intrusions, and Defenses, Atlanta, GA, USA, pp. 357–380, 2017.
    [73]
    P. Subramanyan, S. Malik, H. Khattri, et al., “Verifying information flow properties of firmware using symbolic execution,” in Proceedings of 2016 Design, Automation & Test in Europe Conference & Exhibition, Dresden, Germany, pp. 337–342, 2016.
    [74]
    G. Hernandez, F. Fowze, D. Tian, et al., “FirmUSB: Vetting USB device firmware using domain informed symbolic execution,” in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA, pp. 2245–2262, 2017.
    [75]
    N. Redini, A. Machiry, R. Y. Wang, et al., “Karonte: Detecting insecure multi-binary interactions in embedded firmware,” in Proceedings of 2020 IEEE Symposium on Security and Privacy, San Francisco, CA, USA, pp. 1544–1561, 2020.
    [76]
    Y. Yao, W. Zhou, Y. Jia, et al., “Identifying privilege separation vulnerabilities in IoT firmware with symbolic execution,” in Proceedings of the 24th European Symposium on Research in Computer Security, Luxembourg, Luxembourg, pp. 638–657, 2019.
    [77]
    K. Cheng, Q. Li, L. Wang, et al., “DTaint: Detecting the taint-style vulnerability in embedded device firmware,” in Proceedings of 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Luxembourg, Luxembourg, pp. 430–441, 2018.
    [78]
    D. D. Chen, M. Egele, M. Woo, et al., “Towards automated dynamic analysis for linux-based Towards Automated Dynamic Analysis for Linux-based,” in Proceedings of the NDSS, San Diego, CA, USA, pp. 21–24, 2016.
    [79]
    Y. W. Zheng, A. Davanian, H. Yin, et al., “FIRM-AFL: High-throughput greybox fuzzing of IoT firmware via augmented process emulation,” in Proceedings of the 28th USENIX Conference on Security Symposium, Santa Clara, CA, USA, pp. 1099–1114, 2019.
    [80]
    A. Cui, M. Costello, and S. Stolfo, “When firmware modifications attack: A case study of embedded exploitation,” in Proceedings of the 20th Annual Network & Distributed System Security Symposium, San Diego, California, pp. 1078–1088, 2013.
    [81]
    B. Lee and J. H. Lee, “Blockchain-based secure firmware update for embedded devices in an internet of things environment,” The Journal of Supercomputing, vol. 73, no. 3, pp. 1152–1167, 2017. doi: 10.1007/s11227-016-1870-0
    [82]
    A. A. Clements, N. S. Almakhdhub, K. S. Saab, et al., “Protecting bare-metal embedded systems with privilege overlays,” in Proceedings of 2017 IEEE Symposium on Security and Privacy, San Jose, CA, USA, pp. 289–303, 2017.
    [83]
    C. H. Kim, T. Kim, H. Choi, et al., “Securing real-time microcontroller systems through customized memory view switching,” in Proceedings of the Network and Distributed System Security Symposium, San Diego, CA, USA, pp. 1–15, 2018.
    [84]
    Z. Liu, C. Z. Hu, and C. Shan, “Riemannian manifold on stream data: Fourier transform and entropy-based DDoS attacks detection method,” Computers & Security, vol. 109, article no. 102392, 2021. doi: 10.1016/j.cose.2021.102392
    [85]
    J. B. Li, M. Liu, Z. Xue, et al., “RTVD: A real-time volumetric detection scheme for DDoS in the internet of things,” IEEE Access, vol. 8, pp. 36191–36201, 2020. doi: 10.1109/ACCESS.2020.2974293
    [86]
    R. Doshi, N. Apthorpe, and N. Feamster, “Machine learning DDoS detection for consumer internet of things devices,” in Proceedings of 2018 IEEE Security and Privacy Workshops, San Francisco, CA, USA, pp. 29–35, 2018.
    [87]
    Y. W. Chen, J. P. Sheu, Y. C. Kuo, et al., “Design and implementation of IoT DDoS attacks detection system based on machine learning,” in Proceedings of 2020 European Conference on Networks and Communications, Dubrovnik, Croatia, pp. 122–127, 2020.
    [88]
    R. Vishwakarma and A. K. Jain, “A honeypot with machine learning based detection framework for defending IoT based botnet DDoS attacks,” in Proceedings of 2019 3rd International Conference on Trends in Electronics and Informatics, Tirunelveli, India, pp. 1019–1024, 2019.
    [89]
    M. H. Aysa, A. A. Ibrahim, and A. H. Mohammed, “IoT Ddos attack detection using machine learning,” in Proceedings of 2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies, Istanbul, Turkey, pp. 1–7, 2020.
    [90]
    W. G. J. Halfond, J. Viegas, and A. Orso, “A classification of SQL-injection attacks and countermeasures,” in Proceedings of the International Symposium on Secure Software Engineering, Washington, DC, USA, pp. 13–15, 2006.
    [91]
    P. Bisht, P. Madhusudan, and V. N. Venkatakrishnan, “CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks,” ACM Transactions on Information and System Security, vol. 13, no. 2, article no. 14, 2010. doi: 10.1145/1698750.1698754
    [92]
    K. A. Jackson and B. T. Bennett, “Locating SQL injection vulnerabilities in java byte code using natural language techniques,” in Proceedings of the SoutheastCon 2018, St. Petersburg, FL, USA, pp. 1–5, 2018.
    [93]
    S. Gupta and B. B. Gupta, “Cross-site scripting (XSS) attacks and defense mechanisms: Classification and state-of-the-art,” International Journal of System Assurance Engineering and Management, vol. 8, no. S1, pp. S512–S530, 2017. doi: 10.1007/s13198-015-0376-0
    [94]
    N. Jovanovic, E. Kirda, and C. Kruegel, “Preventing cross site request forgery attacks,” in Proceedings of 2006 Securecomm and Workshops, Baltimore, MD, USA, pp. 1–10, 2006.
    [95]
    A. Barth, C. Jackson, and J. C. Mitchell, “Robust defenses for cross-site request forgery,” in Proceedings of the 15th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, pp. 75–88, 2008.
    [96]
    B. S. Y. Fung and P. P. C. Lee, “A privacy-preserving defense mechanism against request forgery attacks,” in Proceedings of 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, pp. 45–52, 2011.
    [97]
    M. Srokosz, D. Rusinek, and B. Ksiezopolski, “A new WAF-based architecture for protecting web applications against CSRF attacks in malicious environment,” in Proceedings of 2018 Federated Conference on Computer Science and Information Systems, Poznan, Poland, pp. 391–395, 2018.
    [98]
    M. Jensen, C. Meyer, J. Somorovsky, et al., “On the effectiveness of XML schema validation for countering XML signature wrapping attacks,” in Proceedings of 2011 1st International Workshop on Securing Services on the Cloud, Milan, Italy, pp. 7–13, 2011.
    [99]
    A. N. Gupta and P. S. Thilagam, “Detection of XML signature wrapping attack using node counting,” in Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC–16’), V. Vijayakumar and V. Neelanarayanan, Eds. Springer, Cham, Germany, pp. 57–63, 2016.
    [100]
    N. Apthorpe, D. Y. Huang, D. Reisman, et al., “Keeping the smart home private with smart (er) IoT traffic shaping,” arXiv preprint, arXiv: 1812.00955, 2018.
    [101]
    V. De Miranda Rios, P. R. M. Inácio, D. Magoni, et al., “Detection and mitigation of low-rate denial-of-service attacks: A survey,” IEEE Access, vol. 10, pp. 76648–76668, 2022. doi: 10.1109/ACCESS.2022.3191430
    [102]
    S. Vimal, A. Suresh, P. Subbulakshmi, et al., “Edge computing-based intrusion detection system for smart cities development using IoT in urban areas,” in Internet of things in smart Technologies for Sustainable Urban Development, G. R. Kanagachidambaresan, R. Maheswar, V. Manikandan, et al., Eds. Springer, Cham, Germany, pp. 219–237, 2020.
    [103]
    F. Kamoun-Abid, M. Rekik, A. Meddeb-Makhlouf, et al., “Secure architecture for Cloud/Fog computing based on firewalls and controllers,” Procedia Computer Science, vol. 192, pp. 822–833, 2021. doi: 10.1016/j.procs.2021.08.085
    [104]
    S. Singh, R. Sulthana, T. Shewale, et al., “Machine-learning-assisted security and privacy provisioning for edge computing: A survey,” IEEE Internet of Things Journal, vol. 9, no. 1, pp. 236–260, 2022. doi: 10.1109/JIOT.2021.3098051
    [105]
    H. D. Zhang, J. Y. Hao, and X. H. Li, “A method for deploying distributed denial of service attack defense strategies on edge servers using reinforcement learning,” IEEE Access, vol. 8, pp. 78482–78491, 2020. doi: 10.1109/ACCESS.2020.2989353
    [106]
    N. Thangamani and M. Murugappan, “A lightweight cryptography technique with random pattern generation,” Wireless Personal Communications, vol. 104, no. 4, pp. 1409–1432, 2019. doi: 10.1007/s11277-018-6092-8
    [107]
    M. J. R. Shantha and L. Arockiam, “SAT_Jo: An enhanced lightweight block cipher for the internet of things,” in Proceedings of 2018 Second International Conference on Intelligent Computing and Control Systems, Madurai, India, pp. 1146–1150, 2018.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(4)  / Tables(2)

    Article Metrics

    Article views (524) PDF downloads(130) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return