scholarly journals Survey on Multi-Access Edge Computing Security and Privacy

Author(s):  
Pasika Ranaweera ◽  
Anca Delia Jurcut ◽  
Madhusanka Liyanage
2021 ◽  
Vol 5 (4) ◽  
pp. 52
Author(s):  
Huseyn Huseynov ◽  
Tarek Saadawi ◽  
Kenichi Kourai

The extreme bandwidth and performance of 5G mobile networks changes the way we develop and utilize digital services. Within a few years, 5G will not only touch technology and applications, but dramatically change the economy, our society and individual life. One of the emerging technologies that enables the evolution to 5G by bringing cloud capabilities near to the end users is Edge Computing or also known as Multi-Access Edge Computing (MEC) that will become pertinent towards the evolution of 5G. This evolution also entails growth in the threat landscape and increase privacy in concerns at different application areas, hence security and privacy plays a central role in the evolution towards 5G. Since MEC application instantiated in the virtualized infrastructure, in this paper we present a distributed application that aims to constantly introspect multiple virtual machines (VMs) in order to detect malicious activities based on their anomalous behavior. Once suspicious processes detected, our IDS in real-time notifies system administrator about the potential threat. Developed software is able to detect keyloggers, rootkits, trojans, process hiding and other intrusion artifacts via agent-less operation, by operating remotely or directly from the host machine. Remote memory introspection means no software to install, no notice to malware to evacuate or destroy data. Experimental results of remote VMI on more than 50 different malicious code demonstrate average anomaly detection rate close to 97%. We have established wide testbed environment connecting networks of two universities Kyushu Institute of Technology and The City College of New York through secure GRE tunnel. Conducted experiments on this testbed deliver high response time of the proposed system.


IEEE Access ◽  
2021 ◽  
Vol 9 ◽  
pp. 18706-18721
Author(s):  
Belal Ali ◽  
Mark A. Gregory ◽  
Shuo Li

2019 ◽  
Vol 3 (2) ◽  
pp. 26-34 ◽  
Author(s):  
Lanfranco Zanzi ◽  
Flavio Cirillo ◽  
Vincenzo Sciancalepore ◽  
Fabio Giust ◽  
Xavier Costa-Perez ◽  
...  
Keyword(s):  

ICT Express ◽  
2021 ◽  
Author(s):  
Madhusanka Liyanage ◽  
Pawani Porambage ◽  
Aaron Yi Ding ◽  
Anshuman Kalla

IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Chit Wutyee Zaw ◽  
Shashi Raj Pandey ◽  
Kitae Kim ◽  
Choong Seon Hong

Sign in / Sign up

Export Citation Format

Share Document