Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Edge server DoS attack detection method based on runtime verification

An edge server and attack detection technology, which is applied in error detection/correction, instrumentation, software testing/debugging, etc., can solve problems such as large memory usage, low detection efficiency, and increased difficulty of DoS attacks, so as to ensure security, The effect of ensuring reliability and improving verification efficiency

Pending Publication Date: 2021-11-09
XIDIAN UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (1) The existing DoS attack detection methods for edge computing systems use pattern recognition or machine learning methods, which need to train the model in advance, and then use a large amount of memory when performing real-time detection based on the trained model;
[0007] (2) In the existing formal verification methods represented by model checking and runtime verification, theoretical models such as automata need to be constructed, and the detection efficiency is not high
However, the computing resources of edge servers are limited, which increases the difficulty of accurately and efficiently detecting DoS attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Edge server DoS attack detection method based on runtime verification
  • Edge server DoS attack detection method based on runtime verification
  • Edge server DoS attack detection method based on runtime verification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0044] Aiming at the problems existing in the prior art, the present invention provides a DoS attack detection method for an edge server based on runtime verification. The present invention will be described in detail below in conjunction with the accompanying drawings.

[0045] Such as figure 1 As shown, an edge server DoS attack detection method based on runtime verification provided by an embodiment of the present invention includes the following steps:

[0046] S101. Formally describe the expected behavior of the edge server by using a PPTL formula;

[0047] S102, using a PPTL formula to formally describe the DoS atta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of program running verification, and discloses an edge server DoS attack detection method based on runtime verification, and the method comprises the steps of carrying out the formalized description of an edge server expected behavior through employing a PPTL formula; adopting a PPTL formula to describe DoS attack features of the edge server in a formalized manner; aiming at a program variable and a program function involved in the PPTL formula, carrying out instrumentation on an edge server running program; and aiming at the dynamic execution track of the edge server program, detecting the running state of the program by adopting a verification framework during parallel running, and judging whether the edge server is under DoS attack or not according to a detection result. According to the verification framework based on parallel runtime provided by the invention, idle computing and storage resources of the edge server can be fully utilized, the verification efficiency is improved, attacks can be found in time, each state of program execution can be reliably verified, and the security of the edge server is effectively guaranteed.

Description

technical field [0001] The invention belongs to the technical field of program operation verification, and in particular relates to a DoS attack detection method of an edge server based on runtime verification. Background technique [0002] At present, the edge computing system uses the computing and storage resources of the terminal device and the edge server near the terminal to partially process the data in advance, reducing the amount of data to be sent to the cloud data center, thereby reducing the usage of network bandwidth and enabling the system to Respond to data immediately with low data latency. However, the characteristics of edge servers make it face new challenges. First, because edge servers are located at the edge of the network, closer to users, heterogeneous access environments and diverse business requirements make edge servers face a more complex network environment. In addition, edge servers are often geographically distributed, making it difficult to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56G06F11/36
CPCG06F21/566G06F11/3624
Inventor 于斌陆旭田聪段振华张南曲南江
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products