2021
DOI: 10.1109/access.2021.3134671
|View full text |Cite
|
Sign up to set email alerts
|

DDoS Attack Mitigation Based on Traffic Scheduling in Edge Computing- Enabled TWDM-PON

Abstract: Time-Wavelength Division Multiplexing Passive Optical Network (TWDM-PON) is considered as a promising solution of next generation PON (NG-PON). The integration of Edge Computing (EC) and TWDM-PON can satisfy the QoS requirements of delay-sensitive applications by providing storage, processing and caching capabilities at the network edge. However, with limited resource capacity, edge nodes in TWDM-PON are vulnerable to network attacks (e.g., Distributed Denial of Service attacks). Resource exhaustion in the att… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 27 publications
0
4
0
Order By: Relevance
“…Currently, relatively little research has been done on DDoS attack in edge computing, mainly in edge collaboration, attack identification, and defense [8,[22][23][24][25][26][27]. The literature [8] studied the DDoS attack mitigation problem in edge computing, proved its NP-hardness, and proposed a gametheoretic approach to solving the problem.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Currently, relatively little research has been done on DDoS attack in edge computing, mainly in edge collaboration, attack identification, and defense [8,[22][23][24][25][26][27]. The literature [8] studied the DDoS attack mitigation problem in edge computing, proved its NP-hardness, and proposed a gametheoretic approach to solving the problem.…”
Section: Related Workmentioning
confidence: 99%
“…The literature [22] considered mitigating the DDoS attack process by balancing the incoming control plane's total traffic and inducing the attack initiator to stop the attack. The literature [23] designed an adaptive traffic scheduling algorithm to enhance collaboration among edge nodes and thus reduce DDoS attack. The literature [24] developed an intrusion detection and defense method for edge environments by learning the original data distribution through Deep Convolution Neural Network (DCNN) and building defense through Q-network algorithm.…”
Section: Related Workmentioning
confidence: 99%
“…Further, the security of bidirectional WDM-PON is increased by using OCDMA-PON which offers asynchronous operation, simple network control, protocol transparency, high network flexibility, and enhanced security. [3][4][5][6] Besides, OCDMA-PON is a promising technology which can be easily used for local and metropolitan area networks with most preferred spectral amplitude coding (SAC) in optical access networks. However, the performance of OCDMA-PON is primary degraded by the consequence of multi-access interference (MAI) and phase-induced intensity noise (PIIN) noise.…”
Section: Introductionmentioning
confidence: 99%
“…The capability to link directly the final subscribers to the core network with long‐reach and cost‐effectiveness, optical amplified full‐duplex WDM‐PON networks attained considerable attention to the communication field. Further, the security of bidirectional WDM‐PON is increased by using OCDMA‐PON which offers asynchronous operation, simple network control, protocol transparency, high network flexibility, and enhanced security 3‐6 . Besides, OCDMA‐PON is a promising technology which can be easily used for local and metropolitan area networks with most preferred spectral amplitude coding (SAC) in optical access networks.…”
Section: Introductionmentioning
confidence: 99%