ARTÍCULO
TITULO

Hardening the Security of Multi-Access Edge Computing through Bio-Inspired VM Introspection

Huseyn Huseynov    
Tarek Saadawi and Kenichi Kourai    

Resumen

The extreme bandwidth and performance of 5G mobile networks changes the way we develop and utilize digital services. Within a few years, 5G will not only touch technology and applications, but dramatically change the economy, our society and individual life. One of the emerging technologies that enables the evolution to 5G by bringing cloud capabilities near to the end users is Edge Computing or also known as Multi-Access Edge Computing (MEC) that will become pertinent towards the evolution of 5G. This evolution also entails growth in the threat landscape and increase privacy in concerns at different application areas, hence security and privacy plays a central role in the evolution towards 5G. Since MEC application instantiated in the virtualized infrastructure, in this paper we present a distributed application that aims to constantly introspect multiple virtual machines (VMs) in order to detect malicious activities based on their anomalous behavior. Once suspicious processes detected, our IDS in real-time notifies system administrator about the potential threat. Developed software is able to detect keyloggers, rootkits, trojans, process hiding and other intrusion artifacts via agent-less operation, by operating remotely or directly from the host machine. Remote memory introspection means no software to install, no notice to malware to evacuate or destroy data. Experimental results of remote VMI on more than 50 different malicious code demonstrate average anomaly detection rate close to 97%. We have established wide testbed environment connecting networks of two universities Kyushu Institute of Technology and The City College of New York through secure GRE tunnel. Conducted experiments on this testbed deliver high response time of the proposed system.

 Artículos similares

       
 
Likun Zhao, Shaotang Yang and Shouqing Wang    
Over the past three decades, there have been many comprehensive studies related to public?private partnerships (PPP), but the analysis at the macro level still lacks comprehensiveness and interpretability. Through the application of bibliometric analysis... ver más
Revista: Buildings

 
Maria Margarita Ntona, Konstantinos Chalikakis, Gianluigi Busico, Micòl Mastrocicco, Kyriaki Kalaitzidou and Nerantzis Kazakis    
Groundwater monitoring is critically important, even though it is costly and often neglected. In this study, a judgmental monitoring of groundwater offering solutions based on a cost and time-effective research approach is presented. The method was perfo... ver más
Revista: Water

 
Artur Krawczyk    
This paper attempts to define a name for an area of science and technology that encompasses the acquisition, processing and application of spatial data in the mining industry. A comparative study of the evolution of spatial data exchange methods between ... ver más

 
Rodrigo Joaquín Contreras and Ignacio Escuder-Bueno    
Dams and reservoirs have always been of interest to human beings, playing a crucial role given the importance of securing water for sanitary use, irrigation, navigation, flood control and energy generation, among others. The main focus of this article is... ver más
Revista: Infrastructures

 
Haidee Yulady Jaramillo, Oscar Hernan Vasco-Echeverri, Luis Alfonso Moreno-Pacheco and Ricardo Andrés García-León    
The incorporation of biomaterials into concrete for engineering applications has gained significant attention in recent years due to its potential to enhance both the mechanical properties and sustainability of construction materials. This study conducts... ver más
Revista: Infrastructures