{"title":"Dynamic Economic-Denial-of-Sustainability (EDoS) Detection in SDN-based Cloud","authors":"Phuc Trinh Dinh, Minho Park","doi":"10.1109/FMEC49853.2020.9144972","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144972","url":null,"abstract":"In Cloud Computing, a new type of attack, called Economic Denial of Sustainability (EDoS) attack, exploits the pay-per-use model to scale up the resource usage over time to the extent that the cloud user has to pay for the unexpected usage charge. To prevent EDoS attacks, we propose an efficient solution in the SDN-based cloud computing environment. In this paper, we first apply an unsupervised learning approach called Long Short-Term Memory (LSTM), which is a multivariate time series anomaly detection, to detect EDoS attacks. Its key idea is to try to predict values of the resource usage of a cloud consumer (CPU load, memory usage and etc). Furthermore, unlike other existing proposals using a predefined threshold to classify the anomalies which generate high rate errors, in this work, we utilize a dynamic error threshold which delivers much better performance. Through practical experiments, the proposed EDoS attack defender is proven to outperform existing mechanisms for EDoS attack detection. Furthermore, it also outperforms some of the machine-learning-based methods, which we conducted the experiment ourselves. The comprehensive experiments conducted with various EDoS attack levels prove that the proposed mechanism is an effective, innovative approach to defense EDoS attacks in the SDN-based cloud.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123871689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Latency-Aware Industrial Fog Application Orchestration with Kubernetes","authors":"R. Eidenbenz, Y. Pignolet, Alain Ryser","doi":"10.1109/FMEC49853.2020.9144934","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144934","url":null,"abstract":"The benefit of fog computing to use local devices more efficiently and to reduce the latency and operation cost compared to cloud infrastructure is promising for industrial automation. Many industrial (control) applications have demanding real-time requirements and existing automation networks typically exhibit low-bandwidth links between sensing and computing devices. Fog applications in industrial automation contexts thus require that the amount of data transferred between sensing, computing and actuating devices, as well as latencies of control loops are minimized. To meet these requirements, this paper proposes a fog layer architecture that manages the computation and deployment of latency-aware industrial applications with Kubernetes, the prevalent container orchestration framework. The resulting fog layer dynamically solves the resource allocation optimization problem and then deploys distributed containerized applications to automation system networks. It achieves this in a non-intrusive manner, i.e. without actively modifying Kubernetes. Moreover it does not depend on proprietary protocols and infrastructure and is thus widely applicable and preferable to a vendor-specific solution. We compare the architecture with two alternative approaches that differ in the level of coupling to Kubernetes.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122389905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reinforcement Learning-based Computation Resource Allocation Scheme for 5G Fog-Radio Access Network","authors":"N. Khumalo, O. Oyerinde, L. Mfupe","doi":"10.1109/FMEC49853.2020.9144787","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144787","url":null,"abstract":"Fog computing has emerged as one of the key building blocks of fifth generation mobile networks (5G) because of its ability to effectively meet the demands of real-time or latency-sensitive applications. To introduce fog in 5G, particularly in the radio access network (RAN), intermediate network devices such as remote radio heads, small cells and macro cells are equipped with virtualised storage and processing resources to constitute the fog RAN (F-RAN). However, these resources are limited and inefficient management could cause a bottleneck for F-RAN nodes. To this end, this paper focuses on developing a dynamic and autonomous computing resource allocation scheme for F-RAN considering delay requirements of users at a node. The proposed algorithm uses reinforcement learning to optimise latency, energy consumption and cost in the F-RAN. The performance and computational complexity of the proposed algorithm will be evaluated as part of a simulation and the results compared with other algorithms from existing studies with a similar objective function.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133304777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Security and Privacy for Edge AI in IoT/IoE based Digital Marketing Environments","authors":"R. Sachdev","doi":"10.1109/FMEC49853.2020.9144755","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144755","url":null,"abstract":"Edge Artificial Intelligence (Edge AI) is a crucial aspect of the current and futuristic digital marketing Internet of Things (IoT) / Internet of Everything (IoE) environment. Consumers often provide data to marketers which is used to enhance services and provide a personalized customer experience (CX). However, use, storage and processing of data has been a key concern. Edge computing can enhance security and privacy which has been said to raise the current state of the art in these areas. For example, when certain processing of data can be done local to where requested, security and privacy can be enhanced. However, Edge AI in such an environment can be prone to its own security and privacy considerations, especially in the digital marketing context where personal data is involved. An ongoing challenge is maintaining security in such context and meeting various legal privacy requirements as they themselves continue to evolve, and many of which are not entirely clear from the technical perspective. This paper navigates some key security and privacy issues for Edge AI in IoT/IoE digital marketing environments along with some possible mitigations.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123118693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resource Allocation in Combined Fog-Cloud Scenarios by Using Artificial Intelligence","authors":"Masoud Abedi, M. Pourkiani","doi":"10.1109/FMEC49853.2020.9144693","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144693","url":null,"abstract":"Although both cloud and fog computing technologies provide great on-demand services for the users, but none of them could singly guarantee the Quality of Service for the Internet of Things (IoT) based delay-sensitive applications. Therefore, cooperation between fog and cloud servers is of great importance. In this paper, we discuss about an artificial intelligence (AI) based task distribution algorithm (AITDA), which aims to reduce the response time and the Internet traffic by distribution of the tasks between fog and cloud servers. Our case study is a delay-sensitive application that runs in a situation where the computing capability of fog servers is restricted, and the internet connection is unstable (like vessels on the oceans). The primary trial of the AITDA shows that this method noticeably reduces the response time and internet traffic in comparison to the cloud-based and foz-based approaches.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125992022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel approach for high-velocity big geo-data handling using iterative and feature learning algorithms","authors":"Sana Rekik, Sami Faïz","doi":"10.1109/FMEC49853.2020.9144893","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144893","url":null,"abstract":"Geospatial data were exclusively generated by official agencies. However, following the technological revolution in data collection and production, various sources have emerged for the massive production of geospatial data, resulting the phenomenon of big geo-data. Therefore, dealing with large amounts of these data sets, results in a high velocity as they change very quickly, is a challenging task. Hence, analysis become more complex and computation become prohibitively expensive. As a result, spatial computing technologies become limited in front of these complex data and operations. Accordingly, we aimed to refine complexity with simplicity by replacing traditional geospatial models with referring to the simplest intelligent and minimum resource requirement algorithms that can be applied against these constraints, while ensuring the criteria of performance and scalability. In this work, we focus on the high-velocity of this big geo-data through the use of an iterative approach applied to a feature learning algorithms to decrease the memory consumption and the time complexity of traditional machine learning algorithms. According to our knowledge, although they were widely applied in the 19th century as a solution to overcome the problems of limitation of memory and computing resources. Iterative methods were still not used for the big geo-data analytics and generally for the big data domain. Thus, this approach could be beneficial especially for real time applications such as the anomaly monitoring and detection.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130742922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Third Party Session Control at the Network Edge","authors":"I. Atanasov, E. Pencheva, D. Velkova, V. Trifonov","doi":"10.1109/FMEC49853.2020.9144764","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144764","url":null,"abstract":"Multi-access Edge Computing (MEC) brings the cloud services at the network edge. It is efficient solution for use cases requiring low latency such as mission-critical communications and real-time Internet of Things applications. Furthermore, third-party session control is essential for many of these use cases. The paper presents an approach to design a new mobile edge service which enables third-party applications to place a session with required quality of service, to manipulate session participants and to terminate the session. The service design follows Representational State Transfer architectural style. The proposed service is described by service data model, application programming interfaces and state models. Service latency is evaluated by emulation.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128397461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Case for Federated Identity Management in 5G Communications","authors":"Ed Kamya Kiyemba Edris, Mahdi Aiash, J. Loo","doi":"10.1109/FMEC49853.2020.9144855","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144855","url":null,"abstract":"The heterogeneous nature of fifth generation mobile network (5G) makes the access and provision of network services very difficult and raises security concerns. With multi-users and multi-operators, Service-Oriented Authentication (SOA) and authorization mechanisms are required to provide quick access and interaction between network services. The users require seamless access to services regardless of the domain, type of connectivity or security mechanism used. Hence a need for Identity and Access Management (IAM) mechanism to complement the improved user experience promised in 5G. Federated Identity Management (FIdM) a feature of IAM, can provide a user with use Single Sign On (SSO) to access services from multiple Service Providers (SP). This addresses security requirements such as authentication, authorization, and user's privacy from the end user perspectives, however 5G networks access lacks such solution. We propose a Network Service Federated Identity (NS-FId) model that address these security requirements and complements the 5G Service-Based Architecture (SBA). We present different scenarios and applications of the proposed model. We also discuss the benefits of identity management in 5G.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126648921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Rebahi, Faruk Catal, Nikolay Tcholtchev, Laurenz Maedje, Omar Alkhateeb, Vinoth Kumar Elangovan, Dimitris Apostolakis
{"title":"Towards Accelerating Intrusion Detection Operations at the Edge Network using FPGAs","authors":"Y. Rebahi, Faruk Catal, Nikolay Tcholtchev, Laurenz Maedje, Omar Alkhateeb, Vinoth Kumar Elangovan, Dimitris Apostolakis","doi":"10.1109/FMEC49853.2020.9144926","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144926","url":null,"abstract":"In the current paper, we present our work towards accelerating intrusion detection operations at the edge network using FPGAs. Cloud computing and network function virtualization have led to a new appealing paradigm for service delivery and management. Unfortunately, this paradigm fails to correctly support IoT applications and services that seek better communication platforms. Security as a Service can also be seen as a cloud-based model that needs to be accommodated to fulfill these services requirements. Again, one of the main issues to be addressed in this context is how to improve the performance of such systems or services in order to make them capable of coping with the huge amount of data while remaining reliable. A potential solution is the FPGA based edge computing, which is a powerful combination offering FPGA acceleration capabilities together with edge and fog benefits. Indeed, our work focusses on devising an Intrusion Prevention architecture called FORTISEC (40SEC), that is meant to operate in a completely softwarized as well as in an FPGA mode. Thereby, we present suitable algorithms, design principles and well defined components towards the implementation of accelerated intrusion prevention on the edge. We also present a testbed being utilized for the implementation of 40SEC and its performance testing.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130450356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of an IoT based Pet Care System","authors":"Yixing Chen, M. Elshakankiri","doi":"10.1109/FMEC49853.2020.9144910","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144910","url":null,"abstract":"As pet ownership is soaring each year, the demands for a higher quality of pet care products are increasing as well. This has driven the development of the Internet of Things (IoT) technology in this field. Using the technology of IoT, pet owners can remotely track their pet's activity and location, monitor their pet's health condition or even interact with their pets. All these smart pet care products are playing an indispensable role in the pet owner's daily life. In the present project, we apply the IoT technology to implement an integrated system including pet food feeder, water dispenser, and litter box, which are the three most fundamental elements that pet owners will be concerned about when they are busy or away from their pets. The three subsystems are connected to the local network with Arduino Uno boards and Wi-Fi modules. Furthermore, the data collected from each sensor are processed and displayed on a smartphone application. Thus, pet owners through only one single interface, they can obtain all the information regarding pet's food consumption, water consumption, as well as defecation timing, duration, and frequency. Additionally, a controlling function is also enabled in the application for the pet owners to dispense food anytime and anywhere. An overall statistical chart with the mentioned values is presented in the application, updating from time to time. With this pet care system in a smartphone application, we provide pet owners an efficient, convenient and low-cost tool for pet care.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134310676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}