Friend or foe? Detecting and isolating malicious nodes in mobile edge computing platforms

Abderrahmen Mtibaa, Khaled A. Harras, Hussein Alnuweiri

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

32 Citations (Scopus)

Abstract

The evolution of mobile devices into highly capable computing platforms that sense, store, and execute complex tasks is making them attractive candidates for edge computational micro-cloud settings. Such solutions are creating novel security challenges due to the increased push for more seamless computational cyber-foraging that leverages the exploding proliferation of mobile devices. A major concern is that security challenges stemming from these trends, are growing at a rate exceeding the evolution of security solutions. In this paper, we consider an environment in which computational offloading is performed among a set of mobile devices. We propose HoneyBot, a defense technique for device-to-device (d2d) malicious communication. While classical honeypots designed to isolate distributed denial of service (DDoS) botnet attacks fail to detect d2d insider attacks, HoneyBot nodes detect, track, and isolate such attacks. We propose and investigate detection and tracking algorithms that leverage insecure d2d infected communication channels to accurately and efficiently identify suspect malicious nodes and isolate them. Our data driven evaluation and analysis, based on 3 real world mobility traces, show that the number and placement of HoneyBot nodes (Hb) in the network considerably impact the tracking delay and the detection accuracy.

Original languageEnglish
Title of host publicationProceedings - IEEE 7th International Conference on Cloud Computing Technology and Science, CloudCom 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages42-49
Number of pages8
ISBN (Electronic)9781467395601
DOIs
Publication statusPublished - 1 Feb 2016
Externally publishedYes
Event7th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2015 - Vancouver, Canada
Duration: 30 Nov 20153 Dec 2015

Publication series

NameProceedings - IEEE 7th International Conference on Cloud Computing Technology and Science, CloudCom 2015

Conference

Conference7th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2015
Country/TerritoryCanada
CityVancouver
Period30/11/153/12/15

Keywords

  • HoneyBots
  • MobiBots
  • Mobile Networking Security
  • Mobile d2d botnets

Fingerprint

Dive into the research topics of 'Friend or foe? Detecting and isolating malicious nodes in mobile edge computing platforms'. Together they form a unique fingerprint.

Cite this