透過您的圖書館登入
IP:52.14.126.74
  • 期刊

霧運算環境中使用人工智慧網路分析中間人攻擊機制

Using Artificial Intelligence Network to Analyze Man-in-the-Middle Attack Mechanism in Fog Networking Environment

摘要


本論文主要探討軟體定義霧聯網下的網路攻擊的研究,使用人工智慧分析,我們必需要清楚明白霧聯網與軟體定義網路的運作原理,才能洞察如何可以改善霧聯網與軟體定義網路的安全通訊機制,進而才可以再作頻寬效率度的提昇。雖然軟體定義霧聯網可以比目前網路大幅減少頻寬的浪費,但若沒有達到穩定與安全性的通訊目標,仍會有疑慮是否可以適用的問題,則使用霧聯網與軟體定義網路架構的意願會降低。此外,對於系統業者而言,若霧聯網與軟體定義網路的傳輸安全性與網路安全性無法確保。在本論文中,我們使用了人工智慧分析來解決了安全性的疑慮,並且提出有效的網路路徑最佳化演算法、軟體定義網路的封包安全檢測機制,人工智慧的分析機制。

並列摘要


This paper discusses the network attacks under software-defined fog networking. With artificial intelligence analysis, we need to clearly understand how fog networking and software-defined networking work. By this way, we can gain insights into how to improve the secure communication mechanism and bandwidth efficiency between the fog network and the software-defined network. Although software-defined fog networking can significantly reduce the bandwidth compared to current networks. If the goal of stable and secure communication is not met, there are still doubts about whether it is applicable. In addition, for the system operator, if the transmission security and network security of the fog networking and the software-defined network cannot be guaranteed. It will reduce the willingness to use the fog networking and software-defined network architecture. In this paper, we use artificial intelligence analysis to address security concerns. We also propose the effective network path optimization algorithm, packet inspection mechanism of software-defined network, and artificial intelligence analysis mechanism.

並列關鍵字

SDN Fog Networking Malware Analysis Ada Boost FSM

參考文獻


A. Akhunzada, A. Gani, N. B. Anuar, et al., „Secure and dependable software defined networks“,in Proceedings of the Journal of Network and Computer Applications, vol. 61, pp. 199–221, 2016
A. O. Oluwasogo and O. Oluwaseyitan, “A security architecture for software defined networks (SDN)“, in Proceedings of the International Journal of Computer Science and Information Security, vol. 13, no. 7, 2015
Christian Banse and Sathyanarayanan Rangarajan “A Secure Northbound Interface for SDN Applications “in Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 413–424, 2015.
K. Bakshi, “Considerations for Sofware Defned Networking (SDN): Approaches and use cases,” in Proceedings of the 2013 IEEE Aerospace Conference, AERO 2013, USA, March 2013.
L. Popa, P. Yalagandula, S. Banerjee, J. C. Mogul, Y. Turner, and J. R. Santos, “ElasticSwitch: Practical work-conserving bandwidth guarantees for cloud computing,” in Proceedings of the Annual Conference of the ACM Special Interest Group on Data Communication on the Applications, Technologies, Architectures, and Protocols for Computer Communication, ACM SIGCOMM 2013, pp. 351–362, August 2013.

延伸閱讀