Attack Mitigation in Gateways of Pervasive Systems
Abstract
In pervasive systems, mobile devices and other sensors access Gateways, which are Servers that communicate with the devices, provide low latency services, connect them with each other, and connect them to the Internet and backbone networks. Gateway Servers are often equipped with Attack Detection (AD) software that analyzes the incoming traffic to protect the system against Cyberattacks, which can overwhelm the Gateway and the system as a whole. This paper describes a traffiic shaping, attack detection and an optimum attack mitigation scheme to protect the Gateway and the system as a whole from Cyberattacks. The approach is described and evaluated in an experimental testbed. The key parameter of the optimum mitigation technique is chosen based on an analytical model whose predictions are validated through detailed experiments.
- Publication:
-
arXiv e-prints
- Pub Date:
- January 2025
- arXiv:
- arXiv:2501.10159
- Bibcode:
- 2025arXiv250110159G
- Keywords:
-
- Computer Science - Networking and Internet Architecture
- E-Print:
- 6 pages. 7 Figures