DDoS Attack Mitigation Based on Traffic Scheduling in Edge Computing- Enabled TWDM-PON

12Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.

Abstract

Time-Wavelength Division Multiplexing Passive Optical Network (TWDM-PON) is considered as a promising solution of next generation PON (NG-PON). The integration of Edge Computing (EC) and TWDM-PON can satisfy the QoS requirements of delay-sensitive applications by providing storage, processing and caching capabilities at the network edge. However, with limited resource capacity, edge nodes in TWDM-PON are vulnerable to network attacks, e.g., Distributed Denial of Service (DDoS) attacks. Resource exhaustion in the attacked nodes easily leads to QoS degradation and even service blocking. This paper investigates how to effectively schedule traffic to mitigate the DDoS attack in EC-enabled TWDM-PON. Based on the collaboration of edge nodes, an adaptive traffic scheduling algorithm is designed to minimize the impact of DDoS attacks on delay sensitive services. The performance of the proposed algorithm is evaluated in simulation, where direct and indirect DDoS attacks are simulated. Besides, the attack duration and the number of attacked nodes are considered in the evaluation. Simulation results show that the proposed algorithm can effectively mitigate DDoS attacks in terms of reducing the QoS degradation rate and blocking rate of delay-sensitive services.

Cite

CITATION STYLE

APA

Li, Y., Zhao, Y., Li, J., Yu, X., Zhao, Y., & Zhang, J. (2021). DDoS Attack Mitigation Based on Traffic Scheduling in Edge Computing- Enabled TWDM-PON. IEEE Access, 9, 166566–166578. https://doi.org/10.1109/ACCESS.2021.3134671

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free