Memory and Cache Contention Denial-of-Service Attack in Mobile Edge Devices
نویسندگان
چکیده
In this paper, we introduce a memory and cache contention denial-of-service attack its hardware-based countermeasure. Our can significantly degrade the performance of benign programs by hindering shared resource accesses programs. It be achieved simple C-based malicious code while degrading 47.6% on average. As another side-effect, our also leads to greater energy consumption system 2.1× average, which may cause shorter battery life in mobile edge devices. We propose detection mitigation techniques for thwarting attack. By analyzing L1 data miss request patterns, effectively detect program For mitigation, using instruction fetch width throttling restrict resources. When employing with technique, recover 92.4% 94.7%, respectively, means that adverse impacts from are almost removed.
منابع مشابه
Denial of Service Attack and Defense
In this chapter, we firstly review the short history of denial of service (DoS) and distributed denial of service (DDoS) attacks. We further explore the reasons why the current cyberspace is a heaven for cyber criminals, such as DDoS attackers. We present the challenges of the DDoS related research fields from various aspects, and discuss the possible research methods and strategies to serve th...
متن کاملDefense Mechanism for Denial of Service Attack to UMTS Networks Using Sim-Less Devices
One of the basic security element in cellular networks is the verification procedure functioned by means of subscriber identity module that is necessary to give access to network services and hence secure the network from unauthorized usage by implementing different types of parameters. The large amount of computing power available in modern clustered HLRs, it is also essential to consider the ...
متن کاملDetection Mechanism for Distributed Denial of Service (DDoS) Attack in Mobile Ad-hoc Networks
Mobile ad hoc networks are non-static networks which formed without any central point communication infrastructure. In addition to node mobility, a ad-hoc is defined by bounded resource constraints such as bandwidth, battery power, and storage space. In this network, the intermediate nodes play role of router which routed the packets to the terminal node. The security challenges in the networks...
متن کاملNetwork Intrusion Detection and Mitigation Against Denial of Service Attack
The growing use of Internet service in the past few years have facilitated an increase in the denial of service (DoS) attacks. Despite the best preventative measures, DoS attacks have been successfully carried out against high-prole organizations and enterprises, including those that took down Chase, BOA, PNC and other major US banks in September 2009, which reveal the vulnerability of even wel...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied sciences
سال: 2021
ISSN: ['2076-3417']
DOI: https://doi.org/10.3390/app11052385