ISSN : 2583-2646

Behavioral DDoS Prevention through Zero Trust Principles in Edge Computing

ESP Journal of Engineering & Technology Advancements
© 2024 by ESP JETA
Volume 4  Issue 4
Year of Publication : 2024
Authors : Hariprasad Sivaraman
:10.56472/25832646/JETA-V4I4P107

Citation:

Hariprasad Sivaraman, 2024. "Behavioral DDoS Prevention through Zero Trust Principles in Edge Computing", ESP Journal of Engineering & Technology Advancements 4(4): 56-60.

Abstract:

One of the main threats that networks have faced in medieval time is Distributed Denial of Service (DDoS) attacks especially, behavioral DDoS as it uses benign traffic patterns which makes the system crush under performance pressure. Traditional DDoS mitigation techniques frequently fall short in edge computing environments because they rely on a centralized control approach, which is not suitable for edge proximity to end users. This paper proposes a continuous behavioral DDoS mitigation framework by applying the Zero Trust (ZT) principles in edge computing. With identity-based policies, continuous monitoring, and low-trust verification protocols deployed at the network edge, this approach seeks to dynamically authenticate and validate requests based on behavioral patterns; minimizing the attack surface. This study proposes a theoretical model to avoid the misbehaving DDoS like normal traffic at endpoints and improve security in endpoints through secure communication over distributed nodes. A model is proposed here that combines behavior analysis based on machine learning to identify deviation from nominal behaviors, making it possible for real-time mitigation of Behavioral DDoS threats with in-edge ecosystems.

References:

[1] Rose, J., & Chen, A. (2021). Distributed Denial of Service in Edge Networks: An Emerging Threat. IEEE Communications Surveys & Tutorials, 23(2), 123-147.

[2] Kumar, P., Gupta, V., & Roy, S. (2023). Zero Trust Security Framework: Principles and Applications. Journal of Cybersecurity and Privacy, 9(1), 13-29.

[3] Li, T., & Zhang, M. (2020). Real-Time Anomaly Detection for Network Security Using Machine Learning. Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, 85-98.

[4] Almeida, R., Martinez, D., & Smith, K. (2022). Behavioral Analysis in Cybersecurity: Techniques and Challenges. International Journal of Computer Science and Network Security, 20(8), 40-58.

[5] White, A., & Brown, E. (2023). Edge Computing Security Challenges and Zero Trust Solutions. IEEE Transactions on Cloud Computing, 11(1), 110-123.

[6] Thompson, J., & Allen, L. (2022). Adaptive DDoS Mitigation in Edge Networks. Journal of Network and Computer Applications, 87, 78-91.

[7] National Institute of Standards and Technology (NIST). (2020). Zero Trust Architecture. NIST Special Publication 800-207.

[8] Sarker, I. H., & Colman, A. (2021). Machine Learning in Cybersecurity: A Comprehensive Review and Directions for Future Research. Journal of Network and Computer Applications, 160, 102656.

Keywords:

Behavioral DDoS, Zero Trust, Edge Computing, Security, Real-time Mitigation, Machine Learning.