This paper proposes an abnormal behavior detection technology of power 5G terminal based on the characteristics of business interaction mode. First, the abnormal behavior detection framework of power 5G terminal is designed. Secondly, considering various security factors of the basic operating environment, a 5G security monitoring indicator system is established around the terminal side security indicators, network side security indicators and API side security indicators. Then, study the automatic learning and construction technology of normal behavior benchmark model, establish a normal benchmark model based on multiple RBM neural networks, study the normal behavior baseline of 5G terminal operation behavior benchmark, the same type of equipment benchmark, specific communication line benchmark and other normal behavior baselines, and build the security baseline indicators of the normal behavior model of 5G terminal. On this basis, abnormal behavior detection technology based on normal benchmark model is studied.
Serverless computing aims to handle all the system administration operations needed in cloud computing, thus, to provide a paradigm that greatly simplifies cloud programming. However, the security in serverless computing is regarded as an independent technology. The lack of security consideration in the initial design makes it difficult to handle the increasingly complicated attack scenario in serverless computing, especially for the vulnerabilities and backdoor based network attack. In this paper, we propose MDSC, a mimic defense enabled paradigm for serverless computing. Specifically, MDSC paradigm introduces Dynamic Heterogeneous Redundancy (DHR) structural model to serverless computing, and make fully use of features introduced by serverless computing to achieve an intrinsic security system with acceptable costs. We show the feasibility of MDSC paradigm by implementing a trial of MDSC paradigm based on Kubernetes and Knative. Analysis and experimental results show that MDSC paradigm can achieve high level security with acceptable cost.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.