Show simple item record

dc.contributor.advisor Mthulisi, V.
dc.contributor.advisor Mapunya, S. S.
dc.contributor.author Chaki, Emmanuel Sibusiso
dc.date.accessioned 2024-09-10T13:27:06Z
dc.date.available 2024-09-10T13:27:06Z
dc.date.issued 2023
dc.identifier.uri http://hdl.handle.net/10386/4590
dc.description Thesis (M.Sc. (Computer Science)) -- University of Limpopo, 2023 en_US
dc.description.abstract 5G technology constitutes a considerable part of solving the problem of security in mobile communications. Multi-Access Edge Computing or mobile edge computing (MEC) extends the capabilities of cloud computing by locating them near the edge of the network. By outsourcing cloud processing to specific local servers, MEC decreases latency in 5G, thereby improving the end-user experience. This study explores a security vulnerability present in 5G MEC. Specifically, we examined distributed denial of service (DDoS) attacks occurring at both the network and the application layer. The vulnerability of MEC to DDoS attacks poses significant challenges that are addressed in this research. We evaluated different Machine Learning (ML) algorithms and subsequently implemented hybrid models (Stacking/Blending, and Random Forests (RF) model) which are classified under supervised ML. The purpose of this study is to identify the most effective techniques for mitigating DDoS attacks in MEC systems. ML techniques such as Random Forest (RF), Decision tree (DT), Naïve Bayes (NB), K Nearest Neighbour (K-NN), Logistics regression (LR), Blending/Stack Model are evaluated on the basis of a variety of performance metrics (including accuracy, detection/recall, precision, F1-Measure, Matthews correlation coefficient (MCC), Receiver operating characteristic (ROC), and Area Under Receiver operating characteristic (AUROC)) for each of the algorithms. Probability density function (PDF) and hypotheses testing are statistical techniques deployed to support the findings of our study. Based on the literature in the field, ML techniques are recommended to reach our solution. The best ML algorithms yielding the best performance in mitigating the DDoS attacks are optimized to enhance their performance ability. This study outlines the overview of MEC environment’s existing mitigation scheme, and the implemented mitigation schemes towards DDoS attacks. According to our evaluated findings, Hybrid models outperformed ML models based on the computed scores of performance metrics. PDF and hypotheses testing successfully supported our findings by showing that hybrid models indeed outperformed ML models. Among the mitigation techniques, RF outperformed all supervised ML models by effectively mitigating DDoS attacks in MEC. en_US
dc.format.extent x, 85 leaves en_US
dc.language.iso en en_US
dc.relation.requires PDF en_US
dc.subject Mobile edge computing en_US
dc.subject Multi access edge computing en_US
dc.subject Hibrid model en_US
dc.subject Macine learning en_US
dc.subject.lcsh Cloud computing en_US
dc.subject.lcsh Boosting (Algorithms) en_US
dc.subject.lcsh Machine learning en_US
dc.subject.lcsh Denial of service attacks en_US
dc.subject.lcsh Computer networks -- Security measures en_US
dc.subject.lcsh Computer security en_US
dc.title Implementing learning-based (ML-based) hybrid model to mitigate distributed denial of service (DDoS) attacks in mobile edge computing (MEC) en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search ULSpace


Browse

My Account