Keywords

1 Introduction

One of the primary latent risks in a network is a cyber-attack on the network data interaction layer in the form of edge computing. This is due to the large amount of real-time state acquisition data, user privacy information and control command data present in an edge computing network. These data play a decisive role in user privacy protection and system decision control [3]. Alternatively, an edge computing network can perform real-time monitoring and control services on the edge of the critical infrastructure, with strict requirements on the performance of real-time data transmission [16, 17]. Considering data security interactions in an edge computing network, it is important to suppress attacks and execute evasive responses before a network attack causes damage [2, 3]. Therefore, edge computing networks urgently require active defense during data transmission.

However, the current network attack methods (CNAMs) such as the advanced persistent threat (APT) are concealed, and the attack principle is complex. Attack monitoring and passive blocking technologies based on traditional misuse detection have been unable to cope with such attacks. For this reason, active defense faces challenges. Fortunately, the self-organizing nature of edge computing networks provides a foundation for active defense of data interaction [23, 24]. However, previous technologies do not consider a moving adjustment in the case of reduced network connectivity and link quality caused by an attack [4]. Thus, the defense strategy of a moving adjustment algorithm requires further optimization and improvement.

Therefore, this paper proposes an active defense model for data interaction processes in edge computing based on a network topology mimetic correlation, achieved by pseudo-randomly constructing a moving communication path alliance under the premise of ensuring service quality. Then, this method integrates the network security state and transmission reliability prediction to adaptively mimic change and actively evade network attacks. The model includes an edge-aware node, an edge computing terminal node, and a primary station system and uses a negotiated moving multipath communication alliance to secure data communication. Figure 1 shows the framework of our research.

Fig. 1.
figure 1

Framework of active attack defense technology for edge computing network data interactions

The rest of this paper is organized as follows: Sect. 2 discusses relevant studies on moving network technology in mimicry defense. Section 3 gives the overall model framework and design for network topology mimetic association protocols. In Sect. 4, it describes a mimetic transformation method of communication path and a mimetic transformation method utilizing a mimetic topology correlation graph. In Sect. 5, the security of the model and verify the performance through experiments is analyzed. Section 6 summarizes the contents of this paper.

2 Related Works

In recent years, the moving target defense (MTD) proposed by the US Science and Technology Commission has attracted much attention as a new cybersecurity mimicry defense technology [1]. Moving network technology, as one of the most critical technologies for MTD at the network layer, has a promising application prospect in active defense.

A suitable communication path transformation strategy is crucial for implementation in moving networks. The communication path transformation strategy is used to generate a network management configuration of nodes that are used during the subsequent adjustment period. The randomness of the configuration increases the difficulty for the attacker in predicting the network management configuration. Recently, the pseudorandom approach has been extended to address the transformation strategy of moving networks. Atighetchi et al. [6] proposed a virtual port address association scheme for the client association proxy and a network address translation gateway to fill fake random addresses and ports into the corresponding fields of the data packet. Then, the data stream is redirected to defend against the attack. Once an “expired” node network management configuration is used, the possibility of detection will increase. Antonatos et al. [7] established a method for randomizing the network address space based on a transparent address association, which performs a header address translation of data stream packets. This approach maintains the novelty of the address translation table and prevents connection requests outside the service period. Badishi et al. [8] developed a random port association mechanism termed random port hopping (RPH). In this paper, the author designed a robust communication protocol to spread the impact of attackers. This protocol calculates the next association based on the number of successfully transmitted data packets and a shared private key. The port information is synchronized by sending an Acknowledgement (ACK) confirmation message. In 2012, Jafarian et al. proposed an OpenFlow random host mutation (35) [10] based on OpenFlow. The authors used OpenFlow to transparently change the IP address of the host to ensure the consistency of the host configuration. Aimed at the problems of limited hopping space in IPv4 and fixed hopping period, Dunlop et al.  [18, 19] proposed moving target defense mechanism based IPv6 (MT6D). In order to enlarge the hopping space, IPv6 address space is adopted. Besides, MT6D uses pseudo-random number to set hopping period so as to improve the randomness. In 2014, Jafarian et al. [9] associated a host IP address with an address block with a short lifetime. The authors proposed a random association method based on the time and space domains to block, spoof and detect attackers. In 2015, MacFarland et al.  [20] hide the link, IP, and port numbers of endpoint by setting up DNS hopping controller so as to prevent the leakage of MAC address. In 2016, Skowyra et al.  [21] proposed network identity elimination mechanism called PHARE. It prevents MAC address leakage by randomly transforming header when packets flow out of the endpoint. Moreover, Sun et al.  [22] proposed Decoy-Enhanced Seamless IP Randomization (DESIR) to increase the unpredictability. When unauthenticated nodes access the platform, DESIR uses honeypots to observe its behavior. When the user is judged as the attacker, DESIR prevents attack by changing endpoint information of node providing service and increasing the number of honeypots deployed. In order to prevent service interruption, DESIR separates the network identifier and transmission identifier of endpoint when it migrates services, thus ensuring the continuity of service provision by reserving the transmission identifier. Pseudorandom functions are exposed to higher security; however, it is possible that the node network management configuration will collide, in which case, scalability is not desirable.

In general, the implementation of the current moving network technology is simple, but there are several shortcomings: (1) The moving network adjustment strategy needs to compress or amplify the state space of the available node network management configuration. However, current methods with a pseudorandom function have a single control factor, and the generated space of the node network management configuration is difficult to accurately control. Thus, the scalability of the algorithm is weak. (2) In the existing literature, moving network adjustment strategies primarily focus on static and fixed methods. These approaches cannot be adaptively adjusted in combination with the current network security status.

Therefore, this paper proposed a moving network active defense technology based on network topology mimicry correlation, with the consideration of high security and real-time requirements of data interaction in an edge computing network.

3 Secure Transmission Model Based on Network Topology Mimic Association

3.1 Framework

The proposed model deploys the network topology mimicking association agent in the primary station system and the sensor node. The structure of the model is shown in Fig. 2.

Fig. 2.
figure 2

Model of active defense for edge computing network data interaction

  • The network topology mimicking association agent module is essential. This module controls other modules and available associated communication nodes, coordinating the communication path between the sensor node and the primary station service node server. This module generates a moving communication path alliance, and after the sensor node and the primary station server node negotiate the network topology mimetic map, the time synchronization module is used to calibrate the local clock and to enter the network topology mimetic association communication mode.

  • The traffic distribution module allocates traffic according to the established communication path. The data legally sent by sensor nodes are transmitted to the proxy control module through the currently active communication path. Then, the data are sent to the primary station service node by the traffic reorganization module. The server is also returned to the client by passing the traffic distribution module and the active path node.

  • The delay processing and anomaly detection modules sample the network data stream to evaluate network anomalies and delays. The associated agent control module dynamically changes the mimetic mapping configuration of the network topology and the moving communication path alliance according to the evaluation results by using a self-tuning strategy.

  • The intrusion detection module detects intrusion based on the redundancy voting mechanism of the mimicry defense model for the edge computing terminal. By comparing the execution results of the heterogeneous redundant execution body, result deviations and network intrusion behavior can be identified.

The moving communication path alliance and the network topology mimetic association graph in the network topology mimetic association model change by using an adaptive strategy. This action increases the diversity and randomness of transmission throughout the entire edge computing network and increases the defense strength. In addition, only the available edge computing terminal nodes in the active period can be activated at any time. Each available edge computing terminal node is allocated a node association configuration for the communication path, which will further reduce the possibility that the system communication process will suffer from a network attack.

3.2 Process of Network Topology Mimetic Secure Transmission

This section designs the network topology mimetic association protocol flow. In this step, the server and the client determine the network topology weighted directed graph by negotiation and generate the corresponding network topology mimetic association graph. Then, the client pseudo-randomly selects the communication path alliance. The communication parties are allowed to establish independent transport layer connections on multiple dynamic communication paths. In this manner, they can communicate safely according to the established communication path. This process is shown in Fig. 3.

Fig. 3.
figure 3

Network topology mimetic association protocol

  1. Step 1:

    When a sensor node supporting the network topology mimicking association accesses the edge access network for the first time and prepares to communicate with the primary station system, direct access will be denied. Because the edge computing terminal node does not control the related network access for data transmission, the sensor node can access only quarantine authentication domain A for identity authentication and trust evaluation. However, once the node authentication and trust evaluation are successful, the edge computing terminal node will open the network access port of the primary station service node.

  2. Step 2:

    The sensor node sends the regular request message \( {\text{Req}}\{ ID_{c} ,Ip_{c} ,ReqID,p_{lower} ,mark,T_{1} \} \) to the primary station node. \( ID_{c} \) is the identity of the sensor node, \( Ip_{c} \) is the IP address of the sensor node, and \( ReqID \) is the corresponding unique ID of each \( {\text{Req}} \) message. \( p_{lower} \) is the minimum reliability requirement, mark is the support flag of the network topology mimetic association, and \( T_{1} \) is the time.

  3. Step 3:

    The primary station service node records the time \( T_{2} \) at which the message \( Req \) is received. If the server does not support the network topology mimetic association, the message can be ignored. If the association is supported, the primary station service node switches to the network topology mimetic association negotiation mode.

  4. Step 4:

    The primary station service node initiates a deep search algorithm to find an available path that satisfies \( p_{lower} \) between the sensor nodes. Then, a network topology weighted directed graph is generated. Let us use \( p_{i,j} \) to denote the path reliability between the connecting nodes i and j. \( p_{s,t}^{k} \) denotes the path reliability of the kth path between the primary station serving node s and the sensor node t at time t. In this case, \( p_{s,t}^{k} = \prod\limits_{{\left( {i,j} \right) \in k}} {p_{i,j} } \), and \( p_{s,t}^{k} \) should be greater than \( p_{lower} \).

  5. Step 5:

    The primary station service node generates a corresponding network topology mimetic association graph \( S_{i} = \{ s_{k} |1 \le k \le m\} \) based on the network topology weighted directed graph. Next, a response message \( {\text{Rsp}}\{ ID_{s} ,S_{i} ,T_{3} \} \) is sent to the sensor node, including the server identity \( ID_{s} \), the network topology mimicking association graph \( S_{i} \), and the response packet sending timestamp \( T_{3} \).

  6. Step 6:

    The sensor node records the time \( T_{4} \) at which the message \( {\text{Rsp}}\{ ID_{s} ,S_{i} ,T_{3} \} \) is received. At the same time, the sensor node generates \( \Phi _{i1} ,\Phi _{i2} ,\Phi _{GS} \) by a random function to determine the network topology mimicking dynamic communication path alliance \( GS_{i} (t) \) and the communication path node association network configuration space \( \Omega _{i} (t) \).

  7. Step 7:

    The sensor node sends a response message \( {\text{Rsp}}\left\{ {ID_{\text{c}} ,\Phi _{i1} ,\Phi _{i2} ,\Phi _{GS} ,T_{5} } \right\} \) to the primary station serving node.

  8. Step 8:

    The primary station serving node receives the packet \( {\text{Rsp}}\{ ID_{\text{c}} ,\Phi _{i1} ,\Phi _{i2} ,\Phi _{GS} ,T_{5} \} \) and records the time at which the packet is received as \( T_{6} \). Then, a corresponding ACL is sent to notify all edge computing terminal nodes on the communication path with \( Ip_{c} \) and \( \Omega _{i} (t) \) together.

  9. Step 9:

    The primary station service node calculates the time drift \( \theta = \left( {T_{2} - T_{1} + T_{3} - T_{4} + T_{6} - T_{5} } \right)/2 \) according to the timestamps \( T_{1} \) , \( T_{2} \) , \( T_{3} \) , \( T_{4} \) , \( T_{5} \) , \( T_{6} \) and sends \( \theta \) to the sensor node.

  10. Step 10:

    The primary station service node adjusts the local time according to the time drift \( \theta \) by synchronization correction. The sensor node and primary station node implement secure communication according to the established dynamic communication path alliance.

  11. Step 11:

    When any life cycle of the network topology mimicry, \( T_{S}^{i} \) or \( T_{GS}^{i} \), ends normally or abnormally at the end of the network attack, the network topology mimetic association is re-updated.

4 Mimetic Transformation Method

4.1 Communication Path Alliance Mimetic Transformation Method

Cyber-attacks necessitate a process of scanning, lifting, destroying, and so on. Before some of the preliminary steps are completed, the attack does not pose a real threat to the entire system, but it does cause network anomalies to a certain degree [14, 15]. Therefore, in this section, the communication path is adjusted based on a network anomaly metric. When the network anomaly metric exceeds a certain threshold, the moving communication path will be adjusted automatically.

The dynamic adjustment of the life cycle of the moving communication path alliance must meet the principle of “increase slowly and decrease rapidly”. That is, when no network abnormality is detected and the probability a network attack is small, the survival time of the moving communication path alliance of the next association cycle slowly increases. Moreover, as the duration of the non-attack state increases, the growth rate of the current moving communication path alliance should also increase to improve the quality of the communication service. When a network abnormality is detected and the probability of a network attack is substantial, the survival time slot of the active communication path alliance in the next period is rapidly reduced. As the abnormal state duration increases, the reduction range of the survival time slot of the active communication path alliance in the next cycle should also increase to ensure communication security [25, 26].

Here, let us assume that \( \sigma_{t,f}^{'} \) is the standard deviation at time t and \( \delta^{'} \) is the threshold for a network outlier. Based on expert experience, this method chooses a function that meets the principle of “increase slowly and decrease rapidly”, i.e.,

$$ g(\sigma_{t,f}^{'} ) = \left\{ {\begin{array}{*{20}l} {g_{1} (\sigma_{t,f}^{{\prime }} ){\kern 1pt} {\kern 1pt} ,} \hfill & {0 < \sigma_{t,f}^{{\prime }} \le \delta^{{\prime }} } \hfill \\ {g_{2} (\sigma_{t,f}^{{\prime }} ),{\kern 1pt} } \hfill & {\quad \sigma_{t,f}^{{\prime }} > \delta^{{\prime }} } \hfill \\ \end{array} } \right. $$
(1)

with \( g_{1} \left( {\delta^{{\prime }} } \right) = g_{2} \left( {\delta^{{\prime }} } \right) \), \( g_{1}^{{\prime }} \left( {\sigma_{t,f}^{{\prime }} } \right) < 0 \), \( g_{2}^{{\prime }} \left( {\sigma_{t,f}^{{\prime }} } \right) > 0 \), \( g_{1}^{{\prime }} \left( {2\delta^{{\prime }} - \sigma_{t,f}^{{\prime }} } \right) + g_{2}^{{\prime }} \left( {\sigma_{t,f}^{{\prime }} } \right) > 0 \). The active adjustment strategy is

$$ T_{GS}^{i + 1} = \left\{ {\begin{array}{*{20}l} {(1 + g_{1} (\sigma_{t,f}^{{\prime }} )) * T_{GS}^{i} ,} \hfill & {0 < \sigma_{t,f}^{{\prime }} \le \delta^{{\prime }} } \hfill \\ {(1 - g_{2} (\sigma_{t,f}^{{\prime }} )) * T_{GS}^{i} ,} \hfill & {\quad \sigma_{t,f}^{{\prime }} > \delta^{{\prime }} } \hfill \\ \end{array} } \right. $$
(2)

4.2 Transformation Method for the Network Topology Mimetic Association Graph

When there is a given sequence of observed symbols, the hidden Markov model is suitable to predict the probability of occurrence of a new observed symbol sequence. The hidden Markov model is a stochastic process of the relationship between the observable variable O and the hidden variable S. It is very similar to the abnormal metric (hidden state) and the security state (observable state) of the security situation system [27, 28]. Therefore, using the hidden Markov model can well analyze the network security situation.

Here, this section proposes a hidden Markov based reliability prediction model of network security to realize a network security reliability prediction based on network security anomaly metric data. Based on the security reliability prediction results, the proposed method expands or compresses the network topology mimetic association graph and set a reasonable survival time slot \( T_{S}^{i} \) for the network topology mimetic association graph.

Network Security State Prediction Based on the HMM

The HMM can be described by a quintuple \( \lambda = \left( {N,M,\pi ,A,B} \right) \). In this quintuple, N indicates the number of possible hidden state values in the HMM, which can be recorded as \( IS = \left\{ {IS_{i} \left| {1 \le i \le N} \right.} \right\} \). Each hidden state value \( IS_{i} \) corresponds to M observable states O, which is recorded as \( O = \left\{ {O_{i} \left| {1 \le i \le M} \right.} \right\} \). Here, \( \pi \) is a 1 × N-order initial probability distribution matrix, indicating the initial probability distribution of the hidden state \( q_{1} \) for each possible hidden state value for the observable sequence O at time t = 1, \( \pi_{i} = P(q_{1} = IS_{i} ),1 \le i \le N \)

\( A = (a_{ij} )_{N \times N} \) is a hidden state probability transfer matrix for Markov chains. For a first-order HMM,

$$ a_{ij} = P(q_{t + 1} = IS_{j} |q_{t} = IS_{i} ),\sum\limits_{j = 1}^{N} {a_{ij} = 1} ,1 \le i \le N,1 \le j \le N $$
(3)

\( B = (b_{im} )_{N \times M} \) is a probability matrix of the observed indicators, and the observed probability is \( b_{im} = P\left( {O_{t} = v_{m} \left| {q_{t} = IS_{i} } \right.} \right),1 \le i \le N,1 \le m \le M \).

To predict the security reliability of all accessible paths in the network topology mimetic map, the network security reliability hidden state levels are classified into five categories: safe, mild, general, moderate, and high-risk, expressed as \( IS_{1} ,IS_{2} ,IS_{3} ,IS_{4} ,IS_{5} \) and assigned to 1, 2, 3, 4, and 5, respectively. Then, the reliability of each accessible path is transferred at a given probability in these five states. At the same time, the network security reliability of each path is defined by two observable indicators, the network transmission efficiency TE and network threat TH. The reliability is expressed as a random variable \( x_{i} (1 \le i \le 2) \). The current security reliability of the entire network is measured from two different dimensions. Then, after time t, the observation sequence \( O = \{ \text{o}_{1} ,\text{o}_{2} , \cdots ,\text{o}_{\text{t}} \} \) is obtained from observation \( x_{i} \).

Mimetic Transformation Strategy for the Network Topology Mimetic Association Graph

In the network topology mimetic correlation graph, it is assumed that there are n available nonintersecting paths at time \( t \) being assessed as medium-risk or high-risk paths at time \( \left( {t + 1} \right) \) in forming the network topology mimetic map \( S_{n}^{ - } (t{ + }1) \). At the same time, there are m non-usable and nonintersecting paths at time \( t \) being assessed as safe, mild or general risk at time \( \left( {t + 1} \right) \) for the network topology mimetic association graph \( S_{m}^{ + } (t{ + }1) \). Thus, the next network topology mimic map is \( S_{i} (t + 1)\,{ = }\,S_{i} (t) - S_{n}^{ - } (t{ + }1) + S_{m}^{ + } (t{ + }1) \).

At time \( \left( {t + 1} \right) \), the new path \( S_{m}^{ + } (t{ + }1) \) will be added; if this path is selected as the communication path, only the primary station serving node needs to notify the edge computing terminal node on the path with the relevant ACL and other information, according to the network topology mimetic association negotiation algorithm. However, for the communication path \( S_{n}^{ - } (t{ + }1) \) at time \( t \), the primary station service node needs to notify the relevant parties to revoke the ACL and other information.

After the network topology mimetic map is adjusted at the completion time \( \left( {t + 1} \right) \), there will be a new map \( S_{i} (t + 1) = \{ s_{k} (t + 1)|1 \le k \le m\} \). Then, the overall reliability prediction value corresponding to \( S_{i} (t + 1) \) can be obtained as \( SA_{{S_{i} (t + 1)}} = \sum\limits_{i = 1}^{m} {Sp_{t + 1}^{i} } \). The function is then updated, satisfying the principle of “increase slowly and decrease rapidly”.

$$ h(SA_{{S_{i} (t + 1)}} ) = \left\{ {\begin{array}{*{20}c} {{\kern 1pt} h_{1} (SA_{{S_{i} (t + 1)}} ),{\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} SA_{{S_{i} (t + 1)}} = 1{\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} } \\ {h_{2} (SA_{{S_{i} (t + 1)}} ),{\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} SA_{{S_{i} (t + 1)}} \in (2,3){\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} } \\ \end{array} } \right. $$
(4)

The self-adjusting strategy is as follows:

$$ T_{S}^{i + 1} = \left\{ {\begin{array}{*{20}c} {(1 + h_{1} (SA_{{S_{i} (t + 1)}} )) * T_{S}^{i} ,{\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} SA_{{S_{i} (t + 1)}} = 1{\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} } \\ {(1 - h_{2} (SA_{{S_{i} (t + 1)}} )) * T_{S}^{i} ,{\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} SA_{{S_{i} (t + 1)}} \in (2,3){\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} } \\ \end{array} } \right. $$
(5)

5 Experiments

The experiment performs a system simulation of the network topology mimetic association algorithm based on the NS2 network simulation environment. This model uses C++ to write the synchronization module, association module, communication module, attack module, delay processing module, sampling module, anomaly detection module, and deception processing module, and implements the network topology simulation by writing an OTcl script. The number of available IPv4 addresses in the network is 28, and the number of available ports is 1000. The initial correlation period is 120 s. We suppose that \( g_{1} \left( x \right) = - ln\left( {20x + 0.5} \right) \), \( g_{2} \left( x \right) = 16x^{2} - 0.8x + 0.01 \), \( h_{1} \left( z \right) = - ln\left( {20x + 0.6} \right) \), \( h_{2} \left( z \right) = 16z^{2} - 0.64z + 0.064 \). To mention that the simulation experiments are conducted in different scenarios with the same resources. The simulation results are shown in Figs. 6 and 7.

5.1 Security Analysis

Security is an important indicator for evaluating the advantages and disadvantages of a defense method. This section analyzes the anti-attack capability of the proposed active defense technology for an edge defense network attack based on network topology mimetic correlation. The active defense principle for edge computing network attacks based on the network topology mimetic association algorithm is shown in Figs. 4 and 5.

Fig. 4.
figure 4

Defense before network topology mimetic correlation

Fig. 5.
figure 5

Defense after network topology mimetic correlation

  • DDos attacks

After the network topology mimetic association defense strategy is implemented, the IP address and port of the communication host and the protocol used by the communication parties will be associated after each corresponding time slot. For an attacker who performs a DoS attack, it is necessary to continuously send a large number of service requests to the target host and consume the target host resources. However, the node network configuration of the target host is continuously associated; thus, a DoS attack cannot be initiated [29].

  • Anti-semi-blind attacks

A blind attack occurs when an attacker cannot locate the current active node network configuration and attacks all available nodes of the node network configuration state space that are detected. The attack strength is evenly distributed across all available nodes. The network topology mimetic association algorithm further increases the difficulty for an attacker to detect and locate the current active node network configuration of the associated system, and thus, the ability to resist and anti-semi-blind attacks is improved [30].

5.2 Experiment Against DDoS Attacks

In this section, the SYN-Flood mode is used to guide a DoS attack. Experiments test the average service response time of the network topology mimetic association system under different SYN-Flood attack rates to reflect the service availability performance. Figure 6 shows results for the non-topology-association algorithm (No NTAA), the simple topology association algorithm (Simple NTAA), the end-hopping-based topology association algorithm (EH NTAA) proposed in [12, 13], and the network topology mimetic association (PA NTAA) proposed in this paper. The results show that the network topology mimetic association strategy proposed in this paper can better resist DoS attacks. This result occurs because the mimetic correlation technology of the network topology dynamically measures network anomalies according to the strength of cyber attacks. Then, the network topology mimetic maps and communication paths are automatically adjusted. Adjustments increase the difficulty of hitting a path for DDoS attacks. However, the difference between the results for the association strategy in EH NTAA and PA NTAA is not significant. Moreover, when the mimetic map space of the network topology is compressed to almost zero, the DDoS attack enters an unsupervised blind attack state, that is, an average attack on all nodes in the accessible path detected by the attacker.

Fig. 6.
figure 6

Results for DDoS attack defense test

5.3 Experiment Against a Semi-blind Attack

Here, it uses a perceptual node edge access system with 20 communication paths for experiments. It can be seen from Fig. 7 that when the edge of the access node is connected to the network, the network transmission delay increases rapidly as the proportion of the received attack path reaches 50%. When the proportion exceeds 60%, the network transmission delay tends to infinity. The average response time of the EH topology association strategy is better than that of the No NTAA but is not as good as that of the Simple NTAA, which is consistent with the analysis presented in [12]. The average response time of the PA NTAA is better than that of the Simple NTAA.

Fig. 7.
figure 7

Results for semi-blind attack defense

6 Conclusion

Based on a thorough study of the mobile self-organizing characteristics of edge computing networks, this paper combines a moving network transmission with path mimicry adjustment techniques to propose a strict, formal description and definition. An active defense framework for data transmission in an edge computing network based on a link layer and application layer network topology mimetic correlation is designed to ensure scalability of the algorithm. To solve the problem of attacks and to improve defense and transmission quality with a moving periodic adjustment of the network, this research proposes a moving communication path alliance and a mimetic map dislocation transformation method for network topology. Starting from the temporal and spatial dimensions, the model combines moving threshold network anomaly detection and reliability prediction of network security based on the HMM. In this way, the experiment can perform a reasonable transformation of the network, minimize the mimetic adjustment overhead and resolve active defense problems in a DDoS attack and semi-blind attack. Experimental results show that the transmission efficiency of the network topology mimetic association algorithm proposed in this paper is higher than that of other popular methods and the reliability and anti-attack performance are significantly improved.