A Survey on DDoS Attacks in Edge Servers
Abstract
In modern times, the need for latency sensitive applications is growing rapidly. Cloud computing
infrastructure is unable to provide support to such delay sensitive applications. Therefore, a new
paradigm called edge computing has emerged. In edge computing various paradigms like Fog,
Cloudlet, Mobile Edge Computing, etc. provide real-time, location aware services to users. As a
result number of requests are generated for processing in the edge servers. If these edge servers
for some reason become unavailable for providing service, users will not be able to perform their
delay sensitive or location aware operations. Like other servers in the network, edge servers can
also become vulnerable to various security attacks. Among other security attacks, Distributed Denial
of Service (DDoS) attack can be very threatening for edge servers. Capacity of edge servers
compared to traditional servers is limited. Therefore, the effort needed to overwhelm the edge
server will be smaller, on the other hand, the impact of DDoS attacks on edge servers will be
dreadful. Importance of a proper functioning of edge servers is immense for providing uninterrupted
support to the users. Therefore, some kind of recovery methods is needed to recover an
overloaded edge server. Present state-of-art mentions some such recovery methods for the edge
servers so that they can provide continuous services.