Edge computing and AIoT based network intrusion detection mechanism

被引:1
|
作者
Sui, Qingru [1 ]
Liu, Xiaoyan [1 ]
机构
[1] Changchun Sci Tech Univ, Changchun 130600, Peoples R China
关键词
AIoT; edge computing; intrusion detection; machine learning;
D O I
10.1002/itl2.324
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Edge computing technology solves the shortcomings of high latency, mobility and location awareness in remote cloud computing, but it also brings many security challenges to the AIoT. In view of the open and heterogeneous characteristics of edge network, a more secure edge computing intrusion detection method is studied in this paper. The main idea is to combine edge computing with AIoT to realize edge smart interconnection. This method optimizes the weight value in machine learning by increasing the screening and mitigation of cloud server training samples, so as to provide efficient and accurate edge intrusion detection behavior. The experimental results show that the proposed method can more effectively improve the detection accuracy and reduce the detection time.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] Network Intrusion Detection using Diversity-based Centroid Mechanism
    Gondal, Muhammad Shafique
    Malik, Arif Jamal
    Khan, Farrukh Aslam
    2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, : 224 - 228
  • [42] Network Intrusion Detection based on Dense Dilated Convolutions and Attention Mechanism
    Cao, Ke
    Zhu, Jinqi
    Feng, Weijia
    Ma, Chunmei
    Liu, Ming
    Du, Tian
    IWCMC 2021: 2021 17TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2021, : 463 - 468
  • [43] New Continual Federated Learning System for Intrusion Detection in SDN-Based Edge Computing
    Chetouane, Ameni
    Karoui, Kamel
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2025, 37 (02):
  • [44] Packet-Based Intrusion Detection Using Bayesian Topic Models in Mobile Edge Computing
    Cao, Xuefei
    Fu, Yulong
    Chen, Bo
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [45] Optimized Machine Learning-Based Intrusion Detection System for Fog and Edge Computing Environment
    Alzubi, Omar A.
    Alzubi, Jafar A.
    Alazab, Moutaz
    Alrabea, Adnan
    Awajan, Albara
    Qiqieh, Issa
    ELECTRONICS, 2022, 11 (19)
  • [46] Intelligent Intrusion Detection based on Soft Computing
    Yan, Chen
    2015 SEVENTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2015), 2015, : 577 - 580
  • [47] Blockchain and Federated Learning for Collaborative Intrusion Detection in Vehicular Edge Computing
    Liu, Hong
    Zhang, Shuaipeng
    Zhang, Pengfei
    Zhou, Xinqiang
    Shao, Xuebin
    Pu, Geguang
    Zhang, Yan
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (06) : 6073 - 6084
  • [48] Optimization scheme for intrusion detection scheme GBDT in edge computing center
    Cui, Ju-fu
    Xia, Hui
    Zhang, Rui
    Hu, Ben-xu
    Cheng, Xiang-guo
    COMPUTER COMMUNICATIONS, 2021, 168 : 136 - 145
  • [49] Intrusion detection for network based cloud computing by custom RC-NN and optimization
    Thilagam, T.
    Aruna, R.
    ICT EXPRESS, 2021, 7 (04): : 512 - 520
  • [50] Granular computing based intrusion detection model upon network monitor data streams
    Zhu, Xiaodong
    Huang, Zhiqiu
    Zhang, Junhua
    Yang, Shuqun
    2007 2ND INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2007, : 431 - 435