A Novel Distributed Machine Learning Model to Detect Attacks on Edge Computing Network

Pub Date : 2023-01-01 DOI:10.12720/jait.14.1.153-159
Trong-Minh Hoang, Trang-Linh Le Thi, N. M. Quy
{"title":"A Novel Distributed Machine Learning Model to Detect Attacks on Edge Computing Network","authors":"Trong-Minh Hoang, Trang-Linh Le Thi, N. M. Quy","doi":"10.12720/jait.14.1.153-159","DOIUrl":null,"url":null,"abstract":"To meet the growing number and variety of IoT devices in 5G and 6G network environments, the development of edge computing technology is a powerful strategy for offloading processes in data servers by processing at the network and nearby the user. Besides its benefits, several challenges related to decentralized operations for improving performance or security tasks have been identified. A new research direction for distributed operating solutions has emerged from these issues, leading to applying Distributed Machine Learning (DML) techniques for edge computing. It takes advantage of the capacity of edge devices to handle increased data volumes, reduce connection bottlenecks, and enhance data privacy. The designs of DML architectures have to use optimized algorithms (e.g., high accuracy and rapid convergence) and effectively use hardware resources to overcome large-scale problems. However, the trade-off between accuracy and data set volume is always the biggest challenge for practical scenarios. Hence, this paper proposes a novel attack detection model based on the DML technique to detect attacks at network edge devices. A modified voting algorithm is applied to core logic operation between sever and workers in a partition learning fashion. The results of numerical simulations on the UNSW-NB15 dataset have proved that our proposed model is suitable for edge computing and gives better attack detection results than other state of the art solutions.","PeriodicalId":0,"journal":{"name":"","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12720/jait.14.1.153-159","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

To meet the growing number and variety of IoT devices in 5G and 6G network environments, the development of edge computing technology is a powerful strategy for offloading processes in data servers by processing at the network and nearby the user. Besides its benefits, several challenges related to decentralized operations for improving performance or security tasks have been identified. A new research direction for distributed operating solutions has emerged from these issues, leading to applying Distributed Machine Learning (DML) techniques for edge computing. It takes advantage of the capacity of edge devices to handle increased data volumes, reduce connection bottlenecks, and enhance data privacy. The designs of DML architectures have to use optimized algorithms (e.g., high accuracy and rapid convergence) and effectively use hardware resources to overcome large-scale problems. However, the trade-off between accuracy and data set volume is always the biggest challenge for practical scenarios. Hence, this paper proposes a novel attack detection model based on the DML technique to detect attacks at network edge devices. A modified voting algorithm is applied to core logic operation between sever and workers in a partition learning fashion. The results of numerical simulations on the UNSW-NB15 dataset have proved that our proposed model is suitable for edge computing and gives better attack detection results than other state of the art solutions.
分享
查看原文
边缘计算网络攻击检测的分布式机器学习模型
为了满足5G和6G网络环境中不断增长的物联网设备数量和种类,边缘计算技术的发展是一种强大的策略,可以通过在网络和用户附近进行处理来卸载数据服务器中的流程。除了它的好处之外,已经确定了与提高性能或安全任务的分散操作相关的几个挑战。从这些问题中出现了分布式操作解决方案的一个新的研究方向,即将分布式机器学习(DML)技术应用于边缘计算。它利用边缘设备的容量来处理增加的数据量,减少连接瓶颈,并增强数据隐私。DML架构的设计必须使用优化的算法(如高精度和快速收敛),并有效地利用硬件资源来克服大规模问题。然而,在实际场景中,准确性和数据集数量之间的权衡始终是最大的挑战。为此,本文提出了一种基于DML技术的攻击检测模型,用于检测网络边缘设备的攻击。将一种改进的投票算法以分区学习的方式应用于服务器和worker之间的核心逻辑操作。在UNSW-NB15数据集上的数值模拟结果证明了我们提出的模型适用于边缘计算,并且比其他最先进的解决方案提供了更好的攻击检测结果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信