Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing

Published: 01 February 2018 Publication History

Abstract

The increase in the number and diversity of smart objects has raised substantial cybersecurity challenges due to the recent exponential rise in the occurrence and sophistication of attacks. Although cloud computing has transformed the world of business in a dramatic way, its centralization hammers the application of distributed services such as security mechanisms for IoT applications. The new and emerging IoT applications require novel cybersecurity controls, models, and decisions distributed at the edge of the network. Despite the success of the existing cryptographic solutions in the traditional Internet, factors such as system development flaws, increased attack surfaces, and hacking skills have proven the inevitability of detection mechanisms. The traditional approaches such as classical machine-learning-based attack detection mechanisms have been successful in the last decades, but it has already been proven that they have low accuracy and less scalability for cyber-attack detection in massively distributed nodes such as IoT. The proliferation of deep learning and hardware technology advancement could pave a way to detecting the current level of sophistication of cyber-attacks in edge networks. The application of deep networks has already been successful in big data areas, and this indicates that fog-tothings computing can be the ultimate beneficiary of the approach for attack detection because a massive amount of data produced by IoT devices enable deep models to learn better than shallow algorithms. In this article, we propose a novel distributed deep learning scheme of cyber-attack detection in fog-to-things computing. Our experiments show that deep models are superior to shallow models in detection accuracy, false alarm rate, and scalability.

Cited By

View all
  • (2024)An adversarial environment reinforcement learning-driven intrusion detection algorithm for Internet of ThingsEURASIP Journal on Wireless Communications and Networking10.1186/s13638-024-02348-62024:1Online publication date: 4-May-2024
  • (2024)A Novel Split Learning-Based Consumer Electronics Network Traffic Anomaly Detection Framework for Smart City EnvironmentIEEE Transactions on Consumer Electronics10.1109/TCE.2024.336733070:1(4197-4204)Online publication date: 19-Feb-2024
  • (2024)Modified genetic algorithm and fine-tuned long short-term memory network for intrusion detection in the internet of things networks with edge capabilitiesApplied Soft Computing10.1016/j.asoc.2024.111434155:COnline publication date: 1-Apr-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE Communications Magazine
IEEE Communications Magazine  Volume 56, Issue 2
February 2018
211 pages

Publisher

IEEE Press

Publication History

Published: 01 February 2018

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2024)An adversarial environment reinforcement learning-driven intrusion detection algorithm for Internet of ThingsEURASIP Journal on Wireless Communications and Networking10.1186/s13638-024-02348-62024:1Online publication date: 4-May-2024
  • (2024)A Novel Split Learning-Based Consumer Electronics Network Traffic Anomaly Detection Framework for Smart City EnvironmentIEEE Transactions on Consumer Electronics10.1109/TCE.2024.336733070:1(4197-4204)Online publication date: 19-Feb-2024
  • (2024)Modified genetic algorithm and fine-tuned long short-term memory network for intrusion detection in the internet of things networks with edge capabilitiesApplied Soft Computing10.1016/j.asoc.2024.111434155:COnline publication date: 1-Apr-2024
  • (2023)RETRACTED ARTICLE: Enhancing throughput using channel access priorities in frequency hopping network using federated learningEURASIP Journal on Wireless Communications and Networking10.1186/s13638-023-02313-92023:1Online publication date: 5-Oct-2023
  • (2023)Optimization Enabled Deep Learning-Based DDoS Attack Detection in Cloud ComputingInternational Journal of Intelligent Systems10.1155/2023/20392172023Online publication date: 1-Jan-2023
  • (2023)Edge Computing with Artificial Intelligence: A Machine Learning PerspectiveACM Computing Surveys10.1145/355580255:9(1-35)Online publication date: 16-Jan-2023
  • (2023)Unsupervised GAN-Based Intrusion Detection System Using Temporal Convolutional Networks and Self-AttentionIEEE Transactions on Network and Service Management10.1109/TNSM.2023.326003920:4(4951-4963)Online publication date: 1-Dec-2023
  • (2023)Secure and Efficient Coded Multi-Access Edge Computing With Generalized Graph Neural NetworksIEEE Transactions on Mobile Computing10.1109/TMC.2022.317211722:9(5504-5524)Online publication date: 1-Sep-2023
  • (2023)AI-powered intrusion detection in large-scale traffic networks based on flow sensing strategy and parallel deep analysisJournal of Network and Computer Applications10.1016/j.jnca.2023.103735220:COnline publication date: 1-Nov-2023
  • (2023)Model compression and privacy preserving framework for federated learningFuture Generation Computer Systems10.1016/j.future.2022.10.026140:C(376-389)Online publication date: 1-Mar-2023
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media