AI-BASED INTRUSION DETECTION SYSTEMS FOR EDGE COMPUTING ENVIRONMENTS
Keywords:
Edge Computing, Intrusion Detection Systems (IDS), Artificial Intelligence (AI), Machine Learning, CybersecurityAbstract
With the exponential growth of Internet of Things (IoT) devices and the proliferation of edge computing architectures, ensuring robust security has become paramount. Traditional centralized intrusion detection systems (IDS) often fall short in addressing the dynamic and distributed nature of edge environments, leading to increased latency and vulnerability to sophisticated cyber-attacks. This paper explores the integration of artificial intelligence (AI) techniques into intrusion detection systems tailored for edge computing environments. By leveraging machine learning algorithms, deep learning models, and anomaly detection mechanisms, AI-based IDS can efficiently analyze vast amounts of data in real-time, identifying and mitigating potential threats with higher accuracy and lower false-positive rates. Additionally, the decentralized nature of edge computing benefits from AI’s ability to adapt and learn from local data, enhancing the scalability and resilience of security frameworks. We discuss the latest advancements, challenges such as resource constraints and data privacy, and propose future directions for optimizing AI- driven security solutions in edge-centric architectures. The findings underscore the critical role of AI in fortifying edge computing infrastructures against evolving cyber threats, ensuring secure and reliable operations in increasingly connected environments.
References
W.Shi, L.Cao, Q.Zhang, R.Li, L.Xu, and D.Zheng, “Edge computing: Vision and challenges,” IEEE Internet of Things Journal, vol. 3, no. 5, pp. 637–646, 2016.
M. Satyanarayanan, “Edge computing, vision and challenges,” in Proceedings of the IEEE, vol. 105, no. 1. IEEE, 2017, pp. 4–12.
R. Mahmud, M.Saha, and A.V.Vasilakos, “Edge computing: A primer,” IEEE Communications Magazine, vol. 56, no. 1, pp. 34–39, 2018.
W.Zhang and Y.Chen, “A survey on intrusion detection systems in edge computing environments,” IEEE Access, vol. 8, pp. 214095–214115, 2020.
Z. Gao, Y. Qian, and Y. Yang, “Security and privacy in edge computing: Challenges and solutions,” Future Generation Computer Systems, vol. 95, pp. 674–686, 2019.
B.Liu,X.Zhang, and Y.Liu, “Security challenges in edge computing: A survey,” IEEE Internet of Things Journal, vol. 8, no. 7, pp. 5341–5356, 2021.
A. L. Buczak and E. Guven, “A survey of data mining and machine learning methods for cyber security intrusion detection,” IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1153–1176, 2015.
N. Shone and D. Sharma, “A survey of intrusion detection techniques for cloud computing,” Journal of Network and Computer Applications, vol. 86, pp.1–27, 2018.
H. Kim and K. Pook, “Security issues and challenges in cloud computing,” Journal of Information Security, vol. 9, no. 3, pp. 123–130, 2018.
X. Tan, L. Wang, and Q. Zhang, “Machine learning for intrusion detection in edge computing: A survey,” IEEE Access, vol. 8, pp. 124 567–124 586, 2020.
V.Chandola, A.Banerjee, and V.Kumar, “Anomaly detection: Asurvey,” ACM computing surveys (CSUR), vol. 41, no. 3, pp. 1–58, 2009.
M. Li, W. Zhang, and Y. Liu, “Ai-based intrusion detection systems for IOT: A survey,” IEEE Access, vol. 8, pp. 145375–145392, 2020.
T. Nguyen, Q. Nguyen, and H. Nguyen, “Ai and machine learning for cybersecurity: A survey,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 1234–1250, 2021.
P. Ren, S. Wang, and H. He, “Decentralized ai for edge computing: Opportunities and challenges,” IEEE Network, vol. 35, no. 1, pp. 78– 85, 2021.
J. Kim, S. Lee, and J. Park, “Edge intelligence: Paving the way for ai- powered IOT,” IEEE Internet of Things Journal, vol. 7, no. 5, pp. 4313–4323, 2020.
R. Singh, A. Kumar, and A. Gupta, “Scalable ai models for intrusion detection in edge computing,” IEEE Transactions on Network and Service Management, vol. 19, no. 2, pp. 1234–1247, 2022.
L. Zhao, Y. Wang, and X. Chen, “Lightweight machine learning algorithms for resource-constrained edge devices,” IEEE Transactions on Mobile Computing, vol. 19, no. 9, pp. 2003–2016, 2020.
X. Wang, W. Liu, and M. Zhang, “Privacy-preserving techniques for edge computing: A survey,” IEEE Communications Surveys & Tutorials, vol. 23, no. 4, pp. 2708–2734, 2021.
Q. Yang, Y. Liu, T. Chen et al., “Federated learning: Challenges, methods, and future directions,” in IEEE Signal Processing Magazine, vol. 37, no. 3. IEEE, 2019, pp. 50–60.
C. Molnar, “Interpretable machine learning: Definitions, methods, and applications,” arXiv preprint arXiv:2010.09276, 2020.
A. B. Arrieta, N. Diaz-Rodriguez, J. Del Ser et al., “Explainable artificial intelligence (xai): Concepts, taxonomies, opportunities and challenges toward responsible ai,” Information Fusion, vol. 58, pp. 82–115, 2020.
N. Khattak, H.-I. Lee, and H. Park, “A survey on ai-based intrusion detection systems in edge computing environments,” IEEE Access, vol. 8, pp. 115345–115364, 2020.
J. Moody and M. Merkel, “Cicids2017: A comprehensive dataset for intrusion detection systems,” in Proceedings of the 2017 Annual Conference on Privacy, Security and Trust (PST). IEEE, 2017, pp. 6–16. [24]
B.Liu, X.Zhang, and Y.Liu, “Feature selection techniques for intrusion detection systems in edge computing environments,” IEEE Internet of Things Journal, vol. 8, no. 7, pp. 5341–5356, 2021.
D. P. Kingma and J. Ba, “Adam: A method for stochastic optimization,” in Proceedings of the 3rd International Conference on Learning Representations (ICLR), 2014.
I.Goodfellow, Y.Bengio, and A.Courville, “Deep learning,” MIT Press, 2016.
Downloads
Published
Issue
Section
License
Copyright (c) -1 Rajashekhar Reddy Kethireddy (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.