A secure edge computing model using machine learning and IDS to detect and isolate intruders.

Mahadevappa, Poornima and Murugesan, Raja Kumar and Al-Amri, Redhwan and Thabit, Reema and Al-Ghushami, Abdullah Hussein and Alkawsi, Gamal (2024) A secure edge computing model using machine learning and IDS to detect and isolate intruders. MethodsX, 12. p. 102597. ISSN 2215-0161

Full text not available from this repository.

Abstract

The article presents a secure edge computing model that utilizes machine learning for intrusion detection and isolation. It addresses the security challenges arising from the rapid expansion of IoT and edge computing. The proposed Intrusion Detection System (IDS) combines Linear Discriminant Analysis (LDA) and Logistic Regression (LR) to swiftly and accurately identify intrusions without alerting neighboring devices. The model outperforms existing solutions with an accuracy of 96.56%, precision of 95.78%, and quick training time (0.04 s). It is effective against various types of attacks, enhancing the security of edge networks for IoT applications. •The methodology employs a hybrid model that combines LDA and LR for intrusion detection.•Machine learning techniques are used to analyze and identify intrusive activities during data acquisition by edge nodes.•The methodology includes a mechanism to isolate suspected devices and data without notifying neighboring edge nodes to prevent intruders from gaining control over the edge network. [Abstract copyright: © 2024 The Author(s).]

Item Type: Article
Additional Information: ** From PubMed via Jisc Publications Router ** History: received 16-11-2023; accepted 31-01-2024.
Uncontrolled Keywords: Intrusion detection, Hybrid LDA-LR, Edge security, Machine learning, Edge computing, LDA-LR, Intrusion isolation
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Q Science > QA Mathematics > QA76 Computer software
Divisions: Institutes and Academies > Wales Institute for Science & Art (WISA) > Academic Discipline: Applied Computing
SWORD Depositor: JISC Publications Router
Depositing User: JISC Publications Router
Date Deposited: 05 Mar 2024 14:31
Last Modified: 11 Sep 2024 17:05
URI: https://repository.uwtsd.ac.uk/id/eprint/2873

Administrator Actions (login required)

Edit Item - Repository Staff Only Edit Item - Repository Staff Only