Open Access   Article Go Back

Development of a Model for the Detection of Malicious Activities on Edge Computing

Irhirhi M.1 , V.T. Emmah2

  1. Computer Science/Science, River State University, Port Harcourt, Nigeria.
  2. Computer Science/Science, River State University, Port Harcourt, Nigeria.

Section:Research Paper, Product Type: Journal Paper
Volume-12 , Issue-8 , Page no. 18-24, Aug-2024

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v12i8.1824

Online published on Aug 31, 2024

Copyright © Irhirhi M., V.T. Emmah . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Irhirhi M., V.T. Emmah, “Development of a Model for the Detection of Malicious Activities on Edge Computing,” International Journal of Computer Sciences and Engineering, Vol.12, Issue.8, pp.18-24, 2024.

MLA Style Citation: Irhirhi M., V.T. Emmah "Development of a Model for the Detection of Malicious Activities on Edge Computing." International Journal of Computer Sciences and Engineering 12.8 (2024): 18-24.

APA Style Citation: Irhirhi M., V.T. Emmah, (2024). Development of a Model for the Detection of Malicious Activities on Edge Computing. International Journal of Computer Sciences and Engineering, 12(8), 18-24.

BibTex Style Citation:
@article{M._2024,
author = {Irhirhi M., V.T. Emmah},
title = {Development of a Model for the Detection of Malicious Activities on Edge Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2024},
volume = {12},
Issue = {8},
month = {8},
year = {2024},
issn = {2347-2693},
pages = {18-24},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5714},
doi = {https://doi.org/10.26438/ijcse/v12i8.1824}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v12i8.1824}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5714
TI - Development of a Model for the Detection of Malicious Activities on Edge Computing
T2 - International Journal of Computer Sciences and Engineering
AU - Irhirhi M., V.T. Emmah
PY - 2024
DA - 2024/08/31
PB - IJCSE, Indore, INDIA
SP - 18-24
IS - 8
VL - 12
SN - 2347-2693
ER -

VIEWS PDF XML
47 38 downloads 17 downloads
  
  
           

Abstract

The unique characteristics of edge computing, such as limited resources and decentralized architecture, pose distinct challenges to traditional security measures. As the adoption of edge computing continues to proliferate across diverse domains, the security of edge devices becomes a paramount concern. This paper outlines a comprehensive approach for the detection of malicious activities (DDoS, Okiru and PartofHorizontalPortScan) on edge computing devices. The proposed solution leverages a combination of anomaly detection, Recurrent Neural Network (RNN) algorithm, and behaviour analysis tailored to the constraints of edge devices. By considering the specific context of edge environments, the model aims to distinguish between normal and malicious behaviour in edge computing, offering a proactive defence against emerging threats. Furthermore, the integration of threat intelligence feeds enhances the system`s ability to adapt to evolving attack vectors. The efficiency of the proposed solution ensures minimal impact on the performance of resource-constrained edge devices. This paperwork contributes to the ongoing efforts to fortify the security of edge computing ecosystems. By addressing the unique challenges associated with these devices, the proposed RNN algorithm provides a robust and adaptive framework for the detection and mitigation of malicious activities in edge computing, safeguarding the integrity and reliability of edge computing applications with an accuracy of 99.9%.

Key-Words / Index Term

Edge Computing, Malicious packets, recurrent neural network, Random Forest Classifier

References

[1] J. Abawajy, S. Huda, S. Sharmeen, M. M. Hassan, and A. Almogren, "Identifying cyber threats to mobile-IoT applications in edge computing paradigm," Future Generation Computer Systems, Vol.89, pp.525-538, 2018.
[2] A. Anand, S. Patil, and P. Kulkarni, "A survey on edge computing security: Threats, attacks, and defenses," Journal of Ambient Intelligence and Humanized Computing, Vol.12, No.5, pp.4871-4891, 2021. https://doi.org/10.1007/s12652-021-03246-6
[3] W. G. Hatcher, J. Booz, J. McGiff, C. Lu, and W. Yu, "Edge computing based machine learning mobile malware detection," 2017.
[4] R. H. Hsu et al., "A privacy-preserving federated learning system for android malware detection based on edge computing," in 2020 15th Asia Joint Conference on Information Security (AsiaJCIS), pp.128-136, 2020.
[5] H. M. Kim and K. H. Lee, "IIoT malware detection using edge computing and deep learning for cybersecurity in smart factories," Applied Sciences, Vol.12, No.15, pp.7679, 2022.
[6] K. J. Kim and J. H. Kim, "A survey of security threats and countermeasures in edge computing," Journal of Supercomputing, Vol.76, No.8, pp.5834-5864, 2020. https://doi.org/10.1007/s11227-020-03154-5
[7] Y. J. Kim, C. H. Park, and M. Yoon, "FILM: filtering and machine learning for malware detection in edge computing," Sensors, Vol.22, No.6, pp.2150, 2022.
[8] W. Lian, G. Nie, Y. Kang, B. Jia, and Y. Zhang, "Cryptomining malware detection based on edge computing-oriented multi-modal features deep learning," China Communications, Vol.19, No.2, pp.174-185, 2022.
[9] A. Libri, A. Bartolini, and L. Benini, "pAElla: Edge AI-based real-time malware detection in data centers," IEEE Internet of Things Journal, Vol.7, No.10, pp.9589-9599, 2020.
[10] A. Mahindru and H. Arora, "Dnndroid: Android malware detection framework based on federated learning and edge computing," in International Conference on Advancements in Smart Computing and Information Security, Cham: Springer Nature Switzerland, pp.96-107, 2022.
[11] Y. Shen, S. Shen, Z. Wu, H. Zhou, and S. Yu, "Signaling game-based availability assessment for edge computing-assisted IoT systems with malware dissemination," Journal of Information Security and Applications, Vol.66, pp.103140, 2022.
[12] Z. Tian et al., "Real-time lateral movement detection based on evidence reasoning network for edge computing environment," IEEE Transactions on Industrial Informatics, Vol.15, No.7, pp.4285-4294, 2019.
[13] Y. Wang, L. Zhang, C. Xie, and Q. Wu, "A survey of security and privacy issues in edge computing," IEEE Network, Vol.34, No.6, pp.164-172, 2020. https://doi.org/10.1109/MNET.011.2000184
[14] Y. Yang, Y. Liu, C. Wang, and X. Tang, "A dynamic malicious activity detection scheme for edge computing based on deep learning," IEEE Access, Vol.8, pp.220217-220231, 2020. https://doi.org/10.1109/ACCESS.2020.3048144