Mitigating Cyber Threats at the Network Edge

被引:0
|
作者
Sofoluwe, Toyin [1 ]
Tso, Fung Po [1 ]
Phillips, Iain [1 ]
机构
[1] Loughborough Univ, Loughborough, Leics, England
关键词
D O I
10.1145/3517745.3563034
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The easy exploitation of IoT devices with limited security, compute and processing power has enabled hackers to carry out sophisticated attacks. Many research studies have highlighted the benefits of utilising artificial-intelligence based models in DDoS detection, but emphasis has not been placed on quantitative measurements of compute requirements for Machine Learning and Deep Learning algorithms used for DDoS detection, especially in the inference or detection stage. This research aims to fill the gap by performing quantitative measurement and comparison of various lightweight ML and DL algorithms, as well as design a lightweight collaborative framework capable of DDoS detection close to the source of the attack.
引用
收藏
页码:776 / 777
页数:2
相关论文
共 50 条
  • [1] Mitigating Insider Threats on the Edge: A Knowledgebase Approach
    Althebyan, Qutaibah
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2020, 17 (4A) : 621 - 628
  • [2] Predicting and mitigating cyber threats through data mining and machine learning
    Samia, Nusrat
    Saha, Sajal
    Haque, Anwar
    COMPUTER COMMUNICATIONS, 2024, 228
  • [3] RiskRoute: A Framework for Mitigating Network Outage Threats
    Eriksson, Brian
    Durairajan, Ramakrishnan
    Barford, Paul
    PROCEEDINGS OF THE 2013 ACM INTERNATIONAL CONFERENCE ON EMERGING NETWORKING EXPERIMENTS AND TECHNOLOGIES (CONEXT '13), 2013, : 405 - 416
  • [4] Undersea Optical Cable Network and Cyber Threats
    Hummelholm, Aarne
    PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 650 - 659
  • [5] Fingerprinting Network Sessions for the Discovery of Cyber Threats
    Klopper, C. D.
    Eloff, J. H. P.
    PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY ICCWS, 2023, : 171 - 180
  • [6] Mitigating IoT Security Threats with a Trusted Network Element
    Kuusijarvi, Jarkko
    Savola, Reijo
    Savolainen, Pekka
    Evesti, Antti
    2016 11TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2016, : 260 - 265
  • [8] Robust Federated Learning for Mitigating Advanced Persistent Threats in Cyber-Physical Systems
    Hallaji, Ehsan
    Razavi-Far, Roozbeh
    Saif, Mehrdad
    APPLIED SCIENCES-BASEL, 2024, 14 (19):
  • [9] Introducing the Special Topic on "Mitigating Cyber Threats and Defense in Data Intensive Smart Cities"
    Choo, Kim-Kwang Raymond
    Puthal, Deepak
    Liu, Charles Zhechao
    Wang, Chonggang
    INFORMATION SYSTEMS FRONTIERS, 2022, 24 (05) : 1393 - 1394
  • [10] Introducing the Special Topic on “Mitigating Cyber Threats and Defense in Data Intensive Smart Cities”
    Kim-Kwang Raymond Choo
    Deepak Puthal
    Charles Zhechao Liu
    Chonggang Wang
    Information Systems Frontiers, 2022, 24 : 1393 - 1394