1
Department of Statistics and Programming, Faculty of Economics, University of Tishreen, Latakia, P.O. Box 2230, Syria
(khderalakkari1990@gmail.com)
2
Department of Food and Biotechnology, South Ural State University, 454080 Chelyabinsk
(alhumaimaali@uodiyala.edu.iq)
3
Electronic and Computer Center, University of Diyala, Baqubah MJJ2+R9G, Iraq
(alkattan.hussein92@gmail.com)
4
Department of System Programming, South Ural State University, 454080 Chelyabinsk, Russia
(ammarka89@gmail.com)
5
Department of System Programming, South Ural State University, 454080 Chelyabinsk, Russia
(artemmalinin3@gmail.com)
6
Department of System Programming, South Ural State University, 454080 Chelyabinsk, Russia
(irina_potoroko@mail.ru)
7
Electronic and Computer Center, University of Diyala, Baqubah MJJ2+R9G,
(abotalebmostafa@bk.ru)
8
Department of Communications and Electronics, Delta Higher Institute of Engineering and Technology, Mansoura 35111, Egypt
(skenawy@ieee.org)
Abstract :
This research is concerned with the critical domain of cybersecurity in edge computing environments, which aims to strengthen defenses against increasing cyber threats that target interconnected Internet of Things (IoT) devices. The widespread adoption of edge computing introduces vulnerabilities that necessitate a strong framework for detecting cyberattacks. This study utilizes Long Short-Term Memory (LSTM) networks to present a comprehensive approach based on stacked LSTM layers for detecting and mitigating cyber threats in the dynamic landscape of edge networks. Using the NSL-KDD dataset and rigorous experimentation, this model demonstrates its ability to detect subtle anomalies in network traffic, which can be used to accurately classify malicious activities while minimizing false alarms. The findings highlight the potential of LSTM-based approaches to enhance security at the edge, providing promising avenues for strengthening IoT ecosystems’ integrity and resilience against emerging cyber threats.
Keywords :
Edge Computing; Cyberattack Detection; Cyber Threats; Network Security; Edge Devices; Intrusion Detection; IoT Networks; Cybersecurity Solutions; Edge Security.
References :
A Comprehensive Approach to Cyberattack Detection in Edge Computing Environments
Khder Alakkari 1, Alhumaima Ali Subhi 2, Hussein Alkattan 3, Ammar Kadi 4, Artem Malinin 4, Irina Potoroko 4, Mostafa Abotaleb 3, El-Sayed M El-kenawy *5
1 Department of Statistics and Programming, Faculty of Economics, University of Tishreen, Latakia, P.O. Box 2230, Syria
2Department of Food and Biotechnology, South Ural State University, 454080 Chelyabinsk
3 Electronic and Computer Center, University of Diyala, Baqubah MJJ2+R9G, Iraq
4Department of System Programming, South Ural State University, 454080 Chelyabinsk, Russia
5Department of Communications and Electronics, Delta Higher Institute of Engineering and Technology, Mansoura 35111, Egypt
Emails: : khderalakkari1990@gmail.com; alhumaimaali@uodiyala.edu.iq; alkattan.hussein92@gmail.com; ammarka89@gmail.com; artemmalinin3@gmail.com; irina_potoroko@mail.ru; abotalebmostafa@bk.ru; skenawy@ieee.org
Abstract
This research is concerned with the critical domain of cybersecurity in edge computing environments, which aims to strengthen defenses against increasing cyber threats that target interconnected Internet of Things (IoT) devices. The widespread adoption of edge computing introduces vulnerabilities that necessitate a strong framework for detecting cyberattacks. This study utilizes Long Short-Term Memory (LSTM) networks to present a comprehensive approach based on stacked LSTM layers for detecting and mitigating cyber threats in the dynamic landscape of edge networks. Using the NSL-KDD dataset and rigorous experimentation, this model demonstrates its ability to detect subtle anomalies in network traffic, which can be used to accurately classify malicious activities while minimizing false alarms. The findings highlight the potential of LSTM-based approaches to enhance security at the edge, providing promising avenues for strengthening IoT ecosystems’ integrity and resilience against emerging cyber threats.
Keywords: Edge Computing; Cyberattack Detection; Cyber Threats; Network Security; Edge Devices; Intrusion Detection; IoT Networks; Cybersecurity Solutions; Edge Security.
Style | # |
---|---|
MLA | Khder Alakkari , Alhumaima Ali Subhi , Hussein Alkattan , Ammar Kadi , Artem Malinin , Irina Potoroko, Mostafa Abotaleb , El-Sayed M El-kenawy. "A Comprehensive Approach to Cyberattack Detection in Edge Computing Environments." Journal of Cybersecurity and Information Management, Vol. 13, No. 1, 2024 ,PP. 69-75 (Doi : https://doi.org/10.54216/JCIM.130107) |
APA | Khder Alakkari , Alhumaima Ali Subhi , Hussein Alkattan , Ammar Kadi , Artem Malinin , Irina Potoroko, Mostafa Abotaleb , El-Sayed M El-kenawy. (2024). A Comprehensive Approach to Cyberattack Detection in Edge Computing Environments. Journal of Journal of Cybersecurity and Information Management, 13 ( 1 ), 69-75 (Doi : https://doi.org/10.54216/JCIM.130107) |
Chicago | Khder Alakkari , Alhumaima Ali Subhi , Hussein Alkattan , Ammar Kadi , Artem Malinin , Irina Potoroko, Mostafa Abotaleb , El-Sayed M El-kenawy. "A Comprehensive Approach to Cyberattack Detection in Edge Computing Environments." Journal of Journal of Cybersecurity and Information Management, 13 no. 1 (2024): 69-75 (Doi : https://doi.org/10.54216/JCIM.130107) |
Harvard | Khder Alakkari , Alhumaima Ali Subhi , Hussein Alkattan , Ammar Kadi , Artem Malinin , Irina Potoroko, Mostafa Abotaleb , El-Sayed M El-kenawy. (2024). A Comprehensive Approach to Cyberattack Detection in Edge Computing Environments. Journal of Journal of Cybersecurity and Information Management, 13 ( 1 ), 69-75 (Doi : https://doi.org/10.54216/JCIM.130107) |
Vancouver | Khder Alakkari , Alhumaima Ali Subhi , Hussein Alkattan , Ammar Kadi , Artem Malinin , Irina Potoroko, Mostafa Abotaleb , El-Sayed M El-kenawy. A Comprehensive Approach to Cyberattack Detection in Edge Computing Environments. Journal of Journal of Cybersecurity and Information Management, (2024); 13 ( 1 ): 69-75 (Doi : https://doi.org/10.54216/JCIM.130107) |
IEEE | Khder Alakkari, Alhumaima Ali Subhi, Hussein Alkattan, Ammar Kadi, Artem Malinin, Irina Potoroko, Mostafa Abotaleb, El-Sayed M El-kenawy, A Comprehensive Approach to Cyberattack Detection in Edge Computing Environments, Journal of Journal of Cybersecurity and Information Management, Vol. 13 , No. 1 , (2024) : 69-75 (Doi : https://doi.org/10.54216/JCIM.130107) |