180 157
Full Length Article
Journal of Cybersecurity and Information Management
Volume 13 , Issue 1, PP: 69-75 , 2024 | Cite this article as | XML | Html |PDF

Title

A Comprehensive Approach to Cyberattack Detection in Edge Computing Environments

  Khder Alakkari 1 * ,   Alhumaima Ali Subhi 2 ,   Hussein Alkattan 3 ,   Ammar Kadi 4 ,   Artem Malinin 5 ,   Irina Potoroko 6 ,   Mostafa Abotaleb 7 ,   El-Sayed M El-kenawy 8

1  Department of Statistics and Programming, Faculty of Economics, University of Tishreen, Latakia, P.O. Box 2230, Syria
    (khderalakkari1990@gmail.com)

2  Department of Food and Biotechnology, South Ural State University, 454080 Chelyabinsk
    (alhumaimaali@uodiyala.edu.iq)

3  Electronic and Computer Center, University of Diyala, Baqubah MJJ2+R9G, Iraq
    (alkattan.hussein92@gmail.com)

4  Department of System Programming, South Ural State University, 454080 Chelyabinsk, Russia
    (ammarka89@gmail.com)

5  Department of System Programming, South Ural State University, 454080 Chelyabinsk, Russia
    (artemmalinin3@gmail.com)

6  Department of System Programming, South Ural State University, 454080 Chelyabinsk, Russia
    (irina_potoroko@mail.ru)

7  Electronic and Computer Center, University of Diyala, Baqubah MJJ2+R9G,
    (abotalebmostafa@bk.ru)

8  Department of Communications and Electronics, Delta Higher Institute of Engineering and Technology, Mansoura 35111, Egypt
    (skenawy@ieee.org)


Doi   :   https://doi.org/10.54216/JCIM.130107

Received: May 28, 2023 Revised: August 16, 2023 Accepted: December 21, 2023

Abstract :

This research is concerned with the critical domain of cybersecurity in edge computing environments, which aims to strengthen defenses against increasing cyber threats that target interconnected Internet of Things (IoT) devices. The widespread adoption of edge computing introduces vulnerabilities that necessitate a strong framework for detecting cyberattacks. This study utilizes Long Short-Term Memory (LSTM) networks to present a comprehensive approach based on stacked LSTM layers for detecting and mitigating cyber threats in the dynamic landscape of edge networks. Using the NSL-KDD dataset and rigorous experimentation, this model demonstrates its ability to detect subtle anomalies in network traffic, which can be used to accurately classify malicious activities while minimizing false alarms. The findings highlight the potential of LSTM-based approaches to enhance security at the edge, providing promising avenues for strengthening IoT ecosystems’ integrity and resilience against emerging cyber threats.

Keywords :

Edge Computing; Cyberattack Detection; Cyber Threats; Network Security; Edge Devices; Intrusion Detection; IoT Networks; Cybersecurity Solutions; Edge Security.

References :

A Comprehensive Approach to Cyberattack Detection in Edge Computing Environments

Khder Alakkari 1, Alhumaima Ali Subhi 2, Hussein Alkattan 3, Ammar Kadi 4, Artem Malinin 4, Irina Potoroko 4, Mostafa Abotaleb 3, El-Sayed M El-kenawy *5

1 Department of Statistics and Programming, Faculty of Economics, University of Tishreen, Latakia, P.O. Box 2230, Syria

2Department of Food and Biotechnology, South Ural State University, 454080 Chelyabinsk

3 Electronic and Computer Center, University of Diyala, Baqubah MJJ2+R9G, Iraq

4Department of System Programming, South Ural State University, 454080 Chelyabinsk, Russia

5Department of Communications and Electronics, Delta Higher Institute of Engineering and Technology, Mansoura 35111, Egypt

Emails: : khderalakkari1990@gmail.com; alhumaimaali@uodiyala.edu.iq; alkattan.hussein92@gmail.com; ammarka89@gmail.com; artemmalinin3@gmail.com; irina_potoroko@mail.ru; abotalebmostafa@bk.ru;  skenawy@ieee.org

 

Abstract

This research is concerned with the critical domain of cybersecurity in edge computing environments, which aims to strengthen defenses against increasing cyber threats that target interconnected Internet of Things (IoT) devices. The widespread adoption of edge computing introduces vulnerabilities that necessitate a strong framework for detecting cyberattacks. This study utilizes Long Short-Term Memory (LSTM) networks to present a comprehensive approach based on stacked LSTM layers for detecting and mitigating cyber threats in the dynamic landscape of edge networks. Using the NSL-KDD dataset and rigorous experimentation, this model demonstrates its ability to detect subtle anomalies in network traffic, which can be used to accurately classify malicious activities while minimizing false alarms. The findings highlight the potential of LSTM-based approaches to enhance security at the edge, providing promising avenues for strengthening IoT ecosystems’ integrity and resilience against emerging cyber threats.

Keywords: Edge Computing; Cyberattack Detection; Cyber Threats; Network Security; Edge Devices; Intrusion Detection; IoT Networks; Cybersecurity Solutions; Edge Security.


Cite this Article as :
Style #
MLA Khder Alakkari , Alhumaima Ali Subhi , Hussein Alkattan , Ammar Kadi , Artem Malinin , Irina Potoroko, Mostafa Abotaleb , El-Sayed M El-kenawy. "A Comprehensive Approach to Cyberattack Detection in Edge Computing Environments." Journal of Cybersecurity and Information Management, Vol. 13, No. 1, 2024 ,PP. 69-75 (Doi   :  https://doi.org/10.54216/JCIM.130107)
APA Khder Alakkari , Alhumaima Ali Subhi , Hussein Alkattan , Ammar Kadi , Artem Malinin , Irina Potoroko, Mostafa Abotaleb , El-Sayed M El-kenawy. (2024). A Comprehensive Approach to Cyberattack Detection in Edge Computing Environments. Journal of Journal of Cybersecurity and Information Management, 13 ( 1 ), 69-75 (Doi   :  https://doi.org/10.54216/JCIM.130107)
Chicago Khder Alakkari , Alhumaima Ali Subhi , Hussein Alkattan , Ammar Kadi , Artem Malinin , Irina Potoroko, Mostafa Abotaleb , El-Sayed M El-kenawy. "A Comprehensive Approach to Cyberattack Detection in Edge Computing Environments." Journal of Journal of Cybersecurity and Information Management, 13 no. 1 (2024): 69-75 (Doi   :  https://doi.org/10.54216/JCIM.130107)
Harvard Khder Alakkari , Alhumaima Ali Subhi , Hussein Alkattan , Ammar Kadi , Artem Malinin , Irina Potoroko, Mostafa Abotaleb , El-Sayed M El-kenawy. (2024). A Comprehensive Approach to Cyberattack Detection in Edge Computing Environments. Journal of Journal of Cybersecurity and Information Management, 13 ( 1 ), 69-75 (Doi   :  https://doi.org/10.54216/JCIM.130107)
Vancouver Khder Alakkari , Alhumaima Ali Subhi , Hussein Alkattan , Ammar Kadi , Artem Malinin , Irina Potoroko, Mostafa Abotaleb , El-Sayed M El-kenawy. A Comprehensive Approach to Cyberattack Detection in Edge Computing Environments. Journal of Journal of Cybersecurity and Information Management, (2024); 13 ( 1 ): 69-75 (Doi   :  https://doi.org/10.54216/JCIM.130107)
IEEE Khder Alakkari, Alhumaima Ali Subhi, Hussein Alkattan, Ammar Kadi, Artem Malinin, Irina Potoroko, Mostafa Abotaleb, El-Sayed M El-kenawy, A Comprehensive Approach to Cyberattack Detection in Edge Computing Environments, Journal of Journal of Cybersecurity and Information Management, Vol. 13 , No. 1 , (2024) : 69-75 (Doi   :  https://doi.org/10.54216/JCIM.130107)