Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 13 , Issue 1 , PP: 69-75, 2024 | Cite this article as | XML | Html | PDF | Full Length Article

A Comprehensive Approach to Cyberattack Detection in Edge Computing Environments

Khder Alakkari 1 * , Alhumaima Ali Subhi 2 , Hussein Alkattan 3 , Ammar Kadi 4 , Artem Malinin 5 , Irina Potoroko 6 , Mostafa Abotaleb 7 , El-Sayed M El-kenawy 8

  • 1 Department of Statistics and Programming, Faculty of Economics, University of Tishreen, Latakia, P.O. Box 2230, Syria - (khderalakkari1990@gmail.com)
  • 2 Department of Food and Biotechnology, South Ural State University, 454080 Chelyabinsk - (alhumaimaali@uodiyala.edu.iq)
  • 3 Electronic and Computer Center, University of Diyala, Baqubah MJJ2+R9G, Iraq - (alkattan.hussein92@gmail.com)
  • 4 Department of System Programming, South Ural State University, 454080 Chelyabinsk, Russia - (ammarka89@gmail.com)
  • 5 Department of System Programming, South Ural State University, 454080 Chelyabinsk, Russia - (artemmalinin3@gmail.com)
  • 6 Department of System Programming, South Ural State University, 454080 Chelyabinsk, Russia - (irina_potoroko@mail.ru)
  • 7 Electronic and Computer Center, University of Diyala, Baqubah MJJ2+R9G, - (abotalebmostafa@bk.ru)
  • 8 Department of Communications and Electronics, Delta Higher Institute of Engineering and Technology, Mansoura 35111, Egypt - (skenawy@ieee.org)
  • Doi: https://doi.org/10.54216/JCIM.130107

    Received: May 28, 2023 Revised: August 16, 2023 Accepted: December 21, 2023
    Abstract

    This research is concerned with the critical domain of cybersecurity in edge computing environments, which aims to strengthen defenses against increasing cyber threats that target interconnected Internet of Things (IoT) devices. The widespread adoption of edge computing introduces vulnerabilities that necessitate a strong framework for detecting cyberattacks. This study utilizes Long Short-Term Memory (LSTM) networks to present a comprehensive approach based on stacked LSTM layers for detecting and mitigating cyber threats in the dynamic landscape of edge networks. Using the NSL-KDD dataset and rigorous experimentation, this model demonstrates its ability to detect subtle anomalies in network traffic, which can be used to accurately classify malicious activities while minimizing false alarms. The findings highlight the potential of LSTM-based approaches to enhance security at the edge, providing promising avenues for strengthening IoT ecosystems’ integrity and resilience against emerging cyber threats.

    Keywords :

    Edge Computing , Cyberattack Detection , Cyber Threats , Network Security , Edge Devices , Intrusion Detection , IoT Networks , Cybersecurity Solutions , Edge Security

    References

    [1]       Rafique, Wajid, Lianyong Qi, Ibrar Yaqoob, Muhammad Imran, Raihan Ur Rasool, and Wanchun Dou. 2020. “Complementing IoT Services through Software Defined Networking and Edge Computing: A Comprehensive Survey.” IEEE Communications Surveys and Tutorials. https://doi.org/10.1109/COMST.2020.2997475.

    [2]       Huong, Truong Thu, Ta Phuong Bac, Dao M. Long, Bui D. Thang, Nguyen T. Binh, Tran D. Luong, and Tran Kim Phuc. 2021. “LocKedge: Low-Complexity Cyberattack Detection in IoT Edge Computing.” IEEE Access. https://doi.org/10.1109/ACCESS.2021.3058528.

    [3]       Singh, Ashish, Kakali Chatterjee, and Suresh Chandra Satapathy. 2022. “An Edge Based Hybrid Intrusion Detection Framework for Mobile Edge Computing.” Complex \& Intelligent Systems 8 (5): 3719–46.

    [4]       Alzubi, Omar A, Jafar A Alzubi, Moutaz Alazab, Adnan Alrabea, Albara Awajan, and Issa Qiqieh. 2022. “Optimized Machine Learning-Based Intrusion Detection System for Fog and Edge Computing Environment.” Electronics 11 (19): 3007.

    [5]       Mohy-eddine, Mouaad, Azidine Guezzaz, Said Benkirane, and Mourade Azrour. 2023. “An Effective Intrusion Detection Approach Based on Ensemble Learning for IIoT Edge Computing.” Journal of Computer Virology and Hacking Techniques 19 (4): 469–81.

    [6]       Garg, Sahil, Amritpal Singh, Shalini Batra, Neeraj Kumar, and Laurence T Yang. 2018. “UAV-Empowered Edge Computing Environment for Cyber-Threat Detection in Smart Vehicles.” IEEE Network 32 (3): 42–51.

    [7]       Gyamfi, Eric, and Anca Jurcut. 2022. “Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning, and Datasets.” Sensors 22 (10): 3744.

    [8]       Akram, Arslan. 2022. “Comprehensive Intrusion Detection System over Edge Computing.” CAPITAL UNIVERSITY.

    [9]       Tian, Zhihong, Wei Shi, Yuhang Wang, Chunsheng Zhu, Xiaojiang Du, Shen Su, Yanbin Sun, and Nadra Guizani. 2019. “Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment.” IEEE Transactions on Industrial Informatics 15 (7): 4285–94.

    [10]    Gopalakrishnan, T, D Ruby, Fadi Al-Turjman, Deepak Gupta, Irina V Pustokhina, Denis A Pustokhin, and K Shankar. 2020. “Deep Learning Enabled Data Offloading with Cyber Attack Detection Model in Mobile Edge Computing Systems.” IEEE Access 8: 185938–49.

    [11]    Kim, Ho-myung, and Kyung-ho Lee. 2022. “Iiot Malware Detection Using Edge Computing and Deep Learning for Cybersecurity in Smart Factories.” Applied Sciences 12 (15): 7679.

    [12]    Hilal, Anwer Mustafa, Manal Abdullah Alohali, Fahd N Al-Wesabi, Nadhem Nemri, Hasan J Alyamani, and Deepak Gupta. 2021. “Enhancing Quality of Experience in Mobile Edge Computing Using Deep Learning Based Data Offloading and Cyberattack Detection Technique.” Cluster Computing, 1–12.

    [13]    Li, Qianmu, Shunmei Meng, Sainan Zhang, Jun Hou, and Lianyong Qi. 2019. “Complex Attack Linkage Decision-Making in Edge Computing Networks.” IEEE Access 7: 12058–72.

    [14]    Abeshu, Abebe, and Naveen Chilamkurti. 2018. “Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing.” IEEE Communications Magazine 56 (2): 169–75.

    [15]    Ismail, M. and F.Abd El-Gawad , A. (2023) “Revisiting Zero-Trust Security for Internet of Things”, Sustainable Machine Intelligence Journal, 3. doi: 10.61185/SMIJ.2023.33106.

    [16]    Alotaibi, Bandar. 2023. “A Survey on Industrial Internet of Things Security: Requirements, Attacks, AIBased Solutions, and Edge Computing Opportunities.” Sensors 23 (17): 7470.

    [17]    Xiao, Yinhao, Yizhen Jia, Chunchi Liu, Xiuzhen Cheng, Jiguo Yu, and Weifeng Lv. 2019. “Edge Computing Security: State of the Art and Challenges.” Proceedings of the IEEE 107 (8): 1608–31.

    [18]    Khan, Latif U, Ibrar Yaqoob, Nguyen H Tran, S M Ahsan Kazmi, Tri Nguyen Dang, and Choong Seon Hong. 2020. “Edge-Computing-Enabled Smart Cities: A Comprehensive Survey.” IEEE Internet of Things Journal 7 (10): 10200–232.

    [19]    Sharma, Rohit, and Rajeev Arya. 2021. “Secure Transmission Technique for Data in IoT Edge Computing Infrastructure.” Complex \& Intelligent Systems, 1–16.

    [20]    Abdel-Basset, M., Hawash, H., Moustafa, N., Razzak, I., & Abd Elfattah, M. (2022). Privacy-preserved learning from non-iid data in fog-assisted IoT: A federated learning approach. Digital Communications and Networks.

    Cite This Article As :
    Alakkari, Khder. , Ali, Alhumaima. , Alkattan, Hussein. , Kadi, Ammar. , Malinin, Artem. , Potoroko, Irina. , Abotaleb, Mostafa. , M, El-Sayed. A Comprehensive Approach to Cyberattack Detection in Edge Computing Environments. Journal of Cybersecurity and Information Management, vol. , no. , 2024, pp. 69-75. DOI: https://doi.org/10.54216/JCIM.130107
    Alakkari, K. Ali, A. Alkattan, H. Kadi, A. Malinin, A. Potoroko, I. Abotaleb, M. M, E. (2024). A Comprehensive Approach to Cyberattack Detection in Edge Computing Environments. Journal of Cybersecurity and Information Management, (), 69-75. DOI: https://doi.org/10.54216/JCIM.130107
    Alakkari, Khder. Ali, Alhumaima. Alkattan, Hussein. Kadi, Ammar. Malinin, Artem. Potoroko, Irina. Abotaleb, Mostafa. M, El-Sayed. A Comprehensive Approach to Cyberattack Detection in Edge Computing Environments. Journal of Cybersecurity and Information Management , no. (2024): 69-75. DOI: https://doi.org/10.54216/JCIM.130107
    Alakkari, K. , Ali, A. , Alkattan, H. , Kadi, A. , Malinin, A. , Potoroko, I. , Abotaleb, M. , M, E. (2024) . A Comprehensive Approach to Cyberattack Detection in Edge Computing Environments. Journal of Cybersecurity and Information Management , () , 69-75 . DOI: https://doi.org/10.54216/JCIM.130107
    Alakkari K. , Ali A. , Alkattan H. , Kadi A. , Malinin A. , Potoroko I. , Abotaleb M. , M E. [2024]. A Comprehensive Approach to Cyberattack Detection in Edge Computing Environments. Journal of Cybersecurity and Information Management. (): 69-75. DOI: https://doi.org/10.54216/JCIM.130107
    Alakkari, K. Ali, A. Alkattan, H. Kadi, A. Malinin, A. Potoroko, I. Abotaleb, M. M, E. "A Comprehensive Approach to Cyberattack Detection in Edge Computing Environments," Journal of Cybersecurity and Information Management, vol. , no. , pp. 69-75, 2024. DOI: https://doi.org/10.54216/JCIM.130107