A Trusted Hybrid Learning Approach to Secure Edge Computing
نویسندگان
چکیده
Securing edge computing has drawn much attention due to the vital role of in Fifth Generation (5G) wireless networks. Artificial Intelligence (AI) been adopted protect networks against attackers targeting connected devices or channel. However, proposed detection mechanisms could generate a high false rate, especially unknown attacks defined as zero-day threats. Thereby, we propose and conceive new hybrid learning security framework that combines expertise experts strength machine network from known attacks, while minimizing rate. Moreover, further decrease number detections, cyber mechanism based on Stackelberg game is used by engine (activated at each server) assess decisions provided neighboring engines.
منابع مشابه
Cloud Computing; A New Approach to Learning and Learning
Introduction: The cloud computing and services, as a technological solution for developing educational services, can accelerate the provision and expansion of these highly useful services. This study intended to provide an overall picture of practical areas of learning services based on cloud computing teaching and learning equipment. Methods: This was a theoretical hybrid research study in whi...
متن کاملDeep Learning for Secure Mobile Edge Computing
Mobile edge computing (MEC) is a promising approach for enabling cloud-computing capabilities at the edge of cellular networks. Nonetheless, security is becoming an increasingly important issue in MEC-based applications. In this paper, we propose a deep-learning-based model to detect security threats. The model uses unsupervised learning to automate the detection process, and uses location info...
متن کاملSecure VPNs for Trusted Computing Environments
Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restrictions on all VPN endpoints to protect the perimeter of the VPN. However, enforcement of such restrictions becomes difficult if these endpoints are personal computers used for remote VPN access. Commonly employed measures like...
متن کاملSecure Data Management in Trusted Computing
In this paper we identify shortcomings of the TCG specification related to the availability of sealed data during software and hardware life cycles, i.e., software update or/and hardware migration. In our view these problems are major obstacles for large-scale use of trusted computing technologies, e.g., in e-commerce, as adopters are concerned that the use of this technology might render their...
متن کاملUsing Trusted Computing to Secure Mobile Ubiquitous Environments
Today’s users typically have a multitude of electronic devices, such as desktop and laptop computers, Personal Digital Assistants (PDAs) and mobile/cellular phones, each with the capability to communicate with one another. At the same time, wireless communication has become more affordable and pervasive, and we have seen the introduction of smaller wireless-enabled devices such as headsets and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Consumer Electronics Magazine
سال: 2022
ISSN: ['2162-2256', '2162-2248']
DOI: https://doi.org/10.1109/mce.2021.3099634