A Trusted Hybrid Learning Approach to Secure Edge Computing

نویسندگان

چکیده

Securing edge computing has drawn much attention due to the vital role of in Fifth Generation (5G) wireless networks. Artificial Intelligence (AI) been adopted protect networks against attackers targeting connected devices or channel. However, proposed detection mechanisms could generate a high false rate, especially unknown attacks defined as zero-day threats. Thereby, we propose and conceive new hybrid learning security framework that combines expertise experts strength machine network from known attacks, while minimizing rate. Moreover, further decrease number detections, cyber mechanism based on Stackelberg game is used by engine (activated at each server) assess decisions provided neighboring engines.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cloud Computing; A New Approach to Learning and Learning

Introduction: The cloud computing and services, as a technological solution for developing educational services, can accelerate the provision and expansion of these highly useful services. This study intended to provide an overall picture of practical areas of learning services based on cloud computing teaching and learning equipment. Methods: This was a theoretical hybrid research study in whi...

متن کامل

Deep Learning for Secure Mobile Edge Computing

Mobile edge computing (MEC) is a promising approach for enabling cloud-computing capabilities at the edge of cellular networks. Nonetheless, security is becoming an increasingly important issue in MEC-based applications. In this paper, we propose a deep-learning-based model to detect security threats. The model uses unsupervised learning to automate the detection process, and uses location info...

متن کامل

Secure VPNs for Trusted Computing Environments

Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restrictions on all VPN endpoints to protect the perimeter of the VPN. However, enforcement of such restrictions becomes difficult if these endpoints are personal computers used for remote VPN access. Commonly employed measures like...

متن کامل

Secure Data Management in Trusted Computing

In this paper we identify shortcomings of the TCG specification related to the availability of sealed data during software and hardware life cycles, i.e., software update or/and hardware migration. In our view these problems are major obstacles for large-scale use of trusted computing technologies, e.g., in e-commerce, as adopters are concerned that the use of this technology might render their...

متن کامل

Using Trusted Computing to Secure Mobile Ubiquitous Environments

Today’s users typically have a multitude of electronic devices, such as desktop and laptop computers, Personal Digital Assistants (PDAs) and mobile/cellular phones, each with the capability to communicate with one another. At the same time, wireless communication has become more affordable and pervasive, and we have seen the introduction of smaller wireless-enabled devices such as headsets and ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Consumer Electronics Magazine

سال: 2022

ISSN: ['2162-2256', '2162-2248']

DOI: https://doi.org/10.1109/mce.2021.3099634