edge computing environment
Towards Explainable and Lightweight AI for Real-Time Cyber Threat Hunting in Edge Networks
As cyber threats continue to evolve, securing edge networks has become increasingly challenging due to their distributed nature and resource limitations. Many AI-driven threat detection systems rely on complex deep learning models, which, despite their high accuracy, suffer from two major drawbacks: lack of interpretability and high computational cost. Black-box AI models make it difficult for security analysts to understand the reasoning behind their predictions, limiting their practical deployment. Moreover, conventional deep learning techniques demand significant computational resources, rendering them unsuitable for edge devices with limited processing power. To address these issues, this study introduces an Explainable and Lightweight AI (ELAI) framework designed for real-time cyber threat detection in edge networks. Our approach integrates interpretable machine learning algorithms with optimized lightweight deep learning techniques, ensuring both transparency and computational efficiency. The proposed system leverages decision trees, attention-based deep learning, and federated learning to enhance detection accuracy while maintaining explainability. We evaluate ELAI using benchmark cybersecurity datasets, such as CICIDS and UNSW-NB15, assessing its performance across diverse cyberattack scenarios. Experimental results demonstrate that the proposed framework achieves high detection rates with minimal false positives, all while significantly reducing computational demands compared to traditional deep learning methods. The key contributions of this work include: (1) a novel interpretable AI-based cybersecurity model tailored for edge computing environments, (2) an optimized lightweight deep learning approach for real-time cyber threat detection, and (3) a comprehensive analysis of explainability techniques in AI-driven cybersecurity applications.
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (1.00)
A Novel Access Control and Privacy-Enhancing Approach for Models in Edge Computing
With the widespread adoption of edge computing technologies and the increasing prevalence of deep learning models in these environments, the security risks and privacy threats to models and data have grown more acute. Attackers can exploit various techniques to illegally obtain models or misuse data, leading to serious issues such as intellectual property infringement and privacy breaches. Existing model access control technologies primarily rely on traditional encryption and authentication methods; however, these approaches exhibit significant limitations in terms of flexibility and adaptability in dynamic environments. Although there have been advancements in model watermarking techniques for marking model ownership, they remain limited in their ability to proactively protect intellectual property and prevent unauthorized access. To address these challenges, we propose a novel model access control method tailored for edge computing environments. This method leverages image style as a licensing mechanism, embedding style recognition into the model's operational framework to enable intrinsic access control. Consequently, models deployed on edge platforms are designed to correctly infer only on license data with specific style, rendering them ineffective on any other data. By restricting the input data to the edge model, this approach not only prevents attackers from gaining unauthorized access to the model but also enhances the privacy of data on terminal devices. We conducted extensive experiments on benchmark datasets, including MNIST, CIFAR-10, and FACESCRUB, and the results demonstrate that our method effectively prevents unauthorized access to the model while maintaining accuracy. Additionally, the model shows strong resistance against attacks such as forged licenses and fine-tuning. These results underscore the method's usability, security, and robustness.
- Europe > Netherlands > North Holland > Amsterdam (0.04)
- Asia > China > Jiangsu Province > Nanjing (0.04)
Probabilistic Time Series Forecasting for Adaptive Monitoring in Edge Computing Environments
Scheinert, Dominik, Aghdam, Babak Sistani Zadeh, Becker, Soeren, Kao, Odej, Thamsen, Lauritz
With increasingly more computation being shifted to the edge of the network, monitoring of critical infrastructures, such as intermediate processing nodes in autonomous driving, is further complicated due to the typically resource-constrained environments. In order to reduce the resource overhead on the network link imposed by monitoring, various methods have been discussed that either follow a filtering approach for data-emitting devices or conduct dynamic sampling based on employed prediction models. Still, existing methods are mainly requiring adaptive monitoring on edge devices, which demands device reconfigurations, utilizes additional resources, and limits the sophistication of employed models. In this paper, we propose a sampling-based and cloud-located approach that internally utilizes probabilistic forecasts and hence provides means of quantifying model uncertainties, which can be used for contextualized adaptations of sampling frequencies and consequently relieves constrained network resources. We evaluate our prototype implementation for the monitoring pipeline on a publicly available streaming dataset and demonstrate its positive impact on resource efficiency in a method comparison.
- Europe > United Kingdom > Scotland > City of Glasgow > Glasgow (0.04)
- Europe > Germany > Berlin (0.04)
- Telecommunications > Networks (0.34)
- Information Technology > Networks (0.34)
- Information Technology > Communications > Networks (1.00)
- Information Technology > Cloud Computing (1.00)
- Information Technology > Artificial Intelligence > Machine Learning (1.00)
- Information Technology > Data Science > Data Mining (0.83)
DeepEdge: A Deep Reinforcement Learning based Task Orchestrator for Edge Computing
Yamansavascilar, Baris, Baktir, Ahmet Cihat, Sonmez, Cagatay, Ozgovde, Atay, Ersoy, Cem
The improvements in the edge computing technology pave the road for diversified applications that demand real-time interaction. However, due to the mobility of the end-users and the dynamic edge environment, it becomes challenging to handle the task offloading with high performance. Moreover, since each application in mobile devices has different characteristics, a task orchestrator must be adaptive and have the ability to learn the dynamics of the environment. For this purpose, we develop a deep reinforcement learning based task orchestrator, DeepEdge, which learns to meet different task requirements without needing human interaction even under the heavily-loaded stochastic network conditions in terms of mobile users and applications. Given the dynamic offloading requests and time-varying communication conditions, we successfully model the problem as a Markov process and then apply the Double Deep Q-Network (DDQN) algorithm to implement DeepEdge. To evaluate the robustness of DeepEdge, we experiment with four different applications including image rendering, infotainment, pervasive health, and augmented reality in the network under various loads. Furthermore, we compare the performance of our agent with the four different task offloading approaches in the literature. Our results show that DeepEdge outperforms its competitors in terms of the percentage of satisfactorily completed tasks.
- Europe > Middle East > Republic of Türkiye > Istanbul Province > Istanbul (0.05)
- Asia > Middle East > Republic of Türkiye > Istanbul Province > Istanbul (0.05)
- North America > United States > New York (0.04)
- Asia > Middle East > Republic of Türkiye > İzmir Province > İzmir (0.04)
- Information Technology (1.00)
- Education > Educational Setting (0.93)
- Telecommunications (0.89)
- Information Technology > Artificial Intelligence > Machine Learning > Reinforcement Learning (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks > Deep Learning (0.93)
- Information Technology > Artificial Intelligence > Machine Learning > Learning Graphical Models > Undirected Networks > Markov Models (0.48)
5 AI Trends to Watch out for in 2022 - The New Stack
The COVID-19 pandemic has accelerated the adoption of artificial intelligence, or machine learning, in 2021. The need for automation among enterprises combined with the advancements in AI hardware and software is turning applied AI into a reality. Language models are based on natural language processing techniques and algorithms to determine the probability of a given sequence of words occurring in a sentence. These models can predict the next word in a sentence, summarize textual information, and even create visual charts from plain text. Large language models (LLMs) are trained on massive datasets that contain enormous amounts of data.
Edge computing environments: what you need to know
The saying goes: "If you're not on the edge, you're taking up too much space". And compute itself is now moving to the edge, forcing datacentre operators to wring the last drops of productivity from their infrastructure, ahead of a future supporting multi-sensor internet of things (IoT) devices over 5G for machine learning, and even artificial intelligence (AI). Jennifer Cooke, research director of cloud-to-edge datacentre trends at IDC, says datacentre operators need to start thinking about how many systems they will need to roll out, and the people they will need to support them. "Cost becomes the prohibitive factor," she says. Edge will take different forms.