Open Access
ARTICLE
Efficient Autonomous Defense System Using Machine Learning on Edge Device
1 School of Electronic Engineering, Soongsil University, Seoul, 06978, Korea
* Corresponding Author: Jaehyuk Cho. Email: Array
(This article belongs to the Special Issue: Analysis, Processing, and Applications of Fuzzy System and Deep Learning)
Computers, Materials & Continua 2022, 70(2), 3565-3588. https://doi.org/10.32604/cmc.2022.020826
Received 10 June 2021; Accepted 11 July 2021; Issue published 27 September 2021
Abstract
As a large amount of data needs to be processed and speed needs to be improved, edge computing with ultra-low latency and ultra-connectivity is emerging as a new paradigm. These changes can lead to new cyber risks, and should therefore be considered for a security threat model. To this end, we constructed an edge system to study security in two directions, hardware and software. First, on the hardware side, we want to autonomically defend against hardware attacks such as side channel attacks by configuring field programmable gate array (FPGA) which is suitable for edge computing and identifying communication status to control the communication method according to priority. In addition, on the software side, data collected on the server performs end-to-end encryption via symmetric encryption keys. Also, we modeled autonomous defense systems on the server by using machine learning which targets to incoming and outgoing logs. Server log utilizes existing intrusion detection datasets that should be used in real-world environments. Server log was used to detect intrusion early by modeling an intrusion prevention system to identify behaviors that violate security policy, and to utilize the existing intrusion detection data set that should be used in a real environment. Through this, we designed an efficient autonomous defense system that can provide a stable system by detecting abnormal signals from the device and converting them to an effective method to control edge computing, and to detect and control abnormal intrusions on the server side.Keywords
Cite This Article
Citations
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.