Strengthening Cybersecurity in Edge Computing with Machine Learning

Authors

  • Subrata Banik Senior SQA Manager, Email: subratabani@gmail.com Author
  • Parameshwar Reddy Kothamali QA Automation engineer, Email: parameshwar.kothamali@gmail.com Author
  • Sai Surya Mounika Dandyala Data engineer, Email: mounikareddy.dandyala14@gmail.com Author

Keywords:

Edge Computing, Cybersecurity, Machine Learning, Anomaly Detection, Intrusion Detection Systems, Behavioral Analysis.

Abstract

Edge computing is an emerging revolution that decentralizes computational tasks from traditional data center platforms to bring analytics algorithms closer to the source of data. However, this change in the paradigm invokes new security concerns that require modern protection methods to protect the Edge environment. In this paper, I study the incorporation of machine learning (ML) solutions to improve edge computing functionality for better cybersecurity. Specifically, we look into different ML algorithms and how they can be used to identify edge security threats like intrusion, data breaches, or malicious actions. Our study shows the efficacy of ML-driven solutions in sensing and mitigating real-time, emerging threats with automated anomaly detection using a behavior analysis platform that can leverage adaptive learning to proactively respond. We present empirical analysis and case studies to discuss the pros and cons of existing ML methods in edge applications. We learned that ML is a game changer for threat detection and response, but you have to deal with the same challenges around it: resources are tight and models do not scale well. We ended our paper with an outlook on securing edge computing using ML strategies, recommendations for further optimization of these strategies at the Machine-to-Machine (M2M) level, and potential future research areas addressing existing issues utilizing this particular domain.

Downloads

Download data is not yet available.

Downloads

Published

2024-08-10

Most read articles by the same author(s)

1 2 > >> 

Similar Articles

1-10 of 196

You may also start an advanced similarity search for this article.