IEEE Consumer Electronics Magazine - May/June 2022 - 32
AI Security for MEC
technique is activated at each SDN's edge controller
tomonitor and detect the flow rule attack.
Hassan et al.6 proposed a distributed snortbased
intrusion detection system (IDS) to monitor
andprotect the cloud computing network and control
system from denial of service (DoS) attacks.
IDSs are activated at each server and collaborate
with each other in a distributed manner to detect
the distributed DoS attacks. They proposed a set
of static rules related to the number of packets
sent and dropped that should be conformed by
themonitored nodes; when a node does not follow
the rules, its behavior constitutes a DoS attack.
Cai et al.7 developed a distributed signaturebased
attack detection to protect the metering
infrastructure against false data injection attacks.
They modeled the behavior of the attacks targeting
the smart grid metering system with a set of
signatures. The distributed IDSs based on attack
signatures are activated at edge servers to detect
the false data injection, while a reputation system
is used to evaluate the trust level of the smart
grid collector systems.
Detecting Attacks With Dynamic Malicious
Behaviors
In this kind of detection, a machine learning
algorithm is used to monitor the dynamic misbehaviors
executed by the cyber-attack with the
goal to detect attacks that have never been
detected before by the signature-based detection
technique, such as the zero-day threats.
Chen et al.8 developed an accurate attack
detection framework based on a deep belief neural
network to protect the transportation system
empowered by MEC from internal and external
attacks. The unsupervised learning algorithm
aims to determine the new attack features of
threats on the MEC servers in order to improve
the detection rate. The attack models used during
the experimentation phase correspond to
the network attacks that change their misbehaviors
frequently and dynamically.
Samy et al.9 proposed a robust defense system
based on a deep learning algorithm to protect
the IoT devices from several types of zeroday
attacks. The defense system is activated at
each edge server to monitor the behavior of the
distrusted IoT devices. According to their experimental
results, their defense system exhibits a
32
low reaction time and high accuracy detection.
However, they did not propose a security strategy
to protect the defense system against the
internal and external attacks.
Subramaniam and Kaur10 studied different
deep learning algorithms deployed at the edge to
secure a MEC network. According to their investigation,
the automated learning attack features
used by the deep learning algorithms could
improve the detection rate significantly as compared
to other machine learning algorithms such
as random forest and one-class support vector
machine. However, they did not evaluate the performance
of the algorithms with real data.
Wang et al.11 analyzed the performance of the
current IDSs based on machine learning algorithms
deployed at the Internet of Things (IoT)
edge. The performance of machine learning is
evaluated in terms of three main metrics: detection
accuracy, memory storage, and complexity.
The purpose of this study is to embed the
selected machine learning algorithm(s) with the
IDS at the real edge server to secure the IoT
network.
Table 1 summarizes the pros and cons of the
edge security frameworks5-10 based on the following
security and network metrics: detection
and false positive rates, computational overhead,
and memory storage. The detection and
false positive rates correspond to the detection
accuracy of security frameworks against the
known and unknown attacks. The computational
overhead represents the required cost of the
security framework to achieve a high level of
security, while the memory storage metric corresponds
to the number of attack signatures
and features required to detect the attacks
accurately.
Among the AI detection techniques that
could be leveraged in the cyber security context
for achieving high detection accuracy, i.e., high
attack detection with a low false positive rate,
the hybrid learning technique3 seems promising.
This technique combines the rules (signatures)
defined by the cyber security expert and attack
models obtained from the machine learning algorithm
to increase the detection accuracy. In this
context, there is a need to better understand the
human-machine interaction in addressing the
accuracy of attack detection with consideration
IEEE Consumer Electronics Magazine
IEEE Consumer Electronics Magazine - May/June 2022
Table of Contents for the Digital Edition of IEEE Consumer Electronics Magazine - May/June 2022
Contents
IEEE Consumer Electronics Magazine - May/June 2022 - Cover1
IEEE Consumer Electronics Magazine - May/June 2022 - Cover2
IEEE Consumer Electronics Magazine - May/June 2022 - Contents
IEEE Consumer Electronics Magazine - May/June 2022 - 2
IEEE Consumer Electronics Magazine - May/June 2022 - 3
IEEE Consumer Electronics Magazine - May/June 2022 - 4
IEEE Consumer Electronics Magazine - May/June 2022 - 5
IEEE Consumer Electronics Magazine - May/June 2022 - 6
IEEE Consumer Electronics Magazine - May/June 2022 - 7
IEEE Consumer Electronics Magazine - May/June 2022 - 8
IEEE Consumer Electronics Magazine - May/June 2022 - 9
IEEE Consumer Electronics Magazine - May/June 2022 - 10
IEEE Consumer Electronics Magazine - May/June 2022 - 11
IEEE Consumer Electronics Magazine - May/June 2022 - 12
IEEE Consumer Electronics Magazine - May/June 2022 - 13
IEEE Consumer Electronics Magazine - May/June 2022 - 14
IEEE Consumer Electronics Magazine - May/June 2022 - 15
IEEE Consumer Electronics Magazine - May/June 2022 - 16
IEEE Consumer Electronics Magazine - May/June 2022 - 17
IEEE Consumer Electronics Magazine - May/June 2022 - 18
IEEE Consumer Electronics Magazine - May/June 2022 - 19
IEEE Consumer Electronics Magazine - May/June 2022 - 20
IEEE Consumer Electronics Magazine - May/June 2022 - 21
IEEE Consumer Electronics Magazine - May/June 2022 - 22
IEEE Consumer Electronics Magazine - May/June 2022 - 23
IEEE Consumer Electronics Magazine - May/June 2022 - 24
IEEE Consumer Electronics Magazine - May/June 2022 - 25
IEEE Consumer Electronics Magazine - May/June 2022 - 26
IEEE Consumer Electronics Magazine - May/June 2022 - 27
IEEE Consumer Electronics Magazine - May/June 2022 - 28
IEEE Consumer Electronics Magazine - May/June 2022 - 29
IEEE Consumer Electronics Magazine - May/June 2022 - 30
IEEE Consumer Electronics Magazine - May/June 2022 - 31
IEEE Consumer Electronics Magazine - May/June 2022 - 32
IEEE Consumer Electronics Magazine - May/June 2022 - 33
IEEE Consumer Electronics Magazine - May/June 2022 - 34
IEEE Consumer Electronics Magazine - May/June 2022 - 35
IEEE Consumer Electronics Magazine - May/June 2022 - 36
IEEE Consumer Electronics Magazine - May/June 2022 - 37
IEEE Consumer Electronics Magazine - May/June 2022 - 38
IEEE Consumer Electronics Magazine - May/June 2022 - 39
IEEE Consumer Electronics Magazine - May/June 2022 - 40
IEEE Consumer Electronics Magazine - May/June 2022 - 41
IEEE Consumer Electronics Magazine - May/June 2022 - 42
IEEE Consumer Electronics Magazine - May/June 2022 - 43
IEEE Consumer Electronics Magazine - May/June 2022 - 44
IEEE Consumer Electronics Magazine - May/June 2022 - 45
IEEE Consumer Electronics Magazine - May/June 2022 - 46
IEEE Consumer Electronics Magazine - May/June 2022 - 47
IEEE Consumer Electronics Magazine - May/June 2022 - 48
IEEE Consumer Electronics Magazine - May/June 2022 - 49
IEEE Consumer Electronics Magazine - May/June 2022 - 50
IEEE Consumer Electronics Magazine - May/June 2022 - 51
IEEE Consumer Electronics Magazine - May/June 2022 - 52
IEEE Consumer Electronics Magazine - May/June 2022 - 53
IEEE Consumer Electronics Magazine - May/June 2022 - 54
IEEE Consumer Electronics Magazine - May/June 2022 - 55
IEEE Consumer Electronics Magazine - May/June 2022 - 56
IEEE Consumer Electronics Magazine - May/June 2022 - 57
IEEE Consumer Electronics Magazine - May/June 2022 - 58
IEEE Consumer Electronics Magazine - May/June 2022 - 59
IEEE Consumer Electronics Magazine - May/June 2022 - 60
IEEE Consumer Electronics Magazine - May/June 2022 - 61
IEEE Consumer Electronics Magazine - May/June 2022 - 62
IEEE Consumer Electronics Magazine - May/June 2022 - 63
IEEE Consumer Electronics Magazine - May/June 2022 - 64
IEEE Consumer Electronics Magazine - May/June 2022 - 65
IEEE Consumer Electronics Magazine - May/June 2022 - 66
IEEE Consumer Electronics Magazine - May/June 2022 - 67
IEEE Consumer Electronics Magazine - May/June 2022 - 68
IEEE Consumer Electronics Magazine - May/June 2022 - 69
IEEE Consumer Electronics Magazine - May/June 2022 - 70
IEEE Consumer Electronics Magazine - May/June 2022 - 71
IEEE Consumer Electronics Magazine - May/June 2022 - 72
IEEE Consumer Electronics Magazine - May/June 2022 - 73
IEEE Consumer Electronics Magazine - May/June 2022 - 74
IEEE Consumer Electronics Magazine - May/June 2022 - 75
IEEE Consumer Electronics Magazine - May/June 2022 - 76
IEEE Consumer Electronics Magazine - May/June 2022 - 77
IEEE Consumer Electronics Magazine - May/June 2022 - 78
IEEE Consumer Electronics Magazine - May/June 2022 - 79
IEEE Consumer Electronics Magazine - May/June 2022 - 80
IEEE Consumer Electronics Magazine - May/June 2022 - 81
IEEE Consumer Electronics Magazine - May/June 2022 - 82
IEEE Consumer Electronics Magazine - May/June 2022 - 83
IEEE Consumer Electronics Magazine - May/June 2022 - 84
IEEE Consumer Electronics Magazine - May/June 2022 - 85
IEEE Consumer Electronics Magazine - May/June 2022 - 86
IEEE Consumer Electronics Magazine - May/June 2022 - 87
IEEE Consumer Electronics Magazine - May/June 2022 - 88
IEEE Consumer Electronics Magazine - May/June 2022 - 89
IEEE Consumer Electronics Magazine - May/June 2022 - 90
IEEE Consumer Electronics Magazine - May/June 2022 - 91
IEEE Consumer Electronics Magazine - May/June 2022 - 92
IEEE Consumer Electronics Magazine - May/June 2022 - 93
IEEE Consumer Electronics Magazine - May/June 2022 - 94
IEEE Consumer Electronics Magazine - May/June 2022 - 95
IEEE Consumer Electronics Magazine - May/June 2022 - 96
IEEE Consumer Electronics Magazine - May/June 2022 - 97
IEEE Consumer Electronics Magazine - May/June 2022 - 98
IEEE Consumer Electronics Magazine - May/June 2022 - 99
IEEE Consumer Electronics Magazine - May/June 2022 - 100
IEEE Consumer Electronics Magazine - May/June 2022 - 101
IEEE Consumer Electronics Magazine - May/June 2022 - 102
IEEE Consumer Electronics Magazine - May/June 2022 - 103
IEEE Consumer Electronics Magazine - May/June 2022 - 104
IEEE Consumer Electronics Magazine - May/June 2022 - Cover3
IEEE Consumer Electronics Magazine - May/June 2022 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20240102
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20231112
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20230910
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20230708
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20230506
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20230304
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20230102
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20221112
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20220910
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20220708
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20220506
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20220304
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20220102
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20211112
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20210910
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20210708
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20210506
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20210304
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202010
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202009
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202007
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202004
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202003
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202001
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201910
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201909
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201907
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201905
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201903
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201901
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201811
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201809
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201807
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201805
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201803
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_july2017
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_april2017
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_january2017
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_october2016
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_july2016
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_april2016
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_january2016
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_october2015
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_july2015
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_april2015
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_january2015
https://www.nxtbookmedia.com