IEEE Consumer Electronics Magazine - May/June 2022 - 34
AI Security for MEC
based on a rule-based detection technique. The
rule-based detection technique, executed at the
generator system, corresponds to a set of attack
signatures defined by the security expert, which
are updated over time and depend on the number
of suspected behaviors that are identified by the
experts as possible attacks. An example of an
attack signature could be the number of packets
sent and dropped that are above certain thresholds
to detect the DoS attack, where the packets
sent and dropped are the relevant features. A set
of attack signatures are stored in the signatures
database of the generator.
In this cyber security context, the generator
and discriminators cooperate between each other
to increase the attack detection rate and reduce
considerably the number of false positives. This
cooperative detection is illustrated in Figure 2. The
generator sends to the discriminators a list of
attacks to be detected (with the related signatures)
and then each discriminator extracts its
required information. Specifically, in the preprocessing
phase, ATDD extracts the values of features
from the signatures and associates them
with their corresponding labels while ANDD
extracts only the values of features from the signatures
without associating them with their labels.
Afterward, discriminators execute the training process
by using these feature values as inputs. ATDD
runs a supervised multiclass deep learning algorithm13
that builds the normal and attack patterns
during the training process and then classifies the
new incoming data as an attack or normal behavior
during the classification/detection process according
to the patterns determined in the training process.
The normal and attack patterns obtained
during the training process correspond to clusters
of vectors related to each pattern. ANDD uses as
inputs the outputs of ATDDand runs a deepconvolutional
GAN.14 This discriminator also analyzes
the network traffic to detect anomalies. If an anomaly
is detected, ANDD first checks if it is also
detected by ATDD. In the case of this anomaly only
detected by ANDD, an alert message is sent to the
security expert in order to update the attack signature
data base, i.e., adding new attack signatures.
The alert message includes attack features along
with the type of attack. Note that the cyber security
expert feeds the generator periodically with
new attack signatures in order to improve the
34
training process and hence to increase the attack
detection rate. In addition, the security expert
investigates the detection accuracy of ATDD
against zero-day attacks with the goal to decrease
the false positive rate.
Stackelberg Trust Game
The hybrid learning security engines based on
the GAN approach embedded in MEC servers
cooperate with each other by exchanging their
detection decisions (i.e., attacks with the related
signatures and features) in order to detect accurately
the new category of attacks, i.e., zero-day
attacks. However, a hybrid learning security
engine could be infected by the attacks and the
infected security engine could convey false detection
decisions to its neighboring engines; therefore,
the accuracy detection of zero-day attacks is
impacted, i.e., the increase and decrease of the
false positive and detection rates, respectively.
Thereby, to overcome this security issue, each
hybrid learning security engine should monitor
the trustworthiness of the detection decisions provided
by its neighboring security engines with
whom it collaborates. The interaction between
security engines is modeled as a Stackelberg security
game, where the hybrid learning security
engine is the leader player and its neighboring
security engines are the follower players. In the
security game, we assume that almost all follower
players are selfish and aim to impact the attack
detection of the leader player by providing false
detection decisions. In this noncooperative game,
the leader player aims to maximize its utility with
consideration of the best strategies undertaken by
the follower players and vice-versa. In the Stackelberg
game, the expected utility functions of the
noncooperative players depend mainly on the
number of malicious hybrid-learning security
engines that the leader player detects and the
number of false detections that the leader player
generates against the malicious follower players.
In the proposed Stackelberg security game, the
leader player launches its optimal strategy for
detecting the malicious hybrid learning security
engine, by considering the best response of the
follower's strategy. Furthermore, the malicious
security engine executes its optimal strategy for
providing a false detection decision, by considering
the best response of the leader's strategy. Note
IEEE Consumer Electronics Magazine
IEEE Consumer Electronics Magazine - May/June 2022
Table of Contents for the Digital Edition of IEEE Consumer Electronics Magazine - May/June 2022
Contents
IEEE Consumer Electronics Magazine - May/June 2022 - Cover1
IEEE Consumer Electronics Magazine - May/June 2022 - Cover2
IEEE Consumer Electronics Magazine - May/June 2022 - Contents
IEEE Consumer Electronics Magazine - May/June 2022 - 2
IEEE Consumer Electronics Magazine - May/June 2022 - 3
IEEE Consumer Electronics Magazine - May/June 2022 - 4
IEEE Consumer Electronics Magazine - May/June 2022 - 5
IEEE Consumer Electronics Magazine - May/June 2022 - 6
IEEE Consumer Electronics Magazine - May/June 2022 - 7
IEEE Consumer Electronics Magazine - May/June 2022 - 8
IEEE Consumer Electronics Magazine - May/June 2022 - 9
IEEE Consumer Electronics Magazine - May/June 2022 - 10
IEEE Consumer Electronics Magazine - May/June 2022 - 11
IEEE Consumer Electronics Magazine - May/June 2022 - 12
IEEE Consumer Electronics Magazine - May/June 2022 - 13
IEEE Consumer Electronics Magazine - May/June 2022 - 14
IEEE Consumer Electronics Magazine - May/June 2022 - 15
IEEE Consumer Electronics Magazine - May/June 2022 - 16
IEEE Consumer Electronics Magazine - May/June 2022 - 17
IEEE Consumer Electronics Magazine - May/June 2022 - 18
IEEE Consumer Electronics Magazine - May/June 2022 - 19
IEEE Consumer Electronics Magazine - May/June 2022 - 20
IEEE Consumer Electronics Magazine - May/June 2022 - 21
IEEE Consumer Electronics Magazine - May/June 2022 - 22
IEEE Consumer Electronics Magazine - May/June 2022 - 23
IEEE Consumer Electronics Magazine - May/June 2022 - 24
IEEE Consumer Electronics Magazine - May/June 2022 - 25
IEEE Consumer Electronics Magazine - May/June 2022 - 26
IEEE Consumer Electronics Magazine - May/June 2022 - 27
IEEE Consumer Electronics Magazine - May/June 2022 - 28
IEEE Consumer Electronics Magazine - May/June 2022 - 29
IEEE Consumer Electronics Magazine - May/June 2022 - 30
IEEE Consumer Electronics Magazine - May/June 2022 - 31
IEEE Consumer Electronics Magazine - May/June 2022 - 32
IEEE Consumer Electronics Magazine - May/June 2022 - 33
IEEE Consumer Electronics Magazine - May/June 2022 - 34
IEEE Consumer Electronics Magazine - May/June 2022 - 35
IEEE Consumer Electronics Magazine - May/June 2022 - 36
IEEE Consumer Electronics Magazine - May/June 2022 - 37
IEEE Consumer Electronics Magazine - May/June 2022 - 38
IEEE Consumer Electronics Magazine - May/June 2022 - 39
IEEE Consumer Electronics Magazine - May/June 2022 - 40
IEEE Consumer Electronics Magazine - May/June 2022 - 41
IEEE Consumer Electronics Magazine - May/June 2022 - 42
IEEE Consumer Electronics Magazine - May/June 2022 - 43
IEEE Consumer Electronics Magazine - May/June 2022 - 44
IEEE Consumer Electronics Magazine - May/June 2022 - 45
IEEE Consumer Electronics Magazine - May/June 2022 - 46
IEEE Consumer Electronics Magazine - May/June 2022 - 47
IEEE Consumer Electronics Magazine - May/June 2022 - 48
IEEE Consumer Electronics Magazine - May/June 2022 - 49
IEEE Consumer Electronics Magazine - May/June 2022 - 50
IEEE Consumer Electronics Magazine - May/June 2022 - 51
IEEE Consumer Electronics Magazine - May/June 2022 - 52
IEEE Consumer Electronics Magazine - May/June 2022 - 53
IEEE Consumer Electronics Magazine - May/June 2022 - 54
IEEE Consumer Electronics Magazine - May/June 2022 - 55
IEEE Consumer Electronics Magazine - May/June 2022 - 56
IEEE Consumer Electronics Magazine - May/June 2022 - 57
IEEE Consumer Electronics Magazine - May/June 2022 - 58
IEEE Consumer Electronics Magazine - May/June 2022 - 59
IEEE Consumer Electronics Magazine - May/June 2022 - 60
IEEE Consumer Electronics Magazine - May/June 2022 - 61
IEEE Consumer Electronics Magazine - May/June 2022 - 62
IEEE Consumer Electronics Magazine - May/June 2022 - 63
IEEE Consumer Electronics Magazine - May/June 2022 - 64
IEEE Consumer Electronics Magazine - May/June 2022 - 65
IEEE Consumer Electronics Magazine - May/June 2022 - 66
IEEE Consumer Electronics Magazine - May/June 2022 - 67
IEEE Consumer Electronics Magazine - May/June 2022 - 68
IEEE Consumer Electronics Magazine - May/June 2022 - 69
IEEE Consumer Electronics Magazine - May/June 2022 - 70
IEEE Consumer Electronics Magazine - May/June 2022 - 71
IEEE Consumer Electronics Magazine - May/June 2022 - 72
IEEE Consumer Electronics Magazine - May/June 2022 - 73
IEEE Consumer Electronics Magazine - May/June 2022 - 74
IEEE Consumer Electronics Magazine - May/June 2022 - 75
IEEE Consumer Electronics Magazine - May/June 2022 - 76
IEEE Consumer Electronics Magazine - May/June 2022 - 77
IEEE Consumer Electronics Magazine - May/June 2022 - 78
IEEE Consumer Electronics Magazine - May/June 2022 - 79
IEEE Consumer Electronics Magazine - May/June 2022 - 80
IEEE Consumer Electronics Magazine - May/June 2022 - 81
IEEE Consumer Electronics Magazine - May/June 2022 - 82
IEEE Consumer Electronics Magazine - May/June 2022 - 83
IEEE Consumer Electronics Magazine - May/June 2022 - 84
IEEE Consumer Electronics Magazine - May/June 2022 - 85
IEEE Consumer Electronics Magazine - May/June 2022 - 86
IEEE Consumer Electronics Magazine - May/June 2022 - 87
IEEE Consumer Electronics Magazine - May/June 2022 - 88
IEEE Consumer Electronics Magazine - May/June 2022 - 89
IEEE Consumer Electronics Magazine - May/June 2022 - 90
IEEE Consumer Electronics Magazine - May/June 2022 - 91
IEEE Consumer Electronics Magazine - May/June 2022 - 92
IEEE Consumer Electronics Magazine - May/June 2022 - 93
IEEE Consumer Electronics Magazine - May/June 2022 - 94
IEEE Consumer Electronics Magazine - May/June 2022 - 95
IEEE Consumer Electronics Magazine - May/June 2022 - 96
IEEE Consumer Electronics Magazine - May/June 2022 - 97
IEEE Consumer Electronics Magazine - May/June 2022 - 98
IEEE Consumer Electronics Magazine - May/June 2022 - 99
IEEE Consumer Electronics Magazine - May/June 2022 - 100
IEEE Consumer Electronics Magazine - May/June 2022 - 101
IEEE Consumer Electronics Magazine - May/June 2022 - 102
IEEE Consumer Electronics Magazine - May/June 2022 - 103
IEEE Consumer Electronics Magazine - May/June 2022 - 104
IEEE Consumer Electronics Magazine - May/June 2022 - Cover3
IEEE Consumer Electronics Magazine - May/June 2022 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20240102
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20231112
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20230910
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20230708
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20230506
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20230304
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20230102
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20221112
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20220910
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20220708
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20220506
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20220304
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20220102
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20211112
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20210910
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20210708
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20210506
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20210304
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202010
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202009
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202007
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202004
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202003
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202001
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201910
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201909
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201907
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201905
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201903
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201901
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201811
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201809
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201807
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201805
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201803
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_july2017
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_april2017
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_january2017
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_october2016
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_july2016
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_april2016
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_january2016
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_october2015
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_july2015
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_april2015
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_january2015
https://www.nxtbookmedia.com