A scalable distributed machine learning approach for attack detection in edge computing environments

Abstract The ever-increasing number of IoT applications and cyber–physical services is introducing significant challenges associated to their cyber-security. Due to the constrained nature of the involved devices, some heavier computational tasks, such as deep traffic inspection and classification, essential for implementing automatic attack detection systems, are moved on specialized “edge” devices, in order to distribute the processing intelligence near to the data sources. These edge devices are mainly capable of effectively running pre-built classification models but have not enough storage and processing capabilities to build and upgrade such models from huge volumes of field training data, imposing a serious barrier to the deployment of such solutions. This work leverages the flexibility of cloud-based architectures, together with the recent advancements in the area of large-scale machine learning for shifting the more computationally-expensive and storage-demanding operations to the cloud in order to benefit of edge computing capabilities only for effectively performing traffic classification based on sophisticated Extreme Learning Machines models that are pre-built over the cloud.

[1]  Francesco Palmieri,et al.  An uncertainty-managing batch relevance-based approach to network anomaly detection , 2015, Appl. Soft Comput..

[2]  Jun Zhang,et al.  The verifiable secure schemes for resisting attacks in cloud deduplication services , 2016 .

[3]  Tianbo Lu,et al.  Analysis of security threats and vulnerability for cyber-physical systems , 2013, Proceedings of 2013 3rd International Conference on Computer Science and Network Technology.

[4]  Daisuke Mashima,et al.  Towards Secure Demand-Response Systems on the Cloud , 2014, 2014 IEEE International Conference on Distributed Computing in Sensor Systems.

[5]  Ahmad-Reza Sadeghi,et al.  Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[6]  Xiaoqing Frank Liu,et al.  Security Requirements Analysis, Specification, Prioritization and Policy Development in Cyber-Physical Systems , 2011, 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement - Companion.

[7]  José L. Martínez Lastra,et al.  Orchestration of service-oriented manufacturing processes , 2005, 2005 IEEE Conference on Emerging Technologies and Factory Automation.

[8]  Wojciech Czarnecki,et al.  Weighted Tanimoto Extreme Learning Machine with Case Study in Drug Discovery , 2015, IEEE Computational Intelligence Magazine.

[9]  Madoka Yuriyama,et al.  Integrated cloud computing environment with IT resources and sensor devices , 2011, Int. J. Space Based Situated Comput..

[10]  Yenumula B. Reddy,et al.  Cloud-Based Cyber Physical Systems: Design Challenges and Security Needs , 2014, 2014 10th International Conference on Mobile Ad-hoc and Sensor Networks.

[11]  Swapnaja Hiray,et al.  Context-Aware Middleware in Cyber Physical Cloud (CAMCPC) , 2013, 2013 International Conference on Cloud & Ubiquitous Computing & Emerging Technologies.

[12]  Francesco Palmieri,et al.  Network anomaly detection through nonlinear analysis , 2010, Comput. Secur..

[13]  Jemal H. Abawajy,et al.  Detecting and Mitigating HX-DoS Attacks against Cloud Web Services , 2012, 2012 15th International Conference on Network-Based Information Systems.

[14]  Alfredo De Santis,et al.  Network anomaly detection with the restricted Boltzmann machine , 2013, Neurocomputing.

[15]  Ehab Al-Shaer,et al.  A Noninvasive Threat Analyzer for Advanced Metering Infrastructure in Smart Grid , 2013, IEEE Transactions on Smart Grid.

[16]  Alejandro Zunino,et al.  An empirical comparison of botnet detection methods , 2014, Comput. Secur..

[17]  Meikang Qiu,et al.  Health-CPS: Healthcare Cyber-Physical System Assisted by Cloud and Big Data , 2017, IEEE Systems Journal.

[18]  Nobuo Funabiki,et al.  Classification extension based on IoT-big data analytic for smart environment monitoring and analytic in real-time system , 2017, Int. J. Space Based Situated Comput..

[19]  Ing-Ray Chen,et al.  A survey of intrusion detection techniques for cyber-physical systems , 2014, ACM Comput. Surv..

[20]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[21]  Luis E. Gonzalez Moctezuma,et al.  Security in Cloud-Based Cyber-Physical Systems , 2015, 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC).

[22]  Ana R. Cavalli,et al.  An Effective Attack Detection Approach in Wireless Mesh Networks , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.