An Optimized Machine Learning Model for the Detection of Man-in-the-Middle Attack in Mobile Edge Computing

被引:0
作者
Moila, Ramahlapane Lerato [1 ]
Velempini, Mthulisi [1 ]
机构
[1] Univ Limpopo, ZA-0727 Polokwane, South Africa
来源
2024 IST-AFRICA CONFERENCE | 2024年
关键词
Edge Computing; Man-in-the-Middle Attack; Machine Learning; Security Optimization;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Edge computing has gained significance in processing data near the source. However, its distributed and resource-constrained nature is prone to security challenges, particularly the Man-in-the-Middle (MitM) attacks. In response to these challenges, this study proposes an optimized Machine Learning model designed for edge computing, to enhance MitM attack detection. The research addresses security vulnerabilities in evolving technologies to harden security measures in resource-constrained environments, particularly in Africa and other developing regions. The proposed optimised model provides practical solutions to address security challenges unique to under-resourced regions by employing a more robust digital infrastructure. The optimized proposed model was compared to the Decision Tree and Random Forest algorithms to evaluate its effectiveness. The optimized model achieved the best performance, in accuracy, precision, recall, and F1 score, which demonstrates its effectiveness in addressing MitM attacks in edge computing. The study contributes to the mitigation of MitM attacks and underscores the significance of optimization in resource-constrained environments. In future, the research should further explore and enhance the security mechanisms for the dynamic and resource-constrained nature of developing countries. It should facilitate reliable and resilient operation of edge systems in the face of evolving security challenges. As edge computing continues to evolve, our findings contribute to the design of robust security mechanisms for, emerging threats in dynamic networks.
引用
收藏
页数:12
相关论文
共 18 条
  • [1] Cyber Threats Detection in Smart Environments Using SDN-Enabled DNN-LSTM Hybrid Framework
    Al Razib, Mohammad
    Javeed, Danish
    Khan, Muhammad Taimoor
    Alkanhel, Reem
    Muthanna, Mohammed Saleh Ali
    [J]. IEEE ACCESS, 2022, 10 : 53015 - 53026
  • [2] Dynamic Adaptation Attack Detection Model for a Distributed Multi-Access Edge Computing Smart City
    Alotaibi, Nouf Saeed
    Ahmed, Hassan Ibrahim
    Kamel, Samah Osama M.
    [J]. SENSORS, 2023, 23 (16)
  • [3] Alqurashi R., 2020, International Journal of Engineering Research and Technology, V13, P2736
  • [4] Email Security Issues, Tools, and Techniques Used in Investigation
    Altulaihan, Esra
    Alismail, Abrar
    Rahman, M. M. Hafizur
    Ibrahim, Adamu A.
    [J]. SUSTAINABILITY, 2023, 15 (13)
  • [5] Lightweight intrusion detection for edge computing networks using deep forest and bio-inspired algorithms
    Bangui, Hind
    Buhnova, Barbora
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2022, 100
  • [6] Das M. L., 2014, Appl. Comput. Inform., V10, P68
  • [7] Fakhouri H., 2023, ScienceDirect, V12, P1856
  • [8] Identifying Networks Vulnerable to IP Spoofing
    Fonseca, Osvaldo
    Cunha, Italo
    Fazzion, Elverton
    Meira Jr, Wagner
    da Silva Jr, Brivaldo Alves
    Ferreira, Ronaldo A.
    Katz-Bassett, Ethan
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (03): : 3170 - 3183
  • [9] Gaber T., 2022, Wireless Communication and Mobile Computing, V2023
  • [10] Hussain M., 2016, DNS protection against spoofing and poisoning attacks, DOI [10.1109/ICISCE.2016.279, DOI 10.1109/ICISCE.2016.279]