Deep Learning for Secure Mobile Edge Computing in Cyber-Physical Transportation Systems

被引:61
作者
Chen, Yuanfang [1 ]
Zhang, Yan [3 ]
Maharjan, Sabita [3 ]
Alam, Muhammad [1 ]
Wu, Ting [2 ]
机构
[1] Hangzhou Dianzi Univ, Hangzhou, Zhejiang, Peoples R China
[2] Hangzhou Dianzi Univ, Sch Cyberspace, Hangzhou, Zhejiang, Peoples R China
[3] Univ Oslo, Oslo, Norway
来源
IEEE NETWORK | 2019年 / 33卷 / 04期
基金
中国国家自然科学基金;
关键词
D O I
10.1109/MNET.2019.1800458
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
MEC is able to be used to execute the compute-intensive applications on the edge of transportation networks directly. As a result, the communications traffic is substantially increased among the connected edge devices. Therewith, communications security is emerging as a serious problem, and as an important research issue of the communications security, active feature learning is studied in this article for actively detecting unknown attacks. A model based on deep learning is designed to learn attack features. This model uses unsupervised learning to accomplish the active learning process. In the evaluation, 10 datasets are used to conduct experiments. We compare our model with four other machine-learning-based algorithms, and the comparative results illustrate that our model has a 6 percent gain in accuracy.
引用
收藏
页码:36 / 41
页数:6
相关论文
共 15 条
[1]   Mobile Edge Computing: Opportunities, solutions, and challenges [J].
Ahmed, Ejaz ;
Rehmani, Mubashir Husain .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 70 :59-63
[2]  
Ali MZ, 2017, IEEE GLOB COMM CONF
[3]   A Survey of Random Forest Based Methods for Intrusion Detection Systems [J].
Alves Resende, Paulo Angelo ;
Drummond, Andre Costa .
ACM COMPUTING SURVEYS, 2018, 51 (03)
[4]  
[Anonymous], 2014, P NDSS
[5]  
He Y., 2019, WIRELESS COMMUN MOBI, V2019, P1, DOI [10.1155/2019/5864657, DOI 10.1155/2019/5864657]
[6]   Text classification based on deep belief network and softmax regression [J].
Jiang, Mingyang ;
Liang, Yanchun ;
Feng, Xiaoyue ;
Fan, Xiaojing ;
Pei, Zhili ;
Xue, Yu ;
Guan, Renchu .
NEURAL COMPUTING & APPLICATIONS, 2018, 29 (01) :61-70
[7]  
Li J., 2018, IEEE Transactions on Industrial Informatics
[8]  
Sahs J., 2012, 2012 European Intelligence and Security Informatics Conference (EISIC), P141, DOI 10.1109/EISIC.2012.34
[9]  
Sanz B, 2012, CONSUM COMM NETWORK, P149, DOI 10.1109/CCNC.2012.6181075
[10]   "Andromaly": a behavioral malware detection framework for android devices [J].
Shabtai, Asaf ;
Kanonov, Uri ;
Elovici, Yuval ;
Glezer, Chanan ;
Weiss, Yael .
JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2012, 38 (01) :161-190