Result: Developing an Innovative Network Security Attack Detection Model Through Artificial Intelligence and Edge Computing.

Title:
Developing an Innovative Network Security Attack Detection Model Through Artificial Intelligence and Edge Computing.
Authors:
Source:
SPIN (2010-3247); Jun2025, Vol. 15 Issue 2, p1-9, 9p
Database:
Complementary Index

Further Information

Securing a network at its edge, that is, the location where a user creates and stores data within a larger network is defined as edge security. It is essential to have this type of perimeter security in edge computing (EC) settings. One of the biggest challenges in EC is establishing and sustaining dependable network connectivity at the edge. This study presents an innovative strategy to improve network security by combining EC and artificial intelligence (AI). With the explosion of Internet of Things (IoT) devices and the developing complexity of cyber threats, conventional security assessments are becoming insufficient. In this study, we suggested a novel water wave-optimized flexible recurrent neural network (WWO-FRNN) for security attack detection on EC. The HTTP DATASET CSIC 2010 was gathered for this study and used for intrusion detection. The data were preprocessed utilizing min–max normalization to transmogrify numeric data into a communal scale. Next, the feature is extracted for dimensional reduction using principle component analysis (PLA). The proposed method is implemented using Python software. WWO-FRNN is compared to the other traditional algorithms. The result shows the proposed methods achieved high accuracy, precision, recall, and F1-score. The study demonstrates its effectiveness against different types of attacks, improving edge network security for IoT applications. [ABSTRACT FROM AUTHOR]

Copyright of SPIN (2010-3247) is the property of World Scientific Publishing Company and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)