Mitigating Cyber Threats at the Network Edge

0Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The easy exploitation of IoT devices with limited security, compute and processing power has enabled hackers to carry out sophisticated attacks. Many research studies have highlighted the benefits of utilising artificial-intelligence based models in DDoS detection, but emphasis has not been placed on quantitative measurements of compute requirements for Machine Learning and Deep Learning algorithms used for DDoS detection, especially in the inference or detection stage. This research aims to fill the gap by performing quantitative measurement and comparison of various lightweight ML and DL algorithms, as well as design a lightweight collaborative framework capable of DDoS detection close to the source of the attack.

Cite

CITATION STYLE

APA

Sofoluwe, T., Tso, F. P., & Phillips, I. (2022). Mitigating Cyber Threats at the Network Edge. In Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC (pp. 776–777). Association for Computing Machinery. https://doi.org/10.1145/3517745.3563034

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free