2
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      An Edge IDS Based on Biological Immune Principles for Dynamic Threat Detection

      1 , 2 , 3 , 4
      Wireless Communications and Mobile Computing
      Hindawi Limited

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Edge computing solves such questions as the massive multisource data and resource consuming computing tasks in edge devices. Some new security problems especially the data security and privacy issues have been introduced into the edge computing scenario. Through analyzing the biological immune principles, a novel idea for the problem of intrusion detection in edge computing is provided. Specifically, an edge intrusion detection system (Edge IDS) with a distributed structure, which has the characteristics of an imprecise model, self-learning, and strong interactivity, is constructed in a systematic way inspired by the biological immune principles. Moreover, a newly proposed gene immune detection algorithm (GIDA) is designed. In order that Edge IDS can deal with the dynamic data problem efficiently, the key functional components such as the remaining gene, niching strategy, and extracting vaccine are embedded into the GIDA algorithm. Furthermore, extensive simulation experiments are conducted, and the results show that the proposed Edge IDS can be adapted to the domain of edge computing with comparative performance advantages.

          Related collections

          Most cited references17

          • Record: found
          • Abstract: not found
          • Article: not found

          Mobile Edge Computing: A Survey on Architecture and Computation Offloading

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            A Comprehensive Survey on Fog Computing: State-of-the-Art and Research Challenges

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              The Promise of Edge Computing

                Bookmark

                Author and article information

                Contributors
                Journal
                Wireless Communications and Mobile Computing
                Wireless Communications and Mobile Computing
                Hindawi Limited
                1530-8669
                1530-8677
                August 17 2020
                August 17 2020
                : 2020
                : 1-15
                Affiliations
                [1 ]School of Computer and Control Engineering, Yantai University, Yantai 264005, China
                [2 ]Department of Economics and Management, Weifang University of Science and Technology, Weifang 262700, China
                [3 ]School of Computer Science and Technology, Harbin Institute of Technology, Weihai 264209, China
                [4 ]Research Institute of Cyberspace Security, Harbin Institute of Technology, Weihai 264209, China
                Article
                10.1155/2020/8811035
                6c1bb5da-6f0a-423f-847d-a37ed3f54944
                © 2020

                http://creativecommons.org/licenses/by/4.0/

                History

                Comments

                Comment on this article