Abstract
Due to the advancements of high-speed networks, mobile edge computing (MEC) has received significant attention to bring processing and storage resources in client’s proximity. The MEC is also a form of Edge Network or In-network computing where the resources are brought closer to the user end (edge) of the network while increasing QoE. On the other hand, the increase in the utilization of the internet of things (IoT) gadgets results in the generation of cybersecurity issues. In recent times, the advent of machine learning (ML) and deep learning (DL) techniques paves way in the detection of existing traffic conditions, data offloading, and cyberattacks in MEC. With this motivation, this study designs an effective deep learning based data offloading and cyberattack detection (DL-DOCAD) technique for MEC. The goal of the DL-DOCAD technique is to enhance the QoE in MEC systems. The proposed DL-DOCAD technique comprises traffic prediction, data offloading, and attack detection. The DL-DOCAD model applies a gated recurrent unit (GRU) based predictive model for traffic detection. In addition, an adaptive sampling cross entropy (ASCE) approach is employed for the maximization of throughput and decision making for offloading users. Moreover, the birds swarm algorithm based feed forward neural network (BSA-FFNN) model is used as a detector for cyberattacks in MEC. The utilization of BSA to appropriately tune the parameters of the FFNN helps to boost the classification performance to a maximum extent. A comprehensive set of simulations are performed and the resultant experimental values highlight the improved performance of the DL-DOCAD technique with the maximum detection accuracy of 0.992.
Similar content being viewed by others
Data availability statement
Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.
References
Elgendy, I., Muthanna, A., Hammoudeh, M., Shaiba, H.A., Unal, D., Khayyat, M.: Security-aware data offloading and resource allocation for MEC systems: a deep reinforcement learning (2021)
Alarood, A., Ababneh, N., Al-Khasawneh, M., Rawashdeh, M., Al-Omari, M.: IoTSteg: ensuring privacy and authenticity in internet of things networks using weighted pixels classification based image steganography. Cluster Comput. (2021). https://doi.org/10.1007/s10586-021-03383-4
Wan, S., Li, X., Xue, Y., Lin, W., Xu, X.: Efficient computation offloading for internet of vehicles in edge computing-assisted 5g networks. J. Supercomputing 76(4), 2518–2547 (2019)
Noor, T.H., Zeadally, S., Alfazi, A., Sheng, Q.Z.: Mobile cloud computing: Challenges and future research directions. J. Netw. Comput. Appl. 115, 70–85 (2018)
Mitsis, G., Apostolopoulos, P.A., Tsiropoulou, E.E., Papavassiliou, S.: Intelligent dynamic data offloading in a competitive mobile edge computing market. Future Internet 11(5), 118 (2019)
Roman, R., Lopez, J., Mambo, M.: Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Future Gener. Comput. Syst. 78, 680–698 (2018)
Nguyen, K.K., Hoang, D.T., Niyato, D., Wang, P., Nguyen, D. and Dutkiewicz, E.: Cyberattack detection in mobile cloud computing: a deep learning approach. In: 2018 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1–6. IEEE (2018)
Sahi, A., Lai, D., Li, Y., Diykh, M.: An efficient DDoS TCP flood attack detection and prevention system in a cloud environment. IEEE Access 5, 6036–6048 (2017)
LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521(7553), 436–444 (2015)
Gopalakrishnan, T., Ruby, D., Al-Turjman, F., Gupta, D., Pustokhina, I.V., Pustokhin, D.A., Shankar, K.: Deep learning enabled data offloading with cyber attack detection model in mobile edge computing systems. IEEE Access 8, 185938–185949 (2020)
Elgendy, I.A., Muthanna, A., Hammoudeh, M., Shaiba, H., Unal, D., Khayyat, M.: Advanced deep learning for resource allocation and security aware data offloading in industrial mobile edge computing. In: Big Data (2021)
AlShahrani, B.M.M.: Classification of cyber-attack using Adaboost regression classifier and securing the network. Turk. J. Comput. Math. Educ. (TURCOMAT) 12(10), 1215–1223 (2021)
Nur, F.N., Islam, S., Moon, N.N., Karim, A., Azam, S., Shanmugam, B.: Priority-based offloading and caching in mobile edge cloud. J. Commun. Softw. Syst. 15(2), 193–201 (2019)
Kaur, J., Kaur, S.: Novel trust evaluation using NSGA-III based adaptive neuro-fuzzy inference system. Cluster Comput. 24(3), 1781–1792 (2021). https://doi.org/10.1007/s10586-020-03218-8
Krishnaveni, S., Sivamohan, S., Sridhar, S.S., Prabakaran, S.: Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing. Cluster Comput. 24(3), 1761–1779 (2021). https://doi.org/10.1007/s10586-020-03222-y
Ali, H.M., Liu, J., Bukhari, S.A.C., Rauf, H.T.: Planning a secure and reliable IoT-enabled FOG-assisted computing infrastructure for healthcare. Cluster Comput. (2021). https://doi.org/10.1007/s10586-021-03389-y
Dai, Y., Xu, D., Maharjan, S., Qiao, G., Zhang, Y.: Artificial intelligence empowered edge computing and caching for internet of vehicles. IEEE Wirel. Commun. 26(3), 12–18 (2019)
Huang, L., Bi, S., Zhang, Y.J.: Deep reinforcement learning for online computation offloading in wireless powered mobile-edge computing networks. IEEE Trans. Mob. Comput. 19(11), 2581–2593 (2019)
Lu, H., He, X., Du, M., Ruan, X., Sun, Y., Wang, K.: Edge qoe: computation offloading with deep reinforcement learning for internet of things. IEEE Internet Things J. 7(10), 9255–9265 (2020)
Jeong, M.H., Lee, T.Y., Jeon, S.B., Youm, M.: Highway speed prediction using gated recurrent unit neural networks. Appl. Sci. 11(7), 3059 (2021)
Zhu, S., Xu, W., Fan, L., Wang, K., Karagiannidis, G.K.: A novel cross entropy approach for offloading learning in mobile edge computing. IEEE Wirel. Commun. Lett. 9(3), 402–405 (2020)
Wu, H., Zhou, Y., Luo, Q., Basset, M.A.: Training feedforward neural networks using symbiotic organisms search algorithm. Comput. Intell. Neurosci. (2016)
Meng, X.B., Gao, X.Z., Lu, L., Liu, Y., Zhang, H.: A new bio-inspired optimisation algorithm: bird swarm algorithm. J. Exp. Theor. Artif. Intell. 28(4), 673–687 (2016)
Deep, S., Zheng, X., Jolfaei, A., Yu, D., Ostovari, P., Bashir, A.K.: A survey of security and privacy issues in the internet of things from the layered context. In: Transactions on Emerging Telecommunications Technologies. Wiley (2020)
Morgan, G., Srivastava, G., Muthu, B.A., Baskar, S., Shakeel, P.M., Hsu, C.H., Bashir, A.K., Kumar, P.M.: A response-aware traffic offloading scheme using regression machine learning for user-centric large-scale internet of things. IEEE Internet Things J. 8(5), 3360–3368 (2021)
Bashir, A.K., Arul, R., Jayaram, R., Arulappan, A., Prathiba, S.B.: An optimal multitier resource allocation of cloud RAN in 5G using machine learning. In: Transactions on Emerging Telecommunications Technologies. Wiley (2019)
Manne, S., Lydia, E.L., Pustokhina, I.V., et al.: An intelligent energy management and traffic predictive model for autonomous vehicle systems. Soft Comput. (2021). https://doi.org/10.1007/s00500-021-05614-7
Mohanty, S.N., Lydia, E.L., Elhoseny, M., Al Otaibi, M.M.G., Shankar, K.: Deep learning with LSTM based distributed data mining model for energy efficient wireless sensor networks. Phys. Commun. 40, 101097 (2020)
Acknowledgements
The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number (RGP2/23/42). www.kku.edu.sa. This research was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fast-track Research Funding Program.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest. The manuscript was written through contributions of all authors. All authors have given approval to the final version of the manuscript.
Consent to participate
Not applicable.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Hilal, A.M., Alohali, M.A., Al-Wesabi, F.N. et al. Enhancing quality of experience in mobile edge computing using deep learning based data offloading and cyberattack detection technique. Cluster Comput 26, 59–70 (2023). https://doi.org/10.1007/s10586-021-03401-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-021-03401-5