Skip to main content

Advertisement

Log in

Enhancing quality of experience in mobile edge computing using deep learning based data offloading and cyberattack detection technique

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Due to the advancements of high-speed networks, mobile edge computing (MEC) has received significant attention to bring processing and storage resources in client’s proximity. The MEC is also a form of Edge Network or In-network computing where the resources are brought closer to the user end (edge) of the network while increasing QoE. On the other hand, the increase in the utilization of the internet of things (IoT) gadgets results in the generation of cybersecurity issues. In recent times, the advent of machine learning (ML) and deep learning (DL) techniques paves way in the detection of existing traffic conditions, data offloading, and cyberattacks in MEC. With this motivation, this study designs an effective deep learning based data offloading and cyberattack detection (DL-DOCAD) technique for MEC. The goal of the DL-DOCAD technique is to enhance the QoE in MEC systems. The proposed DL-DOCAD technique comprises traffic prediction, data offloading, and attack detection. The DL-DOCAD model applies a gated recurrent unit (GRU) based predictive model for traffic detection. In addition, an adaptive sampling cross entropy (ASCE) approach is employed for the maximization of throughput and decision making for offloading users. Moreover, the birds swarm algorithm based feed forward neural network (BSA-FFNN) model is used as a detector for cyberattacks in MEC. The utilization of BSA to appropriately tune the parameters of the FFNN helps to boost the classification performance to a maximum extent. A comprehensive set of simulations are performed and the resultant experimental values highlight the improved performance of the DL-DOCAD technique with the maximum detection accuracy of 0.992.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data availability statement

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

References

  1. Elgendy, I., Muthanna, A., Hammoudeh, M., Shaiba, H.A., Unal, D., Khayyat, M.: Security-aware data offloading and resource allocation for MEC systems: a deep reinforcement learning (2021)

  2. Alarood, A., Ababneh, N., Al-Khasawneh, M., Rawashdeh, M., Al-Omari, M.: IoTSteg: ensuring privacy and authenticity in internet of things networks using weighted pixels classification based image steganography. Cluster Comput. (2021). https://doi.org/10.1007/s10586-021-03383-4

    Article  Google Scholar 

  3. Wan, S., Li, X., Xue, Y., Lin, W., Xu, X.: Efficient computation offloading for internet of vehicles in edge computing-assisted 5g networks. J. Supercomputing 76(4), 2518–2547 (2019)

    Article  Google Scholar 

  4. Noor, T.H., Zeadally, S., Alfazi, A., Sheng, Q.Z.: Mobile cloud computing: Challenges and future research directions. J. Netw. Comput. Appl. 115, 70–85 (2018)

    Article  Google Scholar 

  5. Mitsis, G., Apostolopoulos, P.A., Tsiropoulou, E.E., Papavassiliou, S.: Intelligent dynamic data offloading in a competitive mobile edge computing market. Future Internet 11(5), 118 (2019)

    Article  Google Scholar 

  6. Roman, R., Lopez, J., Mambo, M.: Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Future Gener. Comput. Syst. 78, 680–698 (2018)

    Article  Google Scholar 

  7. Nguyen, K.K., Hoang, D.T., Niyato, D., Wang, P., Nguyen, D. and Dutkiewicz, E.: Cyberattack detection in mobile cloud computing: a deep learning approach. In: 2018 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1–6. IEEE (2018)

  8. Sahi, A., Lai, D., Li, Y., Diykh, M.: An efficient DDoS TCP flood attack detection and prevention system in a cloud environment. IEEE Access 5, 6036–6048 (2017)

    Google Scholar 

  9. LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521(7553), 436–444 (2015)

    Article  Google Scholar 

  10. Gopalakrishnan, T., Ruby, D., Al-Turjman, F., Gupta, D., Pustokhina, I.V., Pustokhin, D.A., Shankar, K.: Deep learning enabled data offloading with cyber attack detection model in mobile edge computing systems. IEEE Access 8, 185938–185949 (2020)

    Article  Google Scholar 

  11. Elgendy, I.A., Muthanna, A., Hammoudeh, M., Shaiba, H., Unal, D., Khayyat, M.: Advanced deep learning for resource allocation and security aware data offloading in industrial mobile edge computing. In: Big Data (2021)

  12. AlShahrani, B.M.M.: Classification of cyber-attack using Adaboost regression classifier and securing the network. Turk. J. Comput. Math. Educ. (TURCOMAT) 12(10), 1215–1223 (2021)

    Google Scholar 

  13. Nur, F.N., Islam, S., Moon, N.N., Karim, A., Azam, S., Shanmugam, B.: Priority-based offloading and caching in mobile edge cloud. J. Commun. Softw. Syst. 15(2), 193–201 (2019)

    Google Scholar 

  14. Kaur, J., Kaur, S.: Novel trust evaluation using NSGA-III based adaptive neuro-fuzzy inference system. Cluster Comput. 24(3), 1781–1792 (2021). https://doi.org/10.1007/s10586-020-03218-8

    Article  MathSciNet  Google Scholar 

  15. Krishnaveni, S., Sivamohan, S., Sridhar, S.S., Prabakaran, S.: Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing. Cluster Comput. 24(3), 1761–1779 (2021). https://doi.org/10.1007/s10586-020-03222-y

    Article  Google Scholar 

  16. Ali, H.M., Liu, J., Bukhari, S.A.C., Rauf, H.T.: Planning a secure and reliable IoT-enabled FOG-assisted computing infrastructure for healthcare. Cluster Comput. (2021). https://doi.org/10.1007/s10586-021-03389-y

    Article  Google Scholar 

  17. Dai, Y., Xu, D., Maharjan, S., Qiao, G., Zhang, Y.: Artificial intelligence empowered edge computing and caching for internet of vehicles. IEEE Wirel. Commun. 26(3), 12–18 (2019)

    Article  Google Scholar 

  18. Huang, L., Bi, S., Zhang, Y.J.: Deep reinforcement learning for online computation offloading in wireless powered mobile-edge computing networks. IEEE Trans. Mob. Comput. 19(11), 2581–2593 (2019)

    Article  Google Scholar 

  19. Lu, H., He, X., Du, M., Ruan, X., Sun, Y., Wang, K.: Edge qoe: computation offloading with deep reinforcement learning for internet of things. IEEE Internet Things J. 7(10), 9255–9265 (2020)

    Article  Google Scholar 

  20. Jeong, M.H., Lee, T.Y., Jeon, S.B., Youm, M.: Highway speed prediction using gated recurrent unit neural networks. Appl. Sci. 11(7), 3059 (2021)

    Article  Google Scholar 

  21. Zhu, S., Xu, W., Fan, L., Wang, K., Karagiannidis, G.K.: A novel cross entropy approach for offloading learning in mobile edge computing. IEEE Wirel. Commun. Lett. 9(3), 402–405 (2020)

    Article  Google Scholar 

  22. Wu, H., Zhou, Y., Luo, Q., Basset, M.A.: Training feedforward neural networks using symbiotic organisms search algorithm. Comput. Intell. Neurosci. (2016)

  23. Meng, X.B., Gao, X.Z., Lu, L., Liu, Y., Zhang, H.: A new bio-inspired optimisation algorithm: bird swarm algorithm. J. Exp. Theor. Artif. Intell. 28(4), 673–687 (2016)

    Article  Google Scholar 

  24. Deep, S., Zheng, X., Jolfaei, A., Yu, D., Ostovari, P., Bashir, A.K.: A survey of security and privacy issues in the internet of things from the layered context. In: Transactions on Emerging Telecommunications Technologies. Wiley (2020)

  25. Morgan, G., Srivastava, G., Muthu, B.A., Baskar, S., Shakeel, P.M., Hsu, C.H., Bashir, A.K., Kumar, P.M.: A response-aware traffic offloading scheme using regression machine learning for user-centric large-scale internet of things. IEEE Internet Things J. 8(5), 3360–3368 (2021)

    Article  Google Scholar 

  26. Bashir, A.K., Arul, R., Jayaram, R., Arulappan, A., Prathiba, S.B.: An optimal multitier resource allocation of cloud RAN in 5G using machine learning. In: Transactions on Emerging Telecommunications Technologies. Wiley (2019)

  27. Manne, S., Lydia, E.L., Pustokhina, I.V., et al.: An intelligent energy management and traffic predictive model for autonomous vehicle systems. Soft Comput. (2021). https://doi.org/10.1007/s00500-021-05614-7

    Article  Google Scholar 

  28. Mohanty, S.N., Lydia, E.L., Elhoseny, M., Al Otaibi, M.M.G., Shankar, K.: Deep learning with LSTM based distributed data mining model for energy efficient wireless sensor networks. Phys. Commun. 40, 101097 (2020)

    Article  Google Scholar 

Download references

Acknowledgements

The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number (RGP2/23/42). www.kku.edu.sa. This research was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fast-track Research Funding Program.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anwer Mustafa Hilal.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest. The manuscript was written through contributions of all authors. All authors have given approval to the final version of the manuscript.

Consent to participate

Not applicable.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hilal, A.M., Alohali, M.A., Al-Wesabi, F.N. et al. Enhancing quality of experience in mobile edge computing using deep learning based data offloading and cyberattack detection technique. Cluster Comput 26, 59–70 (2023). https://doi.org/10.1007/s10586-021-03401-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-021-03401-5

Keywords

Navigation