Umeå University's logo

umu.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Machine learning for anomaly detection in edge clouds
Umeå University, Faculty of Science and Technology, Department of Computing Science. (Autonomous Distributed Systems Lab)
2024 (English)Doctoral thesis, comprehensive summary (Other academic)Alternative title
Maskininlärning för anomalidetektion i kantmoln (Swedish)
Abstract [en]

Edge clouds have emerged as an essential architecture, revolutionizing data processing and analysis by bringing computational capabilities closer to data sources and end-users at the edge of the network. Anomaly detection is crucial in these settings to maintain the reliability and security of edge-based systems and applications despite limited computational resources. It plays a vital role in identifying unexpected patterns, which could indicate security threats or performance issues within the decentralized and real-time nature of edge cloud environments. For example, in critical edge applications like autonomous vehicles, augmented reality, and smart healthcare, anomaly detection ensures the consistent and secure operation of these systems, promptly detecting anomalies that might compromise safety, performance, or user experience. However, the adoption of anomaly detection within edge cloud environments poses numerous challenges.

This thesis aims to contribute by addressing the problem of anomaly detection in edge cloud environments. Through a comprehensive exploration of anomaly detection methods, leveraging machine learning techniques and innovative approaches, this research aims to enhance the efficiency and accuracy of detecting anomalies in edge cloud environments. The proposed methods intend to overcome the challenges posed by resource limitations, the lack of labeled data specific to edge clouds, and the need for accurate detection of anomalies. By focusing on machine learning approaches like transfer learning, knowledge distillation, reinforcement learning, deep sequential models, and deep ensemble learning, this thesis endeavors to establish efficient and accurate anomaly detection systems specific for edge cloud environments.

The results demonstrate the improvements achieved by employing machine learning methods for anomaly detection in edge clouds. Extensive testing and evaluation in real-world edge environments show how machine learning-driven anomaly detection systems improve identification of anomalies in edge clouds. The results highlight the capability of these methods to achieve a reasonable trade-off between accuracy and computational efficiency. These findings illustrate how machine learning-based anomaly detection approaches contribute to building resilient and secure edge-based systems.

Place, publisher, year, edition, pages
Umeå: Umeå University, 2024. , p. 57
Series
Report / UMINF, ISSN 0348-0542 ; 24.02
Keywords [en]
Edge Clouds, Anomaly Detection, Machine Learning
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:umu:diva-220246ISBN: 9789180702928 (electronic)ISBN: 9789180702911 (print)OAI: oai:DiVA.org:umu-220246DiVA, id: diva2:1832894
Public defence
2024-02-23, SAM.A.280, Social Sciences Building, Umeå, 09:15 (English)
Opponent
Supervisors
Funder
Umeå UniversityWallenberg AI, Autonomous Systems and Software Program (WASP)Available from: 2024-02-02 Created: 2024-01-30 Last updated: 2024-07-02Bibliographically approved
List of papers
1. Detection of VSI-DDoS Attacks on the Edge: A Sequential Modeling Approach
Open this publication in new window or tab >>Detection of VSI-DDoS Attacks on the Edge: A Sequential Modeling Approach
2021 (English)In: ARES 2021: The 16th International Conference on Availability, Reliability and Security, Association for Computing Machinery (ACM), 2021, article id 20Conference paper, Published paper (Refereed)
Abstract [en]

The advent of crucial areas such as smart healthcare and autonomous transportation, bring in new requirements on the computing infrastructure, including higher demand for real-time processing capability with minimized latency and maximized availability. The traditional cloud infrastructure has several deficiencies when meeting such requirements due to its centralization. Edge clouds seems to be the solution for the aforementioned requirements, in which the resources are much closer to the edge devices and provides local computing power and high Quality of Service (QoS). However, there are still security issues that endanger the functionality of edge clouds. One of the recent types of such issues is Very Short Intermittent Distributed Denial of Service (VSI-DDoS) which is a new category of low-rate DDoS attacks that targets both small and large-scale web services. This attack generates very short bursts of HTTP request intermittently towards target services to encounter unexpected degradation of QoS at edge clouds. In this paper, we formulate the problem with a sequence modeling approach to address short intermittent intervals of DDoS attacks during the rendering of services on edge clouds using Long Short-Term Memory (LSTM) with local attention. The proposed approach ameliorates the detection performance by learning from the most important discernible patterns of the sequence data rather than considering complete historical information and hence achieves a more sophisticated model approximation. Experimental results confirm the feasibility of the proposed approach for VSI-DDoS detection on edge clouds and it achieves 2% more accuracy when compared with baseline methods.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2021
Series
ACM International Conference Proceeding Series (ICPS)
Keywords
Anomaly detection, Deep learning, Edge clouds, Sequential modeling, VSI-DDoS detection
National Category
Computer Systems Computer Sciences
Identifiers
urn:nbn:se:umu:diva-187029 (URN)10.1145/3465481.3465757 (DOI)000749539200016 ()2-s2.0-85113227922 (Scopus ID)978-1-4503-9051-4 (ISBN)
Conference
ARES 2021, The 16th International Conference on Availability, Reliability and Security, online, August 17-20, 2021
Funder
Wallenberg AI, Autonomous Systems and Software Program (WASP)Knut and Alice Wallenberg FoundationThe Swedish Foundation for International Cooperation in Research and Higher Education (STINT)
Available from: 2021-08-31 Created: 2021-08-31 Last updated: 2024-07-02Bibliographically approved
2. Dela: a deep ensemble learning approach for cross-layer VSI-DDoS detection on the edge
Open this publication in new window or tab >>Dela: a deep ensemble learning approach for cross-layer VSI-DDoS detection on the edge
2022 (English)Conference paper, Published paper (Refereed)
Abstract [en]

Web application services and networks become a major target of low-rate Distributed Denial of Service (DDoS) attacks such as Very Short Intermittent DDoS (VSI-DDoS). These threats exploit the TCP congestion control mechanism to cause transient resource outage and impute delays for legitimate users’ requests, while they bypass the secure systems. Besides that, cross-layer VSI-DDoS attacks, where the performed attacks are towards the different layers of the edge cloud infrastructures, are able to cause violation of customers’ Service-Level Agreements (SLAs) with less visible behavioral patterns. In this work, we propose a novel Deep Ensemble Learning Approach named DELA for detection of cross-layer VSI-DDoS on the edge cloud. This approach is developed based on Long Short-Term Memory (LSTM), ensemble learning, and a new voting mechanism based on Feed-Forward Neural Network (FFNN). In addition, it employs a novel training and detection algorithm to combat such attacks in web services and networks. The model shows improved results due to the utilization of historical information in decision- making and also the usage of neural network as aggregator instead of a static threshold-based aggregation. Moreover, we propose a novel overlapped data chunking algorithm that is able to ameliorate the detection performance. Furthermore, the evaluation of DELA shows its superior performance over our testbed and benchmark datasets. Accordingly, DELA achieves on average 4.88% higher F 1 score compared to state-of-the-art methods.

Place, publisher, year, edition, pages
IEEE, 2022
Series
Proceedings of the International Conference on Distributed Computing Systems, E-ISSN 2575-8411
Keywords
Ensemble learning, Sequential modeling, VSI-DDoS detection, Edge clouds, Overlapped data chunking
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:umu:diva-200727 (URN)10.1109/ICDCS54860.2022.00114 (DOI)000877026100105 ()2-s2.0-85140878827 (Scopus ID)978-1-6654-7177-0 (ISBN)
Conference
ICDCS 2022, 42nd IEEE International Conference on Distributed Computing Systems, Bologna, Italy, July 10-13, 2022
Funder
Wallenberg AI, Autonomous Systems and Software Program (WASP)Knut and Alice Wallenberg FoundationThe Swedish Foundation for International Cooperation in Research and Higher Education (STINT)
Available from: 2022-11-02 Created: 2022-11-02 Last updated: 2024-07-02Bibliographically approved
3. Anomaly detection and resolution on the edge: solutions and future directions
Open this publication in new window or tab >>Anomaly detection and resolution on the edge: solutions and future directions
2023 (English)In: 2023 IEEE International Conference on Service-Oriented System Engineering (SOSE): Proceedings, IEEE, 2023, p. 227-238Conference paper, Published paper (Refereed)
Abstract [en]

Anomaly detection and resolution are crucial in edge clouds to ensure that distributed systems operate reliably and securely. This survey presents a comprehensive overview of anomaly detection and resolution strategies specifically designed for edge cloud environments, exploring their strengths, limitations, and applicability in different scenarios. It explores the unique challenges and characteristics of edge cloud systems, providing an in-depth analysis of existing works and tools. Evaluation metrics and datasets used by different methods are examined to provide insights into assessing the performance and efficacy of anomaly detection and resolution approaches. The paper concludes by identifying open challenges, future research directions, and offering practical recommendations, making it a valuable resource for researchers and practitioners involved in enhancing the reliability and security of edge cloud systems.

Place, publisher, year, edition, pages
IEEE, 2023
Series
Proceedings (IEEE International Symposium on Service-Oriented System Engineering), ISSN 2640-8228, E-ISSN 2642-6587
Keywords
Anomaly detection, Anomaly resolution, Edge clouds, Performance anomalies, Security anomalies
National Category
Computer Sciences Computer Systems
Identifiers
urn:nbn:se:umu:diva-216214 (URN)10.1109/SOSE58276.2023.00034 (DOI)001084635000028 ()2-s2.0-85174902690 (Scopus ID)979-8-3503-2239-2 (ISBN)979-8-3503-2240-8 (ISBN)
Conference
17th IEEE International Conference on Service-Oriented System Engineering, SOSE 2023, Athens, Greece, July 17-20, 2023
Funder
Wallenberg AI, Autonomous Systems and Software Program (WASP)EU, Horizon Europe, 101092711
Available from: 2023-11-06 Created: 2023-11-06 Last updated: 2025-04-24Bibliographically approved
4. Unified identification of anomalies on the edge: a hybrid sequential PGM approach
Open this publication in new window or tab >>Unified identification of anomalies on the edge: a hybrid sequential PGM approach
2023 (English)In: 2023 IEEE 22nd international conference on trust, security and privacy in computing and communications (TrustCom), IEEE, 2023, p. 595-604Conference paper, Published paper (Refereed)
Abstract [en]

Edge cloud resources, just as many other computing resources, are prone to both performance and security anomalies due to their decentralized nature and real-time requirements for processing of data. Their behaviour initially observed as anomalous may, however, in many cases be rather generic and hard to detect. To be able to address such anomalies, it is instrumental to determine whether the anomaly is a "Security" threat or only a "Performance" concern. Therefore, in this paper, we develop an anomaly detection model capable of distinguishing between security and performance anomalies. The model is based on sequential modeling and Probabilistic Graphical Model (PGM), which leverage historical information and dependencies between previous predictions to classify future anomalies accurately. The evaluation of our proposed model shows its superior performance on our testbed and benchmark datasets. Accordingly, the model achieves an average 5%, and 3% higher F1 score compared to state-of-the-art methods in binary and multi-label anomaly detection cases, respectively. Moreover, our testing time analysis demonstrates the ability of the proposed model in early detection of such anomalies on the edge cloud.

Place, publisher, year, edition, pages
IEEE, 2023
Series
IEEE International Conference on Trust, Security and Privacy in Computing and Communications, ISSN 2324-898X, E-ISSN 2324-9013
Keywords
Edge clouds, Anomaly detection, Sequential modeling, Probabilistic Graphical Model
National Category
Computer Sciences
Identifiers
urn:nbn:se:umu:diva-220242 (URN)10.1109/TrustCom60117.2023.00092 (DOI)001239879400069 ()2-s2.0-85195522322 (Scopus ID)9798350381993 (ISBN)9798350382006 (ISBN)
Conference
22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2023, Exeter, United Kingdom, November 1-3, 2023
Funder
Umeå UniversityWallenberg AI, Autonomous Systems and Software Program (WASP)
Note

Originally included in thesis in manuscript form.

Available from: 2024-01-30 Created: 2024-01-30 Last updated: 2025-04-24Bibliographically approved
5. Efficient anomaly detection for edge clouds: mitigating data and resource constraints
Open this publication in new window or tab >>Efficient anomaly detection for edge clouds: mitigating data and resource constraints
2024 (English)Manuscript (preprint) (Other academic)
National Category
Computer Sciences
Identifiers
urn:nbn:se:umu:diva-220244 (URN)
Funder
Umeå UniversityWallenberg AI, Autonomous Systems and Software Program (WASP)
Available from: 2024-01-30 Created: 2024-01-30 Last updated: 2024-07-02
6. Reinforced model selection for resource efficient anomaly detection in edge clouds
Open this publication in new window or tab >>Reinforced model selection for resource efficient anomaly detection in edge clouds
(English)Manuscript (preprint) (Other academic)
National Category
Computer Sciences
Identifiers
urn:nbn:se:umu:diva-220245 (URN)
Funder
Wallenberg AI, Autonomous Systems and Software Program (WASP)Umeå University
Available from: 2024-01-30 Created: 2024-01-30 Last updated: 2024-07-02

Open Access in DiVA

fulltext(2296 kB)1389 downloads
File information
File name FULLTEXT01.pdfFile size 2296 kBChecksum SHA-512
c5312c189bdaf0d8029b885f1963f761f65ff8a7360a65bbf59118aa4aabb4901dc88d6c7adcb24aa76327d700ff6d8ebdaa5f08219bc14ff586019e669aa2c3
Type fulltextMimetype application/pdf
spikblad(116 kB)69 downloads
File information
File name SPIKBLAD01.pdfFile size 116 kBChecksum SHA-512
265b933a1cd7dedf03228fbba4a07b8fdef16f832f88b7b30154115b9826ab80b4c2a9e032664ac717d444738e2230871ff21e4aecf634468c9024e57e6e7f7b
Type spikbladMimetype application/pdf

Authority records

Forough, Javad

Search in DiVA

By author/editor
Forough, Javad
By organisation
Department of Computing Science
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 1391 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 1723 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf