Umeå University's logo

umu.sePublications
Operational message
There are currently operational disruptions. Troubleshooting is in progress.
Change search
Link to record
Permanent link

Direct link
Forough, Javad
Publications (10 of 10) Show all publications
Forough, J., Bhuyan, M. & Elmroth, E. (2026). Reinforced model selection for resource efficient anomaly detection in edge clouds. Future Generation Computer Systems, 176, Article ID 108161.
Open this publication in new window or tab >>Reinforced model selection for resource efficient anomaly detection in edge clouds
2026 (English)In: Future Generation Computer Systems, ISSN 0167-739X, E-ISSN 1872-7115, Vol. 176, article id 108161Article in journal (Refereed) Published
Abstract [en]

Web application services and networks encounter a broad range of security and performance anomalies, necessitating sophisticated detection strategies. However, performing anomaly detection in edge cloud environments, often constrained by limited resources, presents significant computational challenges and demands minimized detection time for real-time response. In this paper, we propose a model selection approach for resource efficient anomaly detection in edge clouds by leveraging an adapted Deep Q-Network (DQN) reinforcement learning technique. The primary objective is to minimize the computational resources required for accurate anomaly detection while achieving low latency and high detection accuracy. Through extensive experimental evaluation in our testbed setup over different representative scenarios, we demonstrate that our adapted DQN approach can reduce resource usage by up to 45 % and detection time by up to 85 % while incurring less than an 8 % drop in F1 score. These results highlight the potential of the adapted DQN model selection strategy to enable efficient, low-latency anomaly detection in resource-constrained edge cloud environments.

Place, publisher, year, edition, pages
Elsevier, 2026
Keywords
Anomaly detection, Edge clouds, Model selection, Resource optimization
National Category
Computer Sciences Computer Systems
Identifiers
urn:nbn:se:umu:diva-245566 (URN)10.1016/j.future.2025.108161 (DOI)001585411100001 ()2-s2.0-105017973376 (Scopus ID)
Funder
Wallenberg AI, Autonomous Systems and Software Program (WASP)The Swedish Foundation for International Cooperation in Research and Higher Education (STINT)EU, Horizon Europe, 101092711
Available from: 2025-10-20 Created: 2025-10-20 Last updated: 2025-10-20Bibliographically approved
Jha, P., Singh, G., Kumar, A., Agrawal, D., Patel, Y. S. & Forough, J. (2025). NetProbe: deep learning-driven DDoS detection with a two-tiered mitigation strategy. In: Amos Korman; Sandip Chakraborty; Sathya Peri; Chiara Boldrini; Peter Robinson (Ed.), ICDCN 2025: Proceedings of the 26th International Conference on Distributed Computing and Networking. Paper presented at 26th International Conference on Distributed Computing and Networking, ICDCN 2025, Hyderabad, India, 04-07 January 2025 (pp. 402-407). Association for Computing Machinery (ACM)
Open this publication in new window or tab >>NetProbe: deep learning-driven DDoS detection with a two-tiered mitigation strategy
Show others...
2025 (English)In: ICDCN 2025: Proceedings of the 26th International Conference on Distributed Computing and Networking / [ed] Amos Korman; Sandip Chakraborty; Sathya Peri; Chiara Boldrini; Peter Robinson, Association for Computing Machinery (ACM), 2025, p. 402-407Conference paper, Published paper (Refereed)
Abstract [en]

Web servers are the backbone of modern Internet infrastructure, serving as the primary medium for online information distribution. Despite their critical role, web servers are susceptible to cyber-attacks. While current firewall mechanisms provide some level of protection against cyber threats, the evolving nature of these attacks and emerging vulnerabilities continue to pose significant risks. One of the most prevalent yet lethal attacks known today is DDoS (Distributed Denial of Service) attacks. These growing risks emphasize the urgent need for dynamic and robust threat detection and mitigation systems. This paper presents a comparative analysis of ensemble learning models (e.g., Random Forest, XGBoost, and LightGBM) and neural network-based models (e.g., Graph Neural Networks (GNN), Long Short-Term Memory networks (LSTM) with attention layers, and Gated Recurrent Units (GRU)) for DDoS attack detection and classification. Based on this analysis, we propose a real-time DDoS attack detection system integrated with a mitigation mechanism. The proposed system utilizes a two-tiered mitigation strategy assisted by UFW (Uncomplicated Firewall) and Apache server configuration files to block the incoming and outgoing traffic associated with suspicious IP addresses. The system's overall complexity, integrating both detection and response processes, ensures its efficiency in real-time environments while handling large volumes of traffic. Furthermore, the proposed approach achieves 15% improvement in detection accuracy and 20% reduction in false positives compared to traditional techniques, making it an effective and scalable solution for modern web server security.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2025
Keywords
Apache Server, DDoS detection, Graph Neural Networks (GNNs), Machine learning, Network traffic classification, Time-Series data
National Category
Computer Sciences Computer Systems
Identifiers
urn:nbn:se:umu:diva-236112 (URN)10.1145/3700838.3703687 (DOI)2-s2.0-85218336894 (Scopus ID)9798400710629 (ISBN)
Conference
26th International Conference on Distributed Computing and Networking, ICDCN 2025, Hyderabad, India, 04-07 January 2025
Note

Available from: 2025-03-10 Created: 2025-03-10 Last updated: 2025-03-10Bibliographically approved
Forough, J., Haddadi, H., Bhuyan, M. H. & Elmroth, E. (2024). Efficient anomaly detection for edge clouds: mitigating data and resource constraints.
Open this publication in new window or tab >>Efficient anomaly detection for edge clouds: mitigating data and resource constraints
2024 (English)Manuscript (preprint) (Other academic)
National Category
Computer Sciences
Identifiers
urn:nbn:se:umu:diva-220244 (URN)
Funder
Umeå UniversityWallenberg AI, Autonomous Systems and Software Program (WASP)
Available from: 2024-01-30 Created: 2024-01-30 Last updated: 2024-07-02
Forough, J., Haddadi, H., Bhuyan, M. & Elmroth, E. (2024). Efficient anomaly detection for edge clouds: mitigating data and resource constraints. IEEE Access, 12, 171897-171910
Open this publication in new window or tab >>Efficient anomaly detection for edge clouds: mitigating data and resource constraints
2024 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 12, p. 171897-171910Article in journal (Refereed) Published
Abstract [en]

Anomaly detection plays a vital role in ensuring the security and reliability of edge clouds, which are decentralized computing environments with limited resources. However, the unique challenges of limited computing power and lack of edge-related labeled training data pose significant obstacles to effective supervised anomaly detection. In this paper, we propose an innovative approach that leverages transfer learning to address the lack of relevant labeled data and knowledge distillation to increase computational efficiency and achieve accurate anomaly detection on edge clouds. Our approach exploits transfer learning by utilizing knowledge from a pre-trained model and adapting it for anomaly detection on edge clouds. This enables the model to benefit from the learned features and patterns from related tasks such as network intrusion detection, resulting in improved detection accuracy. Additionally, we utilize knowledge distillation to distill the knowledge from the previously mentioned high-capacity model, known as the teacher model, into a more compact student model. This distillation process enhances the student model's computational efficiency while retaining its detection power. Evaluations conducted on our developed real-world edge cloud testbed show that, with the same amount of edge cloud's labeled dataset, our approach maintains high accuracy while significantly reducing the model's detection time to almost half for non-sequential models, from 81.11μs to 44.34μs on average. For sequential models, it reduces the detection time to nearly a third of the baseline model's, from 331.54μs to 113.86μs on average. These improvements make our approach exceptionally practical for real-time anomaly detection on edge clouds.

Place, publisher, year, edition, pages
IEEE, 2024
Keywords
Anomaly detection, data constraints, edge clouds, knowledge distillation, resource constraints, transfer learning
National Category
Computer Sciences Computer Systems
Identifiers
urn:nbn:se:umu:diva-231909 (URN)10.1109/ACCESS.2024.3492815 (DOI)001362127900039 ()2-s2.0-85208701570 (Scopus ID)
Funder
Wallenberg AI, Autonomous Systems and Software Program (WASP)
Available from: 2024-11-20 Created: 2024-11-20 Last updated: 2024-12-13Bibliographically approved
Forough, J. (2024). Machine learning for anomaly detection in edge clouds. (Doctoral dissertation). Umeå: Umeå University
Open this publication in new window or tab >>Machine learning for anomaly detection in edge clouds
2024 (English)Doctoral thesis, comprehensive summary (Other academic)
Alternative title[sv]
Maskininlärning för anomalidetektion i kantmoln
Abstract [en]

Edge clouds have emerged as an essential architecture, revolutionizing data processing and analysis by bringing computational capabilities closer to data sources and end-users at the edge of the network. Anomaly detection is crucial in these settings to maintain the reliability and security of edge-based systems and applications despite limited computational resources. It plays a vital role in identifying unexpected patterns, which could indicate security threats or performance issues within the decentralized and real-time nature of edge cloud environments. For example, in critical edge applications like autonomous vehicles, augmented reality, and smart healthcare, anomaly detection ensures the consistent and secure operation of these systems, promptly detecting anomalies that might compromise safety, performance, or user experience. However, the adoption of anomaly detection within edge cloud environments poses numerous challenges.

This thesis aims to contribute by addressing the problem of anomaly detection in edge cloud environments. Through a comprehensive exploration of anomaly detection methods, leveraging machine learning techniques and innovative approaches, this research aims to enhance the efficiency and accuracy of detecting anomalies in edge cloud environments. The proposed methods intend to overcome the challenges posed by resource limitations, the lack of labeled data specific to edge clouds, and the need for accurate detection of anomalies. By focusing on machine learning approaches like transfer learning, knowledge distillation, reinforcement learning, deep sequential models, and deep ensemble learning, this thesis endeavors to establish efficient and accurate anomaly detection systems specific for edge cloud environments.

The results demonstrate the improvements achieved by employing machine learning methods for anomaly detection in edge clouds. Extensive testing and evaluation in real-world edge environments show how machine learning-driven anomaly detection systems improve identification of anomalies in edge clouds. The results highlight the capability of these methods to achieve a reasonable trade-off between accuracy and computational efficiency. These findings illustrate how machine learning-based anomaly detection approaches contribute to building resilient and secure edge-based systems.

Place, publisher, year, edition, pages
Umeå: Umeå University, 2024. p. 57
Series
Report / UMINF, ISSN 0348-0542 ; 24.02
Keywords
Edge Clouds, Anomaly Detection, Machine Learning
National Category
Computer Sciences
Identifiers
urn:nbn:se:umu:diva-220246 (URN)9789180702928 (ISBN)9789180702911 (ISBN)
Public defence
2024-02-23, SAM.A.280, Social Sciences Building, Umeå, 09:15 (English)
Opponent
Supervisors
Funder
Umeå UniversityWallenberg AI, Autonomous Systems and Software Program (WASP)
Available from: 2024-02-02 Created: 2024-01-30 Last updated: 2024-07-02Bibliographically approved
Forough, J., Bhuyan, M. H. & Elmroth, E. (2023). Anomaly detection and resolution on the edge: solutions and future directions. In: 2023 IEEE International Conference on Service-Oriented System Engineering (SOSE): Proceedings. Paper presented at 17th IEEE International Conference on Service-Oriented System Engineering, SOSE 2023, Athens, Greece, July 17-20, 2023 (pp. 227-238). IEEE
Open this publication in new window or tab >>Anomaly detection and resolution on the edge: solutions and future directions
2023 (English)In: 2023 IEEE International Conference on Service-Oriented System Engineering (SOSE): Proceedings, IEEE, 2023, p. 227-238Conference paper, Published paper (Refereed)
Abstract [en]

Anomaly detection and resolution are crucial in edge clouds to ensure that distributed systems operate reliably and securely. This survey presents a comprehensive overview of anomaly detection and resolution strategies specifically designed for edge cloud environments, exploring their strengths, limitations, and applicability in different scenarios. It explores the unique challenges and characteristics of edge cloud systems, providing an in-depth analysis of existing works and tools. Evaluation metrics and datasets used by different methods are examined to provide insights into assessing the performance and efficacy of anomaly detection and resolution approaches. The paper concludes by identifying open challenges, future research directions, and offering practical recommendations, making it a valuable resource for researchers and practitioners involved in enhancing the reliability and security of edge cloud systems.

Place, publisher, year, edition, pages
IEEE, 2023
Series
Proceedings (IEEE International Symposium on Service-Oriented System Engineering), ISSN 2640-8228, E-ISSN 2642-6587
Keywords
Anomaly detection, Anomaly resolution, Edge clouds, Performance anomalies, Security anomalies
National Category
Computer Sciences Computer Systems
Identifiers
urn:nbn:se:umu:diva-216214 (URN)10.1109/SOSE58276.2023.00034 (DOI)001084635000028 ()2-s2.0-85174902690 (Scopus ID)979-8-3503-2239-2 (ISBN)979-8-3503-2240-8 (ISBN)
Conference
17th IEEE International Conference on Service-Oriented System Engineering, SOSE 2023, Athens, Greece, July 17-20, 2023
Funder
Wallenberg AI, Autonomous Systems and Software Program (WASP)EU, Horizon Europe, 101092711
Available from: 2023-11-06 Created: 2023-11-06 Last updated: 2025-04-24Bibliographically approved
Forough, J., Bhuyan, M. & Elmroth, E. (2023). Unified identification of anomalies on the edge: a hybrid sequential PGM approach. In: 2023 IEEE 22nd international conference on trust, security and privacy in computing and communications (TrustCom): . Paper presented at 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2023, Exeter, United Kingdom, November 1-3, 2023 (pp. 595-604). IEEE
Open this publication in new window or tab >>Unified identification of anomalies on the edge: a hybrid sequential PGM approach
2023 (English)In: 2023 IEEE 22nd international conference on trust, security and privacy in computing and communications (TrustCom), IEEE, 2023, p. 595-604Conference paper, Published paper (Refereed)
Abstract [en]

Edge cloud resources, just as many other computing resources, are prone to both performance and security anomalies due to their decentralized nature and real-time requirements for processing of data. Their behaviour initially observed as anomalous may, however, in many cases be rather generic and hard to detect. To be able to address such anomalies, it is instrumental to determine whether the anomaly is a "Security" threat or only a "Performance" concern. Therefore, in this paper, we develop an anomaly detection model capable of distinguishing between security and performance anomalies. The model is based on sequential modeling and Probabilistic Graphical Model (PGM), which leverage historical information and dependencies between previous predictions to classify future anomalies accurately. The evaluation of our proposed model shows its superior performance on our testbed and benchmark datasets. Accordingly, the model achieves an average 5%, and 3% higher F1 score compared to state-of-the-art methods in binary and multi-label anomaly detection cases, respectively. Moreover, our testing time analysis demonstrates the ability of the proposed model in early detection of such anomalies on the edge cloud.

Place, publisher, year, edition, pages
IEEE, 2023
Series
IEEE International Conference on Trust, Security and Privacy in Computing and Communications, ISSN 2324-898X, E-ISSN 2324-9013
Keywords
Edge clouds, Anomaly detection, Sequential modeling, Probabilistic Graphical Model
National Category
Computer Sciences
Identifiers
urn:nbn:se:umu:diva-220242 (URN)10.1109/TrustCom60117.2023.00092 (DOI)001239879400069 ()2-s2.0-85195522322 (Scopus ID)9798350381993 (ISBN)9798350382006 (ISBN)
Conference
22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2023, Exeter, United Kingdom, November 1-3, 2023
Funder
Umeå UniversityWallenberg AI, Autonomous Systems and Software Program (WASP)
Note

Originally included in thesis in manuscript form.

Available from: 2024-01-30 Created: 2024-01-30 Last updated: 2025-04-24Bibliographically approved
Forough, J., Bhuyan, M. H. & Elmroth, E. (2022). Dela: a deep ensemble learning approach for cross-layer VSI-DDoS detection on the edge. In: : . Paper presented at ICDCS 2022, 42nd IEEE International Conference on Distributed Computing Systems, Bologna, Italy, July 10-13, 2022 (pp. 1155-1165). IEEE
Open this publication in new window or tab >>Dela: a deep ensemble learning approach for cross-layer VSI-DDoS detection on the edge
2022 (English)Conference paper, Published paper (Refereed)
Abstract [en]

Web application services and networks become a major target of low-rate Distributed Denial of Service (DDoS) attacks such as Very Short Intermittent DDoS (VSI-DDoS). These threats exploit the TCP congestion control mechanism to cause transient resource outage and impute delays for legitimate users’ requests, while they bypass the secure systems. Besides that, cross-layer VSI-DDoS attacks, where the performed attacks are towards the different layers of the edge cloud infrastructures, are able to cause violation of customers’ Service-Level Agreements (SLAs) with less visible behavioral patterns. In this work, we propose a novel Deep Ensemble Learning Approach named DELA for detection of cross-layer VSI-DDoS on the edge cloud. This approach is developed based on Long Short-Term Memory (LSTM), ensemble learning, and a new voting mechanism based on Feed-Forward Neural Network (FFNN). In addition, it employs a novel training and detection algorithm to combat such attacks in web services and networks. The model shows improved results due to the utilization of historical information in decision- making and also the usage of neural network as aggregator instead of a static threshold-based aggregation. Moreover, we propose a novel overlapped data chunking algorithm that is able to ameliorate the detection performance. Furthermore, the evaluation of DELA shows its superior performance over our testbed and benchmark datasets. Accordingly, DELA achieves on average 4.88% higher F 1 score compared to state-of-the-art methods.

Place, publisher, year, edition, pages
IEEE, 2022
Series
Proceedings of the International Conference on Distributed Computing Systems, E-ISSN 2575-8411
Keywords
Ensemble learning, Sequential modeling, VSI-DDoS detection, Edge clouds, Overlapped data chunking
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:umu:diva-200727 (URN)10.1109/ICDCS54860.2022.00114 (DOI)000877026100105 ()2-s2.0-85140878827 (Scopus ID)978-1-6654-7177-0 (ISBN)
Conference
ICDCS 2022, 42nd IEEE International Conference on Distributed Computing Systems, Bologna, Italy, July 10-13, 2022
Funder
Wallenberg AI, Autonomous Systems and Software Program (WASP)Knut and Alice Wallenberg FoundationThe Swedish Foundation for International Cooperation in Research and Higher Education (STINT)
Available from: 2022-11-02 Created: 2022-11-02 Last updated: 2024-07-02Bibliographically approved
Forough, J., Bhuyan, M. H. & Elmroth, E. (2021). Detection of VSI-DDoS Attacks on the Edge: A Sequential Modeling Approach. In: ARES 2021: The 16th International Conference on Availability, Reliability and Security: . Paper presented at ARES 2021, The 16th International Conference on Availability, Reliability and Security, online, August 17-20, 2021. Association for Computing Machinery (ACM), Article ID 20.
Open this publication in new window or tab >>Detection of VSI-DDoS Attacks on the Edge: A Sequential Modeling Approach
2021 (English)In: ARES 2021: The 16th International Conference on Availability, Reliability and Security, Association for Computing Machinery (ACM), 2021, article id 20Conference paper, Published paper (Refereed)
Abstract [en]

The advent of crucial areas such as smart healthcare and autonomous transportation, bring in new requirements on the computing infrastructure, including higher demand for real-time processing capability with minimized latency and maximized availability. The traditional cloud infrastructure has several deficiencies when meeting such requirements due to its centralization. Edge clouds seems to be the solution for the aforementioned requirements, in which the resources are much closer to the edge devices and provides local computing power and high Quality of Service (QoS). However, there are still security issues that endanger the functionality of edge clouds. One of the recent types of such issues is Very Short Intermittent Distributed Denial of Service (VSI-DDoS) which is a new category of low-rate DDoS attacks that targets both small and large-scale web services. This attack generates very short bursts of HTTP request intermittently towards target services to encounter unexpected degradation of QoS at edge clouds. In this paper, we formulate the problem with a sequence modeling approach to address short intermittent intervals of DDoS attacks during the rendering of services on edge clouds using Long Short-Term Memory (LSTM) with local attention. The proposed approach ameliorates the detection performance by learning from the most important discernible patterns of the sequence data rather than considering complete historical information and hence achieves a more sophisticated model approximation. Experimental results confirm the feasibility of the proposed approach for VSI-DDoS detection on edge clouds and it achieves 2% more accuracy when compared with baseline methods.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2021
Series
ACM International Conference Proceeding Series (ICPS)
Keywords
Anomaly detection, Deep learning, Edge clouds, Sequential modeling, VSI-DDoS detection
National Category
Computer Systems Computer Sciences
Identifiers
urn:nbn:se:umu:diva-187029 (URN)10.1145/3465481.3465757 (DOI)000749539200016 ()2-s2.0-85113227922 (Scopus ID)978-1-4503-9051-4 (ISBN)
Conference
ARES 2021, The 16th International Conference on Availability, Reliability and Security, online, August 17-20, 2021
Funder
Wallenberg AI, Autonomous Systems and Software Program (WASP)Knut and Alice Wallenberg FoundationThe Swedish Foundation for International Cooperation in Research and Higher Education (STINT)
Available from: 2021-08-31 Created: 2021-08-31 Last updated: 2024-07-02Bibliographically approved
Forough, J., Bhuyan, M. H. & Elmroth, E. Reinforced model selection for resource efficient anomaly detection in edge clouds.
Open this publication in new window or tab >>Reinforced model selection for resource efficient anomaly detection in edge clouds
(English)Manuscript (preprint) (Other academic)
National Category
Computer Sciences
Identifiers
urn:nbn:se:umu:diva-220245 (URN)
Funder
Wallenberg AI, Autonomous Systems and Software Program (WASP)Umeå University
Available from: 2024-01-30 Created: 2024-01-30 Last updated: 2024-07-02
Organisations

Search in DiVA

Show all publications