TasksSotADatasetsPapersMethodsSubmitAbout
Papers With Code 2

A community resource for machine learning research: papers, code, benchmarks, and state-of-the-art results.

Explore

Notable BenchmarksAll SotADatasetsPapersMethods

Community

Submit ResultsAbout

Data sourced from the PWC Archive (CC-BY-SA 4.0). Built by the community, for the community.

Papers/Edge-Detect: Edge-centric Network Intrusion Detection usin...

Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network

Praneet Singh, Jishnu Jaykumar, Akhil Pankaj, Reshmi Mitra

2021-02-03Intrusion DetectionNetwork Intrusion Detection
PaperPDFCode(official)

Abstract

Edge nodes are crucial for detection against multitudes of cyber attacks on Internet-of-Things endpoints and is set to become part of a multi-billion industry. The resource constraints in this novel network infrastructure tier constricts the deployment of existing Network Intrusion Detection System with Deep Learning models (DLM). We address this issue by developing a novel light, fast and accurate 'Edge-Detect' model, which detects Distributed Denial of Service attack on edge nodes using DLM techniques. Our model can work within resource restrictions i.e. low power, memory and processing capabilities, to produce accurate results at a meaningful pace. It is built by creating layers of Long Short-Term Memory or Gated Recurrent Unit based cells, which are known for their excellent representation of sequential data. We designed a practical data science pipeline with Recurring Neural Network to learn from the network packet behavior in order to identify whether it is normal or attack-oriented. The model evaluation is from deployment on actual edge node represented by Raspberry Pi using current cybersecurity dataset (UNSW2015). Our results demonstrate that in comparison to conventional DLM techniques, our model maintains a high testing accuracy of 99% even with lower resource utilization in terms of cpu and memory. In addition, it is nearly 3 times smaller in size than the state-of-art model and yet requires a much lower testing time.

Results

TaskDatasetMetricValueModel
Intrusion DetectionUNSW-NB15Accuracy99.6Edge-Detect-FRNN
Intrusion DetectionUNSW-NB15Precision99.5Edge-Detect-FRNN
Intrusion DetectionUNSW-NB15Recall99.75Edge-Detect-FRNN
Intrusion DetectionUNSW-NB15Accuracy99.5Edge-Detect-FGRNN
Intrusion DetectionUNSW-NB15Precision99.5Edge-Detect-FGRNN
Intrusion DetectionUNSW-NB15Recall99.55Edge-Detect-FGRNN

Related Papers

CyberRAG: An agentic RAG cyber attack classification and reporting tool2025-07-03Detection of Cyber Attack in Network using Machine Learning Techniques.2025-07-02Generative Adversarial Evasion and Out-of-Distribution Detection for UAV Cyber-Attacks2025-06-26Poster: Enhancing GNN Robustness for Network Intrusion Detection via Agent-based Analysis2025-06-25KnowML: Improving Generalization of ML-NIDS with Attack Knowledge Graphs2025-06-24Robust Anomaly Detection in Network Traffic: Evaluating Machine Learning Models on CICIDS20172025-06-23Dynamic Temporal Positional Encodings for Early Intrusion Detection in IoT2025-06-22On the Performance of Cyber-Biomedical Features for Intrusion Detection in Healthcare 5.02025-06-19