Effective Multi-Stage Training Model For Edge Computing Devices In Intrusion Detection

Thua Huynh Trong,Thanh Nguyen Hoang
DOI: https://doi.org/10.5121/ijcnc.2024.16102
2024-01-31
Abstract:Intrusion detection poses a significant challenge within expansive and persistently interconnected environments. As malicious code continues to advance and sophisticated attack methodologies proliferate, various advanced deep learning-based detection approaches have been proposed. Nevertheless, the complexity and accuracy of intrusion detection models still need further enhancement to render them more adaptable to diverse system categories, particularly within resource-constrained devices, such as those embedded in edge computing systems. This research introduces a three-stage training paradigm, augmented by an enhanced pruning methodology and model compression techniques. The objective is to elevate the system's effectiveness, concurrently maintaining a high level of accuracy for intrusion detection. Empirical assessments conducted on the UNSW-NB15 dataset evince that this solution notably reduces the model's dimensions, while upholding accuracy levels equivalent to similar proposals.
Cryptography and Security,Machine Learning
What problem does this paper attempt to address?
The main problem that this paper attempts to solve is to achieve efficient and accurate intrusion detection on resource - constrained edge - computing devices. Specifically, the paper focuses on how to deploy complex deep - learning models on these devices to improve the effectiveness of intrusion detection while maintaining high precision. Since edge - computing devices usually face limitations in processing power, memory, and energy, traditional intrusion - detection methods are difficult to be effectively implemented on these devices. Therefore, the paper proposes a three - stage training paradigm and combines enhanced pruning methods and model - compression techniques, aiming to reduce the complexity of the model while maintaining the high - precision intrusion - prediction ability. ### Main contributions of the paper: 1. **Three - stage training model**: A three - stage training model is proposed. Each stage utilizes multi - layer deep - learning models. In particular, the pruning technique is adopted in the sparse stage to reduce the size and complexity of the model. 2. **Enhanced pruning method**: An improved pruning method is introduced. Through the Selective Weight Decay (SWD) technique, the weights of the model are dynamically adjusted to further optimize the performance of the model. 3. **Model quantization**: On the basis of pruning, the model is further quantified. The model parameters are converted from floating - point numbers to fixed - point numbers, thereby significantly reducing the size and computational complexity of the model and making it more suitable for running on resource - constrained devices. 4. **Experimental verification**: Experimental verification was carried out on the UNSW - NB15 data set. The results show that this method not only significantly reduces the size of the model but also maintains a detection precision comparable to that of existing methods. ### Objectives: - **Improve the effectiveness of intrusion detection**: By optimizing the model structure and training process, the overall performance of the intrusion - detection system is enhanced. - **Reduce resource consumption**: By model pruning and quantization, the resource requirements of the model on edge devices are reduced, and the service life of the devices is prolonged. - **Maintain high precision**: While reducing the complexity of the model, ensure that the accuracy of intrusion detection is not affected. In general, through a series of technological innovations, this paper aims to solve the challenges faced by intrusion detection on edge - computing devices and provides a feasible solution for practical applications.