{"id":"https://openalex.org/W4381744952","doi":"https://doi.org/10.1109/noms56928.2023.10154326","title":"Probabilistic Distributed Intrusion Detection For Zero-Trust Multi-Access Edge Computing","display_name":"Probabilistic Distributed Intrusion Detection For Zero-Trust Multi-Access Edge Computing","publication_year":2023,"publication_date":"2023-05-08","ids":{"openalex":"https://openalex.org/W4381744952","doi":"https://doi.org/10.1109/noms56928.2023.10154326"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/noms56928.2023.10154326","pdf_url":null,"source":{"id":"https://openalex.org/S4363605650","display_name":"NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101670380","display_name":"Rahul Sharma","orcid":"https://orcid.org/0000-0003-2464-9181"},"institutions":[{"id":"https://openalex.org/I165779595","display_name":"University of Melbourne","ror":"https://ror.org/01ej9dk98","country_code":"AU","type":"education","lineage":["https://openalex.org/I165779595"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Rahul Sharma","raw_affiliation_strings":["School of Computing and Information Systems, The University of Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing and Information Systems, The University of Melbourne, Australia","institution_ids":["https://openalex.org/I165779595"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008072409","display_name":"Chien Aun Chan","orcid":"https://orcid.org/0000-0001-7188-3478"},"institutions":[{"id":"https://openalex.org/I165779595","display_name":"University of Melbourne","ror":"https://ror.org/01ej9dk98","country_code":"AU","type":"education","lineage":["https://openalex.org/I165779595"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Chien Aun Chan","raw_affiliation_strings":["Department of Electrical and Electronic Engineering, The University of Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Electronic Engineering, The University of Melbourne, Australia","institution_ids":["https://openalex.org/I165779595"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076014464","display_name":"Christopher Leckie","orcid":"https://orcid.org/0000-0002-4388-0517"},"institutions":[{"id":"https://openalex.org/I165779595","display_name":"University of Melbourne","ror":"https://ror.org/01ej9dk98","country_code":"AU","type":"education","lineage":["https://openalex.org/I165779595"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Christopher Leckie","raw_affiliation_strings":["School of Computing and Information Systems, The University of Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing and Information Systems, The University of Melbourne, Australia","institution_ids":["https://openalex.org/I165779595"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.454,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.99932,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":88,"max":90},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9992,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/chaining","display_name":"Chaining","score":0.42593166}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7938926},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.5789532},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.57527256},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5352185},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.50385565},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.50005794},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4916051},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.43546963},{"id":"https://openalex.org/C49020025","wikidata":"https://www.wikidata.org/wiki/Q1059099","display_name":"Chaining","level":2,"score":0.42593166},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.41550276},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.235421},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09244591},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09106648},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/noms56928.2023.10154326","pdf_url":null,"source":{"id":"https://openalex.org/S4363605650","display_name":"NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.62}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4387627836","https://openalex.org/W4200061056","https://openalex.org/W3028301851","https://openalex.org/W2901315987","https://openalex.org/W2767696758","https://openalex.org/W2486348789","https://openalex.org/W2107793209","https://openalex.org/W2041767423","https://openalex.org/W1995270367","https://openalex.org/W1581002386"],"abstract_inverted_index":{"With":[0],"the":[1,15,23,26,50],"advent":[2],"of":[3,20,25,49,191,196],"Multi-Access":[4],"Edge":[5],"Computing":[6],"(MEC)":[7],"in":[8,14,57,108,130,186,188,203,215],"5G,":[9],"there":[10],"is":[11,59,75],"a":[12,118,139,161,166],"shift":[13],"core":[16],"processing":[17,225],"and":[18,37,71,80,127,152,155,165,193,212,223],"deployment":[19],"applications":[21,30],"to":[22,44,53,60,78,84,124,198],"edge":[24,136],"network.":[27],"This":[28],"enables":[29],"requiring":[31],"ultra":[32],"low":[33],"latency":[34],"response":[35,221],"times":[36],"high":[38],"bandwidth":[39],"but":[40,104],"also":[41],"exposes":[42],"them":[43],"new":[45],"cyber":[46],"attacks.":[47,112],"One":[48],"proposed":[51,98,168],"ways":[52],"strengthen":[54],"application":[55,180],"security":[56],"MEC":[58],"use":[61],"Zero":[62,140],"Trust":[63,141],"Strategies":[64],"(ZTS).":[65],"However,":[66],"despite":[67],"its":[68,157],"strong":[69],"authentication":[70],"authorisation":[72],"capabilities,":[73],"it":[74],"still":[76],"vulnerable":[77],"attacks":[79,103],"requires":[81],"further":[82],"mechanisms":[83],"detect":[85,125],"anomalies,":[86],"especially":[87],"across":[88,134],"multiple":[89,135],"clusters.":[90],"Collaborative":[91],"Intrusion":[92],"Detection":[93],"Systems":[94],"(CIDS)":[95],"have":[96],"been":[97],"for":[99],"detecting":[100,109,201],"sophisticated":[101],"coordinated":[102],"often":[105],"fall":[106],"short":[107],"focused":[110],"stealthy":[111,126],"In":[113],"this":[114],"paper,":[115],"we":[116],"present":[117],"novel":[119,183],"tree-based":[120],"Probabilistic":[121],"Distributed":[122,163],"CIDS":[123,164,184],"volumetric":[128],"anomalies":[129,202],"service-to-service":[131],"interactions":[132],"deployed":[133],"clusters":[137],"with":[138],"Network":[142],"setup.":[143],"We":[144],"perform":[145],"our":[146,182],"evaluation":[147,174],"based":[148],"on":[149,172],"detection":[150,189],"accuracy":[151,190],"network":[153,194],"overhead":[154,195],"outline":[156],"performance":[158],"improvement":[159],"against":[160],"traditional":[162],"previously":[167],"Hybrid":[169],"CIDS.":[170],"Based":[171],"an":[173],"using":[175],"telemetry":[176],"data":[177],"from":[178],"real-world":[179],"clusters,":[181],"resulted":[185],"improvements":[187],"99.4%":[192],"up":[197],"51.81%":[199],"when":[200],"service":[204,209],"path":[205],"interactions,":[206,211],"HTTP":[207],"methods,":[208],"endpoint":[210],"unusual":[213],"variance":[214],"numerical":[216],"values":[217],"comprising":[218],"request":[219],"size,":[220,222],"traffic":[224],"duration.":[226]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4381744952","counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1}],"updated_date":"2024-12-24T22:48:28.450831","created_date":"2023-06-24"}