AI-Driven Network Security Architecture for Edge Computing
DOI:
https://doi.org/10.22399/ijcesen.4994Keywords:
Edge Computing Security, Distributed Intelligence, Zero Trust Architecture, Automated Threat Detection, Resource-Optimized Machine LearningAbstract
Edges pose a fundamental change to network security architecture. Edge computing moves computation, and thus exposure, to many physical locations, making customary enforcement points ineffective. Security architecture must consider the dynamic topology and variable connectivity, as well as the huge attack surface of billions of devices generating large volumes of data on the edge of the network. Distributed intelligence architectures implement a tiered security processing model. Security processing occurs on both edge and core compute, enabling real-time threat detection with low-overhead machine learning inference on the edge and centralized correlation analysis. APIs support programmable, policy-based automation of security across multi-vendor infrastructure, including zero-touch device provisioning and intent-based security operations. More advanced threat detection relies on behavioral baselining, predictive modeling, and ensemble learning to detect threats across multiple threat classes with a high level of precision and recall. Zero-trust architectures replace binary authentication with continual risk assessment and dynamic policy application. Zero-trust networks enforce micro-segmentation to restrict lateral movement and reduce an attack's blast radius. To extend advanced security capabilities to resource-constrained edge devices, model compression and energy-efficient inference at the edge are popular approaches to hardware acceleration. It can also considerably reduce the computational cost while maintaining detection performance with this integrated framework to address the security problems in distributed computing environments through smart automation, adaptive controls, and resource optimization.
References
[1] Jianli Pan, James McElhannon, "Future Edge Cloud and Edge Computing for Internet of Things Applications," ResearchGate, 2017. [Online]. Available: https://www.researchgate.net/profile/Jianli-Pan/publication/320723809
[2] Weisong Shi, et al., "Edge computing: Vision and challenges," IEEE, 2016. [Online]. Available: https://ieeexplore.ieee.org/document/7488250
[3] Mohammed Ali Al-Garadi et al., "A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security," arxiv, 2020. [Online]. Available: https://arxiv.org/pdf/1807.11023
[4] Qiang Yang et al., "Federated machine learning: Concept and applications," ACM Digital Library, 2019. [Online]. Available: https://dl.acm.org/doi/10.1145/3298981
[5] Diego Kreutz et al., "Software-Defined Networking: A Comprehensive Survey," arxiv, 2014. Available: https://arxiv.org/pdf/1406.0440
[6] Pankaj Berde et al., "ONOS: towards an open, distributed SDN OS," ACM Digital Library, 2014. https://dl.acm.org/doi/pdf/10.1145/2620728.2620744
[7] Anna L. Buczak and Erhan Guven, "A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection," IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 18, NO. 2, SECOND QUARTER 2016. [Online]. Available: https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=7307098
[8] Nour Moustafa and Jill Slay, "UNSW-NB15: A Comprehensive Data Set for Network Intrusion Detection Systems (UNSW-NB15 Network Data Set)," University of New South Wales at the Australian Defence Force Academy, [Online]. Available: https://www.researchgate.net/profile/Nour-Moustafa/publication/287330529
[9] Pacharee Phiayura and Songpon Teerakanok, "A Comprehensive Framework for Migrating to Zero Trust Architecture.” IEEEXplore, 2023. [Online]. Available: https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=10052642
[10] Elisa Bertino, Nayeem Islam, "Botnets and Internet of Things Security," CyberTrust. [Online]. Available:https://www.researchgate.net/profile/Elisa-Bertino/publication/313464793
[11] Yann Lecun et al., “Deep learning,” HAL Open Science, 2023. https://hal.science/hal-04206682/document
[12] Song Han, “Deep compression: Compressing deep neural networks with pruning, trained quantization, and Huffman coding,” ICLR, 2016. https://arxiv.org/pdf/1510.00149
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 International Journal of Computational and Experimental Science and Engineering

This work is licensed under a Creative Commons Attribution 4.0 International License.