Rodolphe Laurent Louis Picot, Felipe Gohring de Magalhaes, Ahmad Shahnejat Bushehri, Maroua Ben Atti, Gabriela Nicolescu
and Alejandro Quintero
Article (2025)
|
Open Access to the full text of this document Published Version Terms of Use: Creative Commons Attribution Download (1MB) |
Abstract
Intrusion Detection (ID) faces multiple challenges, including the diversity of intrusion types and the risk of false positives and negatives. In an edge computing context, resource constraints further complicate the process, particularly during the training phase, which is computationally intensive. This paper presents a novel approach to ID in network traffic within edge computing environments using a Neural Network (NN) model. The proposed model is designed to align with the layered structure of network packets and has been trained and evaluated on the widely used CIC-IDS2017 cybersecurity dataset. Its protocol-agnostic design and customized preprocessing method enable it to efficiently detect network attacks across multiple protocols while preserving the original packet structure. Unlike existing approaches that transform packets into alternative representations such as images or NLP-based techniques, which introduce additional overhead, our method processes packets directly, eliminating the need for complex components like Recurrent Neural Networks (RNNs) or convolutional layers. Our model is optimized for edge computing by employing a centralized training approach that minimizes resource consumption while allowing flexible deployment on edge devices. Experimental results demonstrate that our approach outperforms existing methods in terms of accuracy, F1-score, recall, and precision when evaluated on a real-world dataset. This work highlights the potential of deep learning in enhancing network security while respecting edge computing constraints.
Uncontrolled Keywords
| Department: | Department of Computer Engineering and Software Engineering |
|---|---|
| PolyPublie URL: | https://publications.polymtl.ca/64351/ |
| Journal Title: | IEEE Access (vol. 13) |
| Publisher: | Institute of Electrical and Electronics Engineers |
| DOI: | 10.1109/access.2025.3555201 |
| Official URL: | https://doi.org/10.1109/access.2025.3555201 |
| Date Deposited: | 28 Mar 2025 10:28 |
| Last Modified: | 09 Jan 2026 14:11 |
| Cite in APA 7: | Picot, R. L. L., Gohring de Magalhaes, F., Shahnejat Bushehri, A., Ben Atti, M., Nicolescu, G., & Quintero, A. (2025). Protocol-agnostic and packet-based intrusion detection using a multi-layer deep-learning architecture at the network edge. IEEE Access, 13, 57867-57877. https://doi.org/10.1109/access.2025.3555201 |
|---|---|
Statistics
Total downloads
Downloads per month in the last year
Origin of downloads
Dimensions
