Toward an Intrusion Detection System for a Virtualization Framework in Edge Computing

πŸ“… 2025-11-12
πŸ“ˆ Citations: 0
✨ Influential: 0
πŸ“„ PDF
πŸ€– AI Summary
Edge computing decentralizes computation to resource-constrained devices, significantly expanding the attack surface; however, conventional intrusion detection systems (IDSs) struggle to simultaneously achieve lightweight deployment and effective detection of previously unseen threats. To address this, we propose LDPIβ€”a lightweight deep-learning-based intrusion detection system tailored for virtualized edge environments. LDPI embeds a deep learning anomaly detection model as an isolated service within the virtualization layer, ensuring security isolation while enabling efficient, real-time threat identification. Optimized via five-fold cross-validation, LDPI achieves an average AUC of 0.999 and high F1 scores on laptop-class edge nodes, effectively detecting zero-day attacks such as network flooding. Compared to signature-based IDSs (e.g., Suricata and Snort), LDPI delivers superior detection accuracy with bounded computational overhead. Our approach establishes a novel paradigm for edge IDS that jointly satisfies security guarantees, real-time responsiveness, and practical deployability.

Technology Category

Application Category

πŸ“ Abstract
Edge computing pushes computation closer to data sources, but it also expands the attack surface on resource-constrained devices. This work explores the deployment of the Lightweight Deep Anomaly Detection for Network Traffic (LDPI) integrated as an isolated service within a virtualization framework that provides security by separation. LDPI, adopting a Deep Learning approach, achieved strong training performance, reaching AUC 0.999 (5-fold mean) across the evaluated packet-window settings (n, l), with high F1 at conservative operating points. We deploy LDPI on a laptop-class edge node and evaluate its overhead and performance in two scenarios: (i) comparing it with representative signature-based IDSes (Suricata and Snort) deployed on the same framework under identical workloads, and (ii) while detecting network flooding attacks.
Problem

Research questions and friction points this paper is trying to address.

Developing intrusion detection for edge computing virtualization frameworks
Addressing expanded attack surfaces on resource-constrained edge devices
Evaluating lightweight deep learning against signature-based IDS alternatives
Innovation

Methods, ideas, or system contributions that make the work stand out.

Lightweight deep learning for network anomaly detection
Isolated deployment in virtualization framework for security
Achieved high AUC performance with minimal overhead
πŸ”Ž Similar Papers
No similar papers found.
Everton de Matos
Everton de Matos
Secure Systems Research Center, Technology Innovation Institute (TII), Abu Dhabi, United Arab Emirates
H
Hazaa Alameri
Secure Systems Research Center, Technology Innovation Institute (TII), Abu Dhabi, United Arab Emirates
W
W. Lunardi
Secure Systems Research Center, Technology Innovation Institute (TII), Abu Dhabi, United Arab Emirates
Martin Andreoni
Martin Andreoni
Technology Innovation Institute (TII)
Network SecurityIntrusion DetectionCloud ComputingSecure Autonomous Systems
E
Eduardo Viegas
Graduate Program in Computer Science, Pontifical Catholic University of ParanΓ‘, Curitiba, Brazil