Unified AI Models for Network Security on Edge Devices

dc.authorscopusid56526714700en_US
dc.authorscopusid58635575500en_US
dc.authorscopusid58634187100en_US
dc.authorscopusid60149309000en_US
dc.authorscopusid60149309100en_US
dc.authorwosidAFP-1570-2022
dc.authorwosidJGS-2025-2023
dc.authorwosidJHS-0856-2023
dc.authorwosidOPQ-8151-2025
dc.authorwosidOPZ-2137-2025
dc.contributor.authorBayrak, Şengül
dc.contributor.authorKaraca, Alper
dc.contributor.authorToson, Ferhat
dc.contributor.authorTayfur, Mehmet Emin
dc.contributor.authorBayrak, Şengül
dc.contributor.department-temp
dc.date.accessioned2025-11-27T19:19:19Z
dc.date.available2025-11-27T19:19:19Z
dc.date.issued2025en_US
dc.departmentMühendislik ve Doğa Bilimleri Fakültesien_US
dc.description.abstractRapidly identifying and mitigating security threats to reduce the impact of attacks is one of the most pressing challenges of our time. Digital threats frequently jeopardize users, often manifested as web-based, intranetwork, or spam-related attacks. The literature indicates that most studies examine each type of attack separately. This study introduces six distinct deep learning (DL) model architectures capable of detecting three attacks. The results of this study demonstrate that the Deep Neural Network (DNN) model achieved a test accuracy of 98.78% for the FWAF dataset. The CNN-LSTM model achieved 99.95% accuracy for the KDDCUP-99 dataset and 99.09% accuracy for the SMS Spam dataset. This study accurately identifies anomalous activities and anticipates potential attacks by analyzing large data sets from various data channels. Furthermore, this work improves the efficacy of existing firewalls and holds significant promise in preventing malicious factors from exploiting vulnerabilities in digital infrastructures. This study conducted experiments in a real-time environment using artificial intelligence models deployed on Jetson Nano. For malicious traffic detection, malicious traffic was created on the network with the Nmap tool, and network traffic was monitored using Wireshark, followed by classification using our model. In the Damn Vulnerable Web Application (DVWA) platform, a malicious URL classification model was used to test web attacks. For spam detection, suspicious text was retrieved from the user via a plugin running in the browser and sent to the spam classification model, and the result was returned to the user. In conclusion, DL models have the potential to detect and prevent various security threats in web applications. This study enables the analysis of normal operating behaviors in web applications and the identification of anomalous activities. This capability helps detect attempted intrusions or potential security issues indicating user behavior. Furthermore, the study facilitates the automatic detection of attacks targeting web applications and the implementation of countermeasures to mitigate such threats.en_US
dc.identifier.doi10.1007/s44196-025-00990-6
dc.identifier.issn18756-891
dc.identifier.issue1en_US
dc.identifier.scopus2-s2.0-105019371345en_US
dc.identifier.urihttps://doi.org/10.1007/s44196-025-00990-6
dc.identifier.urihttps://hdl.handle.net/20.500.12436/8465
dc.identifier.volume18en_US
dc.identifier.wos001596230200006
dc.identifier.wosqualityQ2
dc.indekslendigikaynakScopus
dc.institutionauthorBayrak, Şengül
dc.institutionauthorKaraca, Alper
dc.institutionauthorToson, Ferhat
dc.institutionauthorTayfur, Mehmet Emin
dc.language.isoen
dc.publisherSpringeren_US
dc.relation.ispartofInternational Journal of Computational Intelligence Systemsen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - İdari Personel ve Öğrencien_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectNetwork securityen_US
dc.subjectDeep learning modelsen_US
dc.subjectNatural language processingen_US
dc.subjectSmart edge deviceen_US
dc.titleUnified AI Models for Network Security on Edge Devicesen_US
dc.typeArticle
dspace.entity.typePublication
relation.isAuthorOfPublication7484657b-42f3-4740-996f-18d40709d0bd
relation.isAuthorOfPublication.latestForDiscovery7484657b-42f3-4740-996f-18d40709d0bd

Dosyalar

Orijinal paket

Listeleniyor 1 - 1 / 1
Yükleniyor...
Küçük Resim
İsim:
s44196-025-00990-6.pdf
Boyut:
3.71 MB
Biçim:
Adobe Portable Document Format
Açıklama:
Makale dosyası / Article file

Lisans paketi

Listeleniyor 1 - 1 / 1
Yükleniyor...
Küçük Resim
İsim:
license.txt
Boyut:
1.44 KB
Biçim:
Item-specific license agreed upon to submission
Açıklama: