On resource consumption of machine learning in communications network security

dc.contributor.authorHoque, Md Muzammal
dc.contributor.authorAhmad, Ijaz
dc.contributor.authorSuomalainen, Jani
dc.contributor.authorDini, Paolo
dc.contributor.authorTahir, Mohammad
dc.contributor.organizationfi=kyberturvallisuusteknologia|en=Cyber Security Engineering|
dc.contributor.organization-code1.2.246.10.2458963.20.28753843706
dc.converis.publication-id499725114
dc.converis.urlhttps://research.utu.fi/converis/portal/Publication/499725114
dc.date.accessioned2026-01-21T12:13:12Z
dc.date.available2026-01-21T12:13:12Z
dc.description.abstractAs the complexity of communication networks continues to increase, driven by a diverse array of devices, services and applications, the adoption of Machine Learning (ML) has seen a significant rise to address various challenges ranging from management to security. Regarding network security, the application of ML ranges from preventive measures to detection and remediation due to its ability to dynamically learn and adapt to evolving threat landscapes. However, ML requires a significant amount of resources, mainly due to the fact that ML operates on data, and the volumes of data are consistently rising. This review article explores the resource consumption aspect of ML techniques used for network security and provides a comprehensive review of the current state of research. Moreover, we propose a taxonomy that can be used to classify the methods through which the resource consumption can be reduced for different ML-based network security implementations. The focus of the study encompasses several key aspects related to resource consumption, including energy, computing, memory, latency, bandwidth, and human resources. These resources are critical in improving the efficiency and optimizing the reliability and sustainability of network security solutions. Furthermore, based on an extensive literature review, we summarize key points regarding optimizing resource consumption in ML-based network security solutions. Finally, the challenges and future research directions for resource-efficient, ML-based network security solutions are outlined to aid in the advancement of research in this area.
dc.identifier.eissn1872-7069
dc.identifier.jour-issn1389-1286
dc.identifier.olddbid212237
dc.identifier.oldhandle10024/195255
dc.identifier.urihttps://www.utupub.fi/handle/11111/43751
dc.identifier.urlhttps://doi.org/10.1016/j.comnet.2025.111600
dc.identifier.urnURN:NBN:fi-fe202601216676
dc.language.isoen
dc.okm.affiliatedauthorMohammad, Tahir
dc.okm.discipline113 Computer and information sciencesen_GB
dc.okm.discipline113 Tietojenkäsittely ja informaatiotieteetfi_FI
dc.okm.internationalcopublicationinternational co-publication
dc.okm.internationalityInternational publication
dc.okm.typeA1 ScientificArticle
dc.publisherElsevier B.V.
dc.publisher.countryNetherlandsen_GB
dc.publisher.countryAlankomaatfi_FI
dc.publisher.country-codeNL
dc.relation.articlenumber111600
dc.relation.doi10.1016/j.comnet.2025.111600
dc.relation.ispartofjournalComputer Networks
dc.relation.volume271
dc.source.identifierhttps://www.utupub.fi/handle/10024/195255
dc.titleOn resource consumption of machine learning in communications network security
dc.year.issued2025

Tiedostot

Näytetään 1 - 1 / 1
Ladataan...
Name:
1-s2.0-S1389128625005675-main.pdf
Size:
5.93 MB
Format:
Adobe Portable Document Format