Resource Consumption Analysis of Distributed Machine Learning for the Security of Future Networks

dc.contributor.authorHoque, Md Muzammal
dc.contributor.authorAhmad, Ijaz
dc.contributor.authorMohammad, Tahir
dc.contributor.organizationfi=kyberturvallisuusteknologia|en=Cyber Security Engineering|
dc.contributor.organization-code1.2.246.10.2458963.20.28753843706
dc.converis.publication-id477961233
dc.converis.urlhttps://research.utu.fi/converis/portal/Publication/477961233
dc.date.accessioned2025-08-27T21:45:43Z
dc.date.available2025-08-27T21:45:43Z
dc.description.abstract<p>As the network continues to become more complex due to the increased number of devices and ubiquitous connectivity, the trend is shifting from a centralized implementation to decentralization. Similarly, strategies to secure networks are increasingly leaning towards decentralization for its potential to enhance security in future networks with the help of Machine Learning (ML) techniques. In this regard, Distributed Machine Learning (DML) techniques, such as Federated Learning (FL) and Split Learning (SL), are at the forefront of this shift, offering collaborative learning capabilities across network nodes while maintaining data privacy. However, ML requires vast amounts of dedicated computing, memory, bandwidth, and as a consequence, energy resources. Moreover, resource consumption ML techniques used for network security have mostly been overlooked, which presents a glaring challenge for future networks in terms of overall resource utilization. This research emphasizes the importance of understanding the resource consumption patterns of two important DML techniques, i.e., FL and SL, to analyze the consumption of critical resources when deployed for network security. Furthermore, this research draws important insights from a practical comparative analysis of FL and SL in terms of resource consumption patterns and discusses their scope for future network security, such as in 6G, and stirs further research in this area.<br></p>
dc.format.pagerange66
dc.format.pagerange74
dc.identifier.jour-issn1877-0509
dc.identifier.olddbid201060
dc.identifier.oldhandle10024/184087
dc.identifier.urihttps://www.utupub.fi/handle/11111/47555
dc.identifier.urlhttps://doi.org/10.1016/j.procs.2024.11.085
dc.identifier.urnURN:NBN:fi-fe2025082789314
dc.language.isoen
dc.okm.affiliatedauthorMohammad, Tahir
dc.okm.discipline113 Computer and information sciencesen_GB
dc.okm.discipline113 Tietojenkäsittely ja informaatiotieteetfi_FI
dc.okm.internationalcopublicationnot an international co-publication
dc.okm.internationalityInternational publication
dc.okm.typeA4 Conference Article
dc.publisher.countryNetherlandsen_GB
dc.publisher.countryAlankomaatfi_FI
dc.publisher.country-codeNL
dc.relation.conferenceInternational Conference on Emerging Ubiquitous Systems and Pervasive Networks
dc.relation.doi10.1016/j.procs.2024.11.085
dc.relation.ispartofjournalProcedia Computer Science
dc.relation.volume251
dc.source.identifierhttps://www.utupub.fi/handle/10024/184087
dc.titleResource Consumption Analysis of Distributed Machine Learning for the Security of Future Networks
dc.title.book15th International Conference on Emerging Ubiquitous Systems and Pervasive Networks / 14th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare EUSPN/ICTH 2024
dc.year.issued2024

Tiedostot

Näytetään 1 - 1 / 1
Ladataan...
Name:
1-s2.0-S1877050924033192-main.pdf
Size:
937.62 KB
Format:
Adobe Portable Document Format