Integrating edge computing, data science and advanced cyber defense for autonomous threat mitigation

Ajayi, Rhoda and Masunda, Martha (2025) Integrating edge computing, data science and advanced cyber defense for autonomous threat mitigation. International Journal of Science and Research Archive, 15 (2). 063-080. ISSN 2582-8185

[thumbnail of IJSRA-2025-1292.pdf] Article PDF
IJSRA-2025-1292.pdf - Published Version
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download ( 751kB)

Abstract

The growing proliferation of connected devices and distributed networks has amplified the complexity and vulnerability of modern cyber ecosystems. Traditional centralized security architectures, often reactive and bandwidth-dependent, are increasingly inadequate to manage the velocity and sophistication of cyber threats targeting critical systems. In this evolving landscape, the integration of edge computing, data science, and advanced cyber defense methodologies emerges as a pivotal strategy for achieving autonomous, real-time threat mitigation. Edge computing decentralizes data processing, bringing computational power closer to the source of data generation, thereby reducing latency and enabling localized, context-aware security interventions. This paper examines the synergistic application of edge analytics, machine learning models, and adaptive cybersecurity frameworks to create resilient, autonomous defense architectures. It explores how real-time anomaly detection, behavioral profiling, and predictive analytics, deployed at the network edge, can proactively identify, contain, and neutralize cyber threats before they propagate across broader infrastructures. The study also discusses advanced techniques such as federated learning, zero-trust architectures, and AI-driven threat hunting as enablers of scalable, decentralized cyber resilience. Drawing on case studies from critical sectors including healthcare, industrial control systems, and smart city infrastructures, the paper demonstrates how integrated edge and data science approaches significantly reduce response times, bandwidth burdens, and exposure to emerging threats. Finally, it critically evaluates the challenges of implementing autonomous cyber defense systems, including issues of model drift, adversarial attacks, and ethical governance. The findings affirm that the convergence of edge computing and intelligent cybersecurity is foundational to the next generation of proactive, self-healing cyber defense ecosystems.

Item Type: Article
Official URL: https://doi.org/10.30574/ijsra.2025.15.2.1292
Uncontrolled Keywords: Edge Computing Security; Autonomous Threat Mitigation; Cyber Defense Architecture; Machine Learning for Cybersecurity; Real-Time Anomaly Detection; Federated Learning in Security
Depositing User: Editor IJSRA
Date Deposited: 22 Jul 2025 23:34
Related URLs:
URI: https://eprint.scholarsrepository.com/id/eprint/1744