A Lightweight Intrusion Detection System Using Convolutional Neural Network and Long Short-Term Memory in Fog Computing

被引:3
作者
Alzahrani, Hawazen [1 ]
Sheltami, Tarek [1 ]
Barnawi, Abdulaziz [2 ]
Imam, Muhammad [2 ]
Yaser, Ansar [3 ]
机构
[1] King Fahd Univ Petr & Minerals, Interdisciplinary Res Ctr Smart Mobil & Logist, Comp Engn Dept, Dhahran 31261, Saudi Arabia
[2] King Fahd Univ Petr & Minerals, Interdisciplinary Res Ctr Intelligent Secure Syst, Comp Engn Dept, Dhahran 31261, Saudi Arabia
[3] Hasselt Univ, Transportat Res Inst IMOB, B-3500 Hasselt, Belgium
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 80卷 / 03期
关键词
Intrusion detection; fog computing; CNN; LSTM; energy consumption; INTERNET; THINGS; SECURITY; ATTACK; MECHANISM;
D O I
10.32604/cmc.2024.054203
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) links various devices to digital services and significantly improves the quality of our lives. However, as IoT connectivity is growing rapidly, so do the risks of network vulnerabilities and threats. Many interesting Intrusion Detection Systems (IDSs) are presented based on machine learning (ML) techniques to overcome this problem. Given the resource limitations of fog computing environments, a lightweight IDS is essential. This paper introduces a hybrid deep learning (DL) method that combines convolutional neural networks (CNN) and long short-term memory (LSTM) to build an energy-aware, anomaly-based IDS. We test this system on a recent dataset, focusing on reducing overhead while maintaining high accuracy and a low false alarm rate. We compare CICIoT2023, KDD-99 and NSL-KDD datasets to evaluate the performance of the proposed IDS model based on key metrics, including latency, energy consumption, false alarm rate and detection rate metrics. Our findings show an accuracy rate over 92% and a false alarm rate below 0.38%. These results demonstrate that our system provides strong security without excessive resource use. The practicality of deploying IDS with limited resources is demonstrated by the successful implementation of IDS functionality on a Raspberry Pi acting as a Fog node. The proposed lightweight model, with a maximum power consumption of 6.12 W, demonstrates its potential to operate effectively on energy-limited devices such as low-power fog nodes or edge devices. We prioritize energy efficiency while maintaining high accuracy, distinguishing our scheme from existing approaches. Extensive experiments demonstrate a significant reduction in false positives, ensuring accurate identification of genuine security threats while minimizing unnecessary alerts.
引用
收藏
页码:4703 / 4728
页数:26
相关论文
共 53 条
[1]  
Abdussami A. A., 2021, Indian J. Comput. Sci. Eng., V12, P1847, DOI [10.21817/indjcse/2021/v12i6/211206191, DOI 10.21817/INDJCSE/2021/V12I6/211206191]
[2]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28
[3]   Human Immune-Based Intrusion Detection and Prevention System for Fog Computing [J].
Aliyu, Farouq ;
Sheltami, Tarek ;
Deriche, Mohamed ;
Nasser, Nidal .
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2022, 30 (01)
[4]   Detecting Man-in-the-Middle Attack in Fog Computing for Social Media [J].
Aliyu, Farouq ;
Sheltami, Tarek ;
Mahmoud, Ashraf ;
Al-Awami, Louai ;
Yasar, Ansar .
CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01) :1159-1181
[5]  
Almaiah A., 2020, J THEOR APPL INF TEC, V15, P98
[6]   Anomaly Detection in Fog Computing Architectures Using Custom Tab Transformer for Internet of Things [J].
Alzahrani, Abdullah I. A. ;
Al-Rasheed, Amal ;
Ksibi, Amel ;
Ayadi, Manel ;
Asiri, Mashael M. M. ;
Zakariah, Mohammed .
ELECTRONICS, 2022, 11 (23)
[7]  
Atlam H. F., 2018, Big Data and Cognitive Computing, V2, P10, DOI DOI 10.3390/BDCC2020010
[8]   Fog-Assisted Deep-Learning-Empowered Intrusion Detection System for RPL-Based Resource-Constrained Smart Industries [J].
Attique, Danish ;
Wang, Hao ;
Wang, Ping .
SENSORS, 2022, 22 (23)
[9]   A Novel Cyber Security Model Using Deep Transfer Learning [J].
Cavusoglu, Unal ;
Akgun, Devrim ;
Hizal, Selman .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2024, 49 (03) :3623-3632
[10]   A deep learning based secured energy management framework within a smart island [J].
Chang, Qianqian ;
Ma, Xiaolin ;
Chen, Ming ;
Gao, Xinwei ;
Dehghani, Moslem .
SUSTAINABLE CITIES AND SOCIETY, 2021, 70 (70)