Detecting attacks on the internet of things network in the computing fog layer with an embedded learning approach based on clustering and blockchain

被引:0
|
作者
Abdolmanan, Goushlavandani Babaei [1 ]
Bayat, Peyman [1 ]
Ekbatanifard, Gholamhossein [1 ,2 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Rasht Branch, Rasht, Iran
[2] Islamic Azad Univ, Dept Comp Engn, Lahijan Branch, Lahijan, Gilan, Iran
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2025年 / 28卷 / 04期
关键词
Intrusion detection system; Distributed architecture; Fog computing; Internet of things; Clustering algorithms; Blockchain technology; INTRUSION DETECTION; DATA AUGMENTATION; SECURITY; SYSTEM;
D O I
10.1007/s10586-024-04898-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The internet of things (IoT) is exposed to various cyber attacks that target its security. An intrusion detection system (IDS) in the IoT must be able to detect attacks and their types and identify complex and new attacks. The IDS in the IOT must have a distributed architecture to process large network traffic. Training machine learning methods and learning key features increases the accuracy of the IDS. This manuscript proposes a distributed IDS deployed within the fog layer. The initial step involves leveraging game theory and Generative Adversarial Networks (GANs) and traffic balancing. Subsequently, enhanced with opposition-based learning, the Jellyfish Search (JS) optimizer algorithm facilitates feature selection within fog nodes. Utilizing majority voting and weighting mechanisms, fog nodes determine optimal feature vectors. To prevent manipulation, feature vectors are exchanged via blockchain. Each fog node employs three classifiers-Multi-Layer Perceptron (MLP), Random Forest (RF), and XGBoost-utilizing ensemble learning techniques. Fog nodes maintain blacklists, updating them via blockchain. The Embedded Learning + IJSO (EJSO) framework offers benefits such as network traffic balancing, intelligent dimension reduction, embedded learning, and privacy preservation through blockchain integration. Experimental evaluation conducted on NSL-KDD and UNSW-NB15 datasets demonstrates the efficacy of the EJSO method in attack detection. The introduced clustering method, incorporating fuzzy clustering and the Arithmetic Optimization Algorithm (AOA), showcases high accuracy, sensitivity, and precision rates. Specifically, in the NSL-KDD dataset, the EJSO method achieves accuracy, sensitivity, and precision rates of 99.87, 99.66, and 99.12%, respectively. In the UNSW-NB15 dataset, these rates stand at 98.82, 98.74, and 98.59%, respectively. Additionally, the EJSO method outperforms existing techniques regarding dimension reduction and attack detection accuracy, surpassing methods such as LSTM, GA + SVM, transfer learning, and neural networks.
引用
收藏
页数:31
相关论文
共 50 条
  • [1] Privacy protection for fog computing and the internet of things data based on blockchain
    Liu, Yanhui
    Zhang, Jianbiao
    Zhan, Jing
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (02): : 1331 - 1345
  • [2] Privacy protection for fog computing and the internet of things data based on blockchain
    Yanhui Liu
    Jianbiao Zhang
    Jing Zhan
    Cluster Computing, 2021, 24 : 1331 - 1345
  • [3] A clustering method for locating services based on fog computing for the internet of things
    Ghaferi, Esmaeil
    Malekhosseini, Razieh
    Rad, Farhad
    Bagherifard, Karamollah
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (11): : 13756 - 13779
  • [4] A clustering method for locating services based on fog computing for the internet of things
    Esmaeil Ghaferi
    Razieh Malekhosseini
    Farhad Rad
    Karamollah Bagherifard
    The Journal of Supercomputing, 2022, 78 : 13756 - 13779
  • [5] A machine learning-based intrusion detection for detecting internet of things network attacks
    Saheed, Yakub Kayode
    Abiodun, Aremu Idris
    Misra, Sanjay
    Holone, Monica Kristiansen
    Colomo-Palacios, Ricardo
    ALEXANDRIA ENGINEERING JOURNAL, 2022, 61 (12) : 9395 - 9409
  • [6] Sharded Blockchain for Collaborative Computing in the Internet of Things: Combined of Dynamic Clustering and Deep Reinforcement Learning Approach
    Yang, Zhaoxin
    Yang, Ruizhe
    Yu, F. Richard
    Li, Meng
    Zhang, Yanhua
    Teng, Yinglei
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (17) : 16494 - 16509
  • [7] Fog-Embedded Deep Learning for the Internet of Things
    Lyu, Lingjuan
    Bezdek, James C.
    He, Xuanli
    Jin, Jiong
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (07) : 4206 - 4215
  • [8] FUSION-Fog Computing and Blockchain for Trusted Industrial Internet of Things
    Ceccarelli, Andrea
    Cinque, Marcello
    Esposito, Christian
    Foschini, Luca
    Giannelli, Carlo
    Lollini, Paolo
    IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2022, 69 (06) : 2944 - 2958
  • [9] Cognitive Balance for Fog Computing Resource in Internet of Things: An Edge Learning Approach
    Liao, Siyi
    Wu, Jun
    Mumtaz, Shahid
    Li, Jianhua
    Morello, Rosario
    Guizani, Mohsen
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 21 (05) : 1596 - 1608
  • [10] SMART FOG: FOG COMPUTING FRAMEWORK FOR UNSUPERVISED CLUSTERING ANALYTICS IN WEARABLE INTERNET OF THINGS
    Borthakur, Debanjan
    Dubey, Harishchandra
    Constant, Nicholas
    Mahler, Leslie
    Mankodiya, Kunal
    2017 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP 2017), 2017, : 472 - 476