Detecting attacks on the internet of things network in the computing fog layer with an embedded learning approach based on clustering and blockchain

被引:0
|
作者
Abdolmanan, Goushlavandani Babaei [1 ]
Bayat, Peyman [1 ]
Ekbatanifard, Gholamhossein [1 ,2 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Rasht Branch, Rasht, Iran
[2] Islamic Azad Univ, Dept Comp Engn, Lahijan Branch, Lahijan, Gilan, Iran
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2025年 / 28卷 / 04期
关键词
Intrusion detection system; Distributed architecture; Fog computing; Internet of things; Clustering algorithms; Blockchain technology; INTRUSION DETECTION; DATA AUGMENTATION; SECURITY; SYSTEM;
D O I
10.1007/s10586-024-04898-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The internet of things (IoT) is exposed to various cyber attacks that target its security. An intrusion detection system (IDS) in the IoT must be able to detect attacks and their types and identify complex and new attacks. The IDS in the IOT must have a distributed architecture to process large network traffic. Training machine learning methods and learning key features increases the accuracy of the IDS. This manuscript proposes a distributed IDS deployed within the fog layer. The initial step involves leveraging game theory and Generative Adversarial Networks (GANs) and traffic balancing. Subsequently, enhanced with opposition-based learning, the Jellyfish Search (JS) optimizer algorithm facilitates feature selection within fog nodes. Utilizing majority voting and weighting mechanisms, fog nodes determine optimal feature vectors. To prevent manipulation, feature vectors are exchanged via blockchain. Each fog node employs three classifiers-Multi-Layer Perceptron (MLP), Random Forest (RF), and XGBoost-utilizing ensemble learning techniques. Fog nodes maintain blacklists, updating them via blockchain. The Embedded Learning + IJSO (EJSO) framework offers benefits such as network traffic balancing, intelligent dimension reduction, embedded learning, and privacy preservation through blockchain integration. Experimental evaluation conducted on NSL-KDD and UNSW-NB15 datasets demonstrates the efficacy of the EJSO method in attack detection. The introduced clustering method, incorporating fuzzy clustering and the Arithmetic Optimization Algorithm (AOA), showcases high accuracy, sensitivity, and precision rates. Specifically, in the NSL-KDD dataset, the EJSO method achieves accuracy, sensitivity, and precision rates of 99.87, 99.66, and 99.12%, respectively. In the UNSW-NB15 dataset, these rates stand at 98.82, 98.74, and 98.59%, respectively. Additionally, the EJSO method outperforms existing techniques regarding dimension reduction and attack detection accuracy, surpassing methods such as LSTM, GA + SVM, transfer learning, and neural networks.
引用
收藏
页数:31
相关论文
共 50 条
  • [21] A deep learning approach for detecting security attacks on blockchain
    Scicchitano, Francesco
    Liguori, Angelica
    Guarascio, Massimo
    Ritacco, Ettore
    Manco, Giuseppe
    CEUR Workshop Proceedings, 2020, 2597 : 212 - 222
  • [22] An embedded low-cost solution for a fog computing device on the Internet of Things
    d'Agostino, Pietro
    Violante, Massimo
    Macario, Gianpaolo
    2023 EIGHTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING, FMEC, 2023, : 284 - 291
  • [23] Blockchain Sharding Strategy for Collaborative Computing Internet of Things Combining Dynamic Clustering and Deep Reinforcement Learning
    Yang, Zhaoxin
    Li, Meng
    Yang, Ruizhe
    Yu, F. Richard
    Zhang, Yanhua
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 2786 - 2791
  • [24] FogChain: A Fog Computing Architecture Integrating Blockchain and Internet of Things for Personal Health Records
    Mayer, Andre Henrique
    Rodrigues, Vinicius Facco
    da Costa, Cristiano Andre
    Righi, Rodrigo da Rosa
    Roehrs, Alex
    Antunes, Rodolfo Stoffel
    IEEE ACCESS, 2021, 9 : 122723 - 122737
  • [25] Machine learning based intrusion detection framework for detecting security attacks in internet of things
    Kantharaju, V.
    Suresh, H.
    Niranjanamurthy, M.
    Ansarullah, Syed Immamul
    Amin, Farhan
    Alabrah, Amerah
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [26] Environmental Monitoring Based on Fog Computing Paradigm and Internet of Things
    Wang, Wendong
    Feng, Cheng
    Zhang, Bo
    Gao, Hui
    IEEE ACCESS, 2019, 7 : 127154 - 127165
  • [27] UAVFog: A UAV-Based Fog Computing for Internet of Things
    Mohamed, Nader
    Al-Jaroodi, Jameela
    Jawhar, Imad
    Noura, Hassan
    Mahmoud, Sara
    2017 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTED, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2017,
  • [28] Research on Internet of Things security architecture based on fog computing
    Mai, Trung Dong
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (11)
  • [29] A blockchain security scheme to support fog-based internet of things
    Mohapatra, Debasis
    Bhoi, Sourav Kumar
    Jena, Kalyan Kumar
    Nayak, Soumya Ranjan
    Singh, Akansha
    MICROPROCESSORS AND MICROSYSTEMS, 2022, 89
  • [30] Deep learning for internet of things in fog computing: Survey and Open Issues
    Tmamna, Jihene
    Ben Ayed, Emna
    Ben Ayed, Mounir
    2020 5TH INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR SIGNAL AND IMAGE PROCESSING (ATSIP'2020), 2020,