Detecting attacks on the internet of things network in the computing fog layer with an embedded learning approach based on clustering and blockchain

被引:0
|
作者
Abdolmanan, Goushlavandani Babaei [1 ]
Bayat, Peyman [1 ]
Ekbatanifard, Gholamhossein [1 ,2 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Rasht Branch, Rasht, Iran
[2] Islamic Azad Univ, Dept Comp Engn, Lahijan Branch, Lahijan, Gilan, Iran
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2025年 / 28卷 / 04期
关键词
Intrusion detection system; Distributed architecture; Fog computing; Internet of things; Clustering algorithms; Blockchain technology; INTRUSION DETECTION; DATA AUGMENTATION; SECURITY; SYSTEM;
D O I
10.1007/s10586-024-04898-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The internet of things (IoT) is exposed to various cyber attacks that target its security. An intrusion detection system (IDS) in the IoT must be able to detect attacks and their types and identify complex and new attacks. The IDS in the IOT must have a distributed architecture to process large network traffic. Training machine learning methods and learning key features increases the accuracy of the IDS. This manuscript proposes a distributed IDS deployed within the fog layer. The initial step involves leveraging game theory and Generative Adversarial Networks (GANs) and traffic balancing. Subsequently, enhanced with opposition-based learning, the Jellyfish Search (JS) optimizer algorithm facilitates feature selection within fog nodes. Utilizing majority voting and weighting mechanisms, fog nodes determine optimal feature vectors. To prevent manipulation, feature vectors are exchanged via blockchain. Each fog node employs three classifiers-Multi-Layer Perceptron (MLP), Random Forest (RF), and XGBoost-utilizing ensemble learning techniques. Fog nodes maintain blacklists, updating them via blockchain. The Embedded Learning + IJSO (EJSO) framework offers benefits such as network traffic balancing, intelligent dimension reduction, embedded learning, and privacy preservation through blockchain integration. Experimental evaluation conducted on NSL-KDD and UNSW-NB15 datasets demonstrates the efficacy of the EJSO method in attack detection. The introduced clustering method, incorporating fuzzy clustering and the Arithmetic Optimization Algorithm (AOA), showcases high accuracy, sensitivity, and precision rates. Specifically, in the NSL-KDD dataset, the EJSO method achieves accuracy, sensitivity, and precision rates of 99.87, 99.66, and 99.12%, respectively. In the UNSW-NB15 dataset, these rates stand at 98.82, 98.74, and 98.59%, respectively. Additionally, the EJSO method outperforms existing techniques regarding dimension reduction and attack detection accuracy, surpassing methods such as LSTM, GA + SVM, transfer learning, and neural networks.
引用
收藏
页数:31
相关论文
共 50 条
  • [41] Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing
    Sarra Cherbal
    Abdelhak Zier
    Sara Hebal
    Lemia Louail
    Boubakeur Annane
    The Journal of Supercomputing, 2024, 80 : 3738 - 3816
  • [42] Machine Learning Techniques for Security of Internet of Things (IoT) and Fog Computing Systems
    Moh, Melody
    Raju, Robinson
    PROCEEDINGS 2018 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS), 2018, : 709 - 715
  • [43] Blockchain-Based Programmable Fog Architecture for Future Internet of Things Applications
    Nayak, Sharmistha
    Ahmed, Nurzaman
    Misra, Sudip
    Choo, Kim-Kwang Raymond
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [44] Fog Computing Based Face Identification and Resolution Scheme in Internet of Things
    Hu, Pengfei
    Ning, Huansheng
    Qiu, Tie
    Zhang, Yanfei
    Luo, Xiong
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (04) : 1910 - 1920
  • [45] Mobile Robot Object Recognition in The Internet of Things based on Fog Computing
    Fu, Meixia
    Sun, Songlin
    Ni, Kaili
    Hou, Xiaoying
    2019 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2019, : 1838 - 1842
  • [46] Medical Warning System Based on Internet of Things Using Fog Computing
    Azimi, Iman
    Anzanpour, Arman
    Rahmani, Amir M.
    Liljeberg, Pasi
    Salakoski, Tapio
    2016 INTERNATIONAL WORKSHOP ON BIG DATA AND INFORMATION SECURITY (IWBIS), 2016, : 19 - 24
  • [47] FOCUS: A Fog Computing-based Security System for the Internet of Things
    Alharbi, Salem
    Rodriguez, Peter
    Maharaja, Rajaputhri
    Iyer, Prashant
    Bose, Nivethitha
    Ye, Zilong
    2018 15TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2018,
  • [48] Coverage Optimization Based on Airborne Fog Computing for Internet of Medical Things
    Tang, Chaogang
    Zhu, Chunsheng
    Guizani, Mohsen
    IEEE SYSTEMS JOURNAL, 2023, 17 (03): : 4348 - 4359
  • [49] Confidential computing in cloud/fog-based Internet of Things scenarios
    Gomes Valadares, Dalton Cezane
    Will, Newton Carlos
    Spohn, Marco Aurelio
    de Souza Santos, Danilo Freire
    Perkusich, Angelo
    Gorgonio, Kyller Costa
    INTERNET OF THINGS, 2022, 19
  • [50] TIME TO DEATH-BASED SCHEDULING FOR INTERNET OF THINGS IN FOG COMPUTING
    Kadhim A.J.
    Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika), 2021, 80 (05): : 29 - 40