NADA: new architecture for detecting DoS and DDoS attacks in fog computing

被引:1
作者
Azizpour, Saeed [1 ]
Majma, MohammadReza [1 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Pardis Branch, Pardis, Iran
关键词
Fog computing; DoS; DDoS; Deep learning; Genetic algorithm; FEATURE-SELECTION; INTERNET; HYPERGRAPH; FRAMEWORK; SECURITY; NETWORK;
D O I
10.1007/s11416-022-00431-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, fog computing as a new part of the Internet of Things plays a vital and significant role in the development of technology in cities and smart homes, various industries, medical care, security and etc. This technology, like other emerging technologies, has security challenges. One of the most important attacks on fog nodes is the DoS and DDoS attacks. This article proposes new method for DoS and DDoS attack detection by combining machine learning techniques, DT and KNN with CNN algorithm. We have improved the performance of the intrusion detection systems in the Fog computing infrastructure by voting mechanism for DoS and DDoS detection. NADA is capable of detecting DoS and DDoS attacks with highest correct rate (about 99%). NADA can be applied in both edge and fog nodes. The proposed approach uses deep learning techniques and biological genetic algorithm for detecting suspicious traffic. Then the suspicious traffic applies to CNN, DT, and KNN as an input and based on the available samples, maximum vote-based attack detection validation is performed. Finally, we evaluated our method (NADA) and calculate criteria such as Precision, Accuracy, Recall, and Error. By simulating NADA, we observed that metrics cited improved on average by about 7% in comparison with other methods.
引用
收藏
页码:51 / 64
页数:14
相关论文
共 30 条
[1]   DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation [J].
Aamir, Muhammad ;
Zaidi, Syed Mustafa Ali .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (06) :761-785
[2]   Fog Computing Advancement: Concept, Architecture, Applications, Advantages, and Open Issues [J].
Abdali, Taj-Aldeen Naser ;
Hassan, Rosilah ;
Aman, Azana Hafizah Mohd ;
Quang Ngoc Nguyen .
IEEE ACCESS, 2021, 9 :75961-75980
[3]   A Review of Fog Computing and Machine Learning: Concepts, Applications, Challenges, and Open Issues [J].
Abdulkareem, Karrar Hameed ;
Mohammed, Mazin Abed ;
Gunasekaran, Saraswathy Shamini ;
Al-Mhiqani, Mohammed Nasser ;
Mutlag, Ammar Awad ;
Mostafa, Salama A. ;
Ali, Nabeel Salih ;
Ibrahim, Dheyaa Ahmed .
IEEE ACCESS, 2019, 7 :153123-153140
[4]   Deep Pain: Exploiting Long Short-Term Memory Networks for Facial Expression Classification [J].
Rodriguez, Pau ;
Cucurull, Guillem ;
Gonzalez, Jordi ;
Gonfaus, Josep M. ;
Nasrollahi, Kamal ;
Moeslund, Thomas B. ;
Roca, F. Xavier .
IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (05) :3314-3324
[5]  
Alrashdi I, 2019, 2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), P515, DOI [10.1109/uemcon47517.2019.8992963, 10.1109/UEMCON47517.2019.8992963]
[6]  
[Anonymous], 2018, P 5 IEEE SYSTEMS MAN, DOI DOI 10.1109/ICCCNT.2018.8494060
[7]   An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization [J].
Bamakan, Seyed Mojtaba Hosseini ;
Wang, Huadong ;
Tian Yingjie ;
Shi, Yong .
NEUROCOMPUTING, 2016, 199 :90-102
[8]  
de la Hoz E, 2013, LECT NOTES COMPUT SC, V8073, P103, DOI 10.1007/978-3-642-40846-5_11
[9]  
Deepali, 2017, 2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), P534, DOI 10.1109/RTEICT.2017.8256654
[10]  
Delfin S, 2019, PROCEEDINGS OF THE 2019 3RD INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2019), P1106, DOI [10.1109/iccmc.2019.8819633, 10.1109/ICCMC.2019.8819633]