NADA: new architecture for detecting DoS and DDoS attacks in fog computing

被引:1
作者
Azizpour, Saeed [1 ]
Majma, MohammadReza [1 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Pardis Branch, Pardis, Iran
关键词
Fog computing; DoS; DDoS; Deep learning; Genetic algorithm; FEATURE-SELECTION; INTERNET; HYPERGRAPH; FRAMEWORK; SECURITY; NETWORK;
D O I
10.1007/s11416-022-00431-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, fog computing as a new part of the Internet of Things plays a vital and significant role in the development of technology in cities and smart homes, various industries, medical care, security and etc. This technology, like other emerging technologies, has security challenges. One of the most important attacks on fog nodes is the DoS and DDoS attacks. This article proposes new method for DoS and DDoS attack detection by combining machine learning techniques, DT and KNN with CNN algorithm. We have improved the performance of the intrusion detection systems in the Fog computing infrastructure by voting mechanism for DoS and DDoS detection. NADA is capable of detecting DoS and DDoS attacks with highest correct rate (about 99%). NADA can be applied in both edge and fog nodes. The proposed approach uses deep learning techniques and biological genetic algorithm for detecting suspicious traffic. Then the suspicious traffic applies to CNN, DT, and KNN as an input and based on the available samples, maximum vote-based attack detection validation is performed. Finally, we evaluated our method (NADA) and calculate criteria such as Precision, Accuracy, Recall, and Error. By simulating NADA, we observed that metrics cited improved on average by about 7% in comparison with other methods.
引用
收藏
页码:51 / 64
页数:14
相关论文
共 30 条
[21]   A Hypergraph and Arithmetic Residue-based Probabilistic Neural Network for classification in Intrusion Detection Systems [J].
Raman, M. R. Gauthama ;
Somu, Nivethitha ;
Kirthivasan, Kannan ;
Sriram, V. S. Shankar .
NEURAL NETWORKS, 2017, 92 :89-97
[22]   Fog-Based Attack Detection Framework for Internet of Things Using Deep Learning [J].
Samy, Ahmed ;
Yu, Haining ;
Zhang, Hongli .
IEEE ACCESS, 2020, 8 :74571-74585
[23]   REATO: REActing TO Denial of Service attacks in the Internet of Things [J].
Sicari, Sabrina ;
Rizzardi, Alessandra ;
Miorandi, Daniele ;
Coen-Porisini, Alberto .
COMPUTER NETWORKS, 2018, 137 :37-48
[24]   Hierarchical Security Paradigm for IoT Multiaccess Edge Computing [J].
Singh, Jaspreet ;
Bello, Yahuza ;
Hussein, Ahmed Refaey ;
Erbad, Aiman ;
Mohamed, Amr .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07) :5794-5805
[25]   An intrusion detection system using network traffic profiling and online sequential extreme learning machine [J].
Singh, Raman ;
Kumar, Harish ;
Singla, R. K. .
EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (22) :8609-8624
[26]  
Singh S., 2020, 2020 IEEE INT C COMM, P1
[27]   Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection [J].
Tsang, Chi-Ho ;
Kwong, Sam ;
Wang, Hanli .
PATTERN RECOGNITION, 2007, 40 (09) :2373-2391
[28]  
Ullah A., 2021, INT C INFORM TECHNOL
[29]  
Zecheng He, 2017, 2017 IEEE 4th International Conference on Cyber-Security and Cloud Computing (CSCloud), P114, DOI 10.1109/CSCloud.2017.58
[30]  
Zheng X., 2018, INT C CLOUD COMPUTIN