Secure framework for IoT applications using Deep Learning in fog Computing

被引:10
作者
Chakraborty, Ananya [1 ]
Kumar, Mohit [1 ]
Chaurasia, Nisha [1 ]
机构
[1] Dr BR Ambedkar NIT Jalandhar, Dept Informat Technol, Jalandhar, India
关键词
Internet of Things; Fog computing; Cyber-attacks; Deep Learning; Cloud computing; LOGISTIC-REGRESSION; ATTACK DETECTION; CLOUD; INTERNET;
D O I
10.1016/j.jisa.2023.103569
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An efficient offloading strategy provides a promising solution to latency-sensitive applications in a cloud fog environment, but the fog computing environment is not fully protected and fascinates the attackers due to its dynamic and hazardous environments. Several security-based frameworks have been proposed by the authors in an integrated cloud fog environment for IoT applications to mitigate, prevent and defend against vulnerabilities, but failed to address the mentioned issues. We have proposed a lightweight secure framework using Deep Learning (DL) techniques to detect security attacks and monitor the network traffic for IoT applications in this article. The proposed Artificial Neural Network (ANN) based model is trained and deployed over a cloud platform while the detection mechanism is implemented on the fog Nodes to reduce the possibilities of any vulnerabilities and delayed execution. The proposed lightweight framework performance is analyzed and tested over NSL-KDD datasets and compared with the respective baseline techniques Support Vector Machine (SVM), Logistic Regression and Decision Trees to validate the results. We observed from the experimental results that the proposed framework provides the guarantee to defend against vulnerabilities and surpass the baseline algorithms in terms of QoS parameters. Our framework achieved 99.43% accuracy, 99.26% precision and least (0.7396%) False Alarm rate.
引用
收藏
页数:12
相关论文
共 37 条
[1]   Securing IoT-Empowered Fog Computing Systems: Machine Learning Perspective [J].
Ahanger, Tariq Ahamed ;
Tariq, Usman ;
Ibrahim, Atef ;
Ullah, Imdad ;
Bouteraa, Yassine ;
Gebali, Fayez .
MATHEMATICS, 2022, 10 (08)
[2]   Landscape of IoT security [J].
Aidoo, Andy ;
Schiller, Eryk ;
Fuhrer, Jara ;
Stahl, Jonathan ;
Ziorjen, Michael ;
Stiller, Burkhard .
COMPUTER SCIENCE REVIEW, 2022, 44
[3]   An efficient SVM based DEHO classifier to detect DDoS attack in cloud computing environment [J].
Alam, Gowthul M. M. ;
Kumar, Jerald Nirmal S. ;
Mageswari, Uma R. ;
Raj, Michael T. F. .
COMPUTER NETWORKS, 2022, 215
[4]   Private and Energy-Efficient Decision Tree-Based Disease Detection for Resource-Constrained Medical Users in Mobile Healthcare Network [J].
Alex, Sona ;
Dhanaraj, K. J. ;
Deepthi, P. P. .
IEEE ACCESS, 2022, 10 :17098-17112
[5]   SecOFF-FCIoT: Machine learning based secure offloading in Fog-Cloud of things for smart city applications [J].
Alli, Adam A. ;
Alam, Muhammad Mahbub .
INTERNET OF THINGS, 2019, 7
[6]  
Antony C, 2018, EAI ENDORSED TRANS C, P174150, DOI [10.4108/eai.7-6-2022.174150, 10.4108/eai.7-6-2022.174150, DOI 10.4108/EAI.7-6-2022.174150]
[7]   LR-HIDS: logistic regression host-based intrusion detection system for cloud environments [J].
Besharati, Elham ;
Naderan, Marjan ;
Namjoo, Ehsan .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (09) :3669-3692
[8]   A Review of Machine Learning Algorithms for Cloud Computing Security [J].
Butt, Umer Ahmed ;
Mehmood, Muhammad ;
Shah, Syed Bilal Hussain ;
Amin, Rashid ;
Shaukat, M. Waqas ;
Raza, Syed Mohsan ;
Suh, Doug Young ;
Piran, Md. Jalil .
ELECTRONICS, 2020, 9 (09) :1-25
[9]   Journey from cloud of things to fog of things: Survey, new trends, and research directions [J].
Chakraborty, Ananya ;
Kumar, Mohit ;
Chaurasia, Nisha ;
Gill, Sukhpal Singh .
SOFTWARE-PRACTICE & EXPERIENCE, 2023, 53 (02) :496-551
[10]   A Survey on Intrusion Detection Systems for Fog and Cloud Computing [J].
Chang, Victor ;
Golightly, Lewis ;
Modesti, Paolo ;
Xu, Qianwen Ariel ;
Doan, Le Minh Thao ;
Hall, Karl ;
Boddu, Sreeja .
FUTURE INTERNET, 2022, 14 (03)