RepuTE: A soft voting ensemble learning framework for reputation-based attack detection in fog-IoT milieu

被引:18
作者
Verma, Richa [1 ]
Chandra, Shalini [1 ]
机构
[1] BBA Univ, Dept Comp Sci, Lucknow, India
关键词
Trust; Reputation-based attacks; Machine learning; Ensemble learning; Fog computing; IoT security; TRUST MANAGEMENT; INTERNET; THINGS;
D O I
10.1016/j.engappai.2022.105670
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The impetuous expansion of the Internet of Things (IoT) network has resulted in a noticeable increase in the production of sensitive user data. With this, to meet the demand for real-time response, a processing layer is introduced near the user end which is known as the fog computing layer. The fog layer lies in the user's vicinity and thus highly attracts malicious and/or curious intruders. As a result, the trust of the network gets negatively impacted. Motivated by the aforementioned issue, the authors consider Reputation-based trust and propose a RepuTE Framework in the Fog-IoT domain. The given framework consists of a soft voting ensemble learning model that classifies and predicts two popular reputation-based attacks namely, DoS/ DDoS and Sybil attacks. Furthermore, a novel feature selection technique is also presented that selects the most relevant features well in advance. The performance evaluation is done on NSL-KDD, CICDDOS2019, IoTID20, NBaIoT2018, TON_IoT, and UNSW_NB15 benchmarked IoT and network traffic datasets. The comprehensive performance analysis depicts that the proposed model attains 99.99% accuracy and outperforms other recent state-of-the-art works. This indicates the potential of the proposed approach for reputation-based attack filtration in the IoT domain.
引用
收藏
页数:12
相关论文
共 61 条
  • [1] A survey of network anomaly detection techniques
    Ahmed, Mohiuddin
    Mahmood, Abdun Naser
    Hu, Jiankun
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 : 19 - 31
  • [2] Deep Learning-Enabled Threat Intelligence Scheme in the Internet of Things Networks
    Al-Hawawreh, Muna
    Moustafa, Nour
    Garg, Sahil
    Hossain, M. Shamim
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (04): : 2968 - 2981
  • [3] Building a trust model system to avoid cloud services reputation attacks
    Alshammari, Salah T.
    Albeshri, Aiiad
    Alsubhi, Khalid
    [J]. EGYPTIAN INFORMATICS JOURNAL, 2021, 22 (04) : 493 - 503
  • [4] Trust Management Systems in Cloud Services Environment: Taxonomy of Reputation Attacks and Defense Mechanisms
    Alshammari, Salah T.
    Alsubhi, Khalid
    Aljahdali, Hani Moaiteq Abdullah
    Alghamdi, Ahmed Mohammed
    [J]. IEEE ACCESS, 2021, 9 : 161488 - 161506
  • [5] [Anonymous], 2022, TECHJURY
  • [6] Big Data computing and clouds: Trends and future directions
    Assuncao, Marcos D.
    Calheiros, Rodrigo N.
    Bianchi, Silvia
    Netto, Marco A. S.
    Buyya, Rajkumar
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2015, 79-80 : 3 - 15
  • [7] SIMAD: Secure Intelligent Method for IoT-Fog Environments Attacks Detection
    Ben Daoud, Wided
    Mahfoudhi, Sami
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (02): : 2727 - 2742
  • [8] Bhati Bhoopesh Singh, 2020, Intelligent Computing in Engineering. Select Proceedings of RICE 2019. Advances in Intelligent Systems and Computing (AISC 1125), P213, DOI 10.1007/978-981-15-2780-7_25
  • [9] Booij Tim M., 2021, Em: IEEE Internet of Things Journal
  • [10] A Survey on Trust Management for Mobile Ad Hoc Networks
    Cho, Jin-Hee
    Swami, Ananthram
    Chen, Ing-Ray
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2011, 13 (04): : 562 - 583