Enhancement of an IoT hybrid intrusion detection system based on fog-to-cloud computing

被引:22
作者
Mohamed, Doaa [1 ]
Ismael, Osama [1 ]
机构
[1] Cairo Univ, Fac Comp & Artificial Intelligence, Dept Informat Syst, Giza, Egypt
来源
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS | 2023年 / 12卷 / 01期
关键词
Fog computing; Internet of things; Genetic algorithm; Intrusion detection; Neural network; Standard deviation; ALGORITHM; INTERNET;
D O I
10.1186/s13677-023-00420-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, with the proliferation of internet of things-connected devices, the scope of cyber-attacks on the internet of things has grown exponentially. So, it makes it a necessity to develop an efficient and accurate intrusion detection system that should be fast, dynamic, and scalable in an internet of things environment. On the other hand, Fog computing is a decentralized platform that extends Cloud computing to deal with the inherent issues of the Cloud computing. As well, maintaining a high level of security is critical in order to ensure secure and reliable communication between Fog nodes and internet of things devices. To address this issue, we present an intrusion detection method based on artificial neural networks and genetic algorithms to efficiently detect various types of network intrusions on local Fog nodes. Through this approach, we applied genetic algorithms to optimize the interconnecting weights of the network and the biases associated with each neuron. Therefore, it can quickly and effectively establish a back-propagation neural network model. Moreover, the distributed architecture of fog computing enables the distribution of the intrusion detection system over local Fog nodes with a centralized Cloud, which achieves faster attack detection than the Cloud intrusion detection mechanism. A set of experiments were conducted on the Raspberry Pi4 as a Fog node, based on the UNSW-NB15 and ToN_IoT data sets for binary-class classification, which showed that the optimized weights and biases achieved better performance than those who used the neural network without optimization. The optimized model showed interoperability, flexibility, and scalability. Furthermore, achieving a higher intrusion detection rate through decreasing the neural network error rate and increasing the true positive rate is also possible. According to the experiments, the suggested approach produces better outcomes in terms of detection accuracy and processing time. In this case, the proposed approach achieved an 16.35% and 37.07% reduction in execution time for both data sets, respectively, compared to other state-of-the-art methods, which enhanced the acceleration of the convergence process and saved processing power.
引用
收藏
页数:13
相关论文
共 34 条
[1]   A New Ensemble-Based Intrusion Detection System for Internet of Things [J].
Abbas, Adeel ;
Khan, Muazzam A. ;
Latif, Shahid ;
Ajaz, Maria ;
Shah, Awais Aziz ;
Ahmad, Jawad .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2022, 47 (02) :1805-1819
[2]  
Alghayadh F., 2021, Adv. Internet Things, V11, P10, DOI DOI 10.4236/AIT.2021.111002
[3]   Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model [J].
Aljawarneh, Shadi ;
Aldwairi, Monther ;
Yassein, Muneer Bani .
JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 25 :152-160
[4]  
Amaral JP, 2014, IEEE ICC, P1796, DOI 10.1109/ICC.2014.6883583
[5]   Hypergraph clustering model-based association analysis of DDOS attacks in fog computing intrusion detection system [J].
An, Xingshuo ;
Su, Jingtao ;
Lue, Xing ;
Lin, Fuhong .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,
[6]  
[Anonymous], 2020, TON IOT DATASETS
[7]  
Gang Ke, 2014, Applied Mechanics and Materials, V599-601, P726, DOI 10.4028/www.scientific.net/AMM.599-601.726
[8]  
Han J, 2012, MOR KAUF D, P1
[9]  
Hindy H, 2018, WORKING PAPER ARXIVO
[10]   "Why Should I Trust Your IDS?": An Explainable Deep Learning Framework for Intrusion Detection Systems in Internet of Things Networks [J].
Houda, Zakaria Abou El ;
Brik, Bouziane ;
Khoukhi, Lyes .
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2022, 3 :1164-1176