Optimized Machine Learning-Based Intrusion Detection System for Fog and Edge Computing Environment

被引:49
作者
Alzubi, Omar A. [1 ]
Alzubi, Jafar A. [2 ]
Alazab, Moutaz [3 ]
Alrabea, Adnan [1 ]
Awajan, Albara [3 ]
Qiqieh, Issa [2 ]
机构
[1] Al Balqa Appl Univ, Prince Abdullah Bin Ghazi Fac Informat & Commun T, Al Salt 19117, Jordan
[2] Al Balqa Appl Univ, Fac Engn, Al Salt 19117, Jordan
[3] Al Balqa Appl Univ, Fac Artificial Intelligence, Al Salt 19117, Jordan
关键词
security; machine learning; fog computing; intrusion detection system; optimization; feature selection; edge computing; INTERNET; SECURITY;
D O I
10.3390/electronics11193007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a new paradigm, fog computing (FC) has several characteristics that set it apart from the cloud computing (CC) environment. Fog nodes and edge computing (EC) hosts have limited resources, exposing them to cyberattacks while processing large streams and sending them directly to the cloud. Intrusion detection systems (IDS) can be used to protect against cyberattacks in FC and EC environments, while the large-dimensional features in networking data make processing the massive amount of data difficult, causing lower intrusion detection efficiency. Feature selection is typically used to alleviate the curse of dimensionality and has no discernible effect on classification outcomes. This is the first study to present an Effective Seeker Optimization model in conjunction with a Machine Learning-Enabled Intrusion Detection System (ESOML-IDS) model for the FC and EC environments. The ESOML-IDS model primarily designs a new ESO-based feature selection (FS) approach to choose an optimal subset of features to identify the occurrence of intrusions in the FC and EC environment. We also applied a comprehensive learning particle swarm optimization (CLPSO) with Denoising Autoencoder (DAE) for the detection of intrusions. The development of the ESO algorithm for feature subset selection and the DAE algorithm for parameter optimization results in improved detection efficiency and effectiveness. The experimental results demonstrated the improved outcomes of the ESOML-IDS model over recent approaches.
引用
收藏
页数:16
相关论文
共 28 条
[1]   Deep-IFS: Intrusion Detection Approach for Industrial Internet of Things Traffic in Fog Environment [J].
Abdel-Basset, Mohamed ;
Chang, Victor ;
Hawash, Hossam ;
Chakrabortty, Ripon K. ;
Ryan, Michael .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (11) :7704-7715
[2]   A new intrusion detection system based on Moth–Flame Optimizer algorithm [J].
Alazab M. ;
Khurma R.A. ;
Awajan A. ;
Camacho D. .
Expert Systems with Applications, 2022, 210
[3]   Malicious Spam Emails Developments and Authorship Attribution [J].
Alazab, Mamoun ;
Layton, Robert ;
Broadhurst, Roderic ;
Bouhours, Brigitte .
2013 FOURTH CYBERCRIME AND TRUSTWORTHY COMPUTING WORKSHOP (CTC 2013), 2014, :58-+
[4]   A Detection and Prevention Technique for Man in the Middle Attack in Fog Computing [J].
Aliyu, Farouq ;
Sheltami, Tarek ;
Shakshuki, Elhadi M. .
9TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN-2018) / 8TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2018), 2018, 141 :24-31
[5]   Fog Computing for the Internet of Things: Security and Privacy Issues [J].
Alrawais, Arwa ;
Alhothaily, Abdulrahman ;
Hu, Chunqiang ;
Cheng, Xiuzhen .
IEEE INTERNET COMPUTING, 2017, 21 (02) :34-42
[6]   Fusion of deep learning based cyberattack detection and classification model for intelligent systems [J].
Alzubi, Omar A. ;
Qiqieh, Issa ;
Alzubi, Jafar A. .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (02) :1363-1374
[7]   Quantum readout and gradient deep learning model for secure and sustainable data access in IWSN [J].
Alzubi, Omar A. .
PEERJ COMPUTER SCIENCE, 2022, 8
[8]   A deep learning- based frechet and dirichlet model for intrusion detection in IWSN [J].
Alzubi, Omar A. .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2022, 42 (02) :873-883
[9]   An efficient malware detection approach with feature weighting based on Harris Hawks optimization [J].
Alzubi, Omar A. ;
Alzubi, Jafar A. ;
Al-Zoubi, Ala' M. ;
Hassonah, Mohammad A. ;
Kose, Utku .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (04) :2369-2387
[10]   Blockchain and artificial intelligence enabled privacy-preserving medical data transmission in Internet of Things [J].
Alzubi, Omar A. ;
Alzubi, Jafar A. ;
Shankar, K. ;
Gupta, Deepak .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (12)