Node State Monitoring Scheme in Fog Radio Access Networks for Intrusion Detection

被引:12
作者
An, Xingshuo [1 ]
Lu, Xing [1 ]
Yang, Lei [2 ]
Zhou, Xianwei [1 ]
Lin, Fuhong [1 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
[2] Univ Nevada, Dept Comp Sci & Engn, Reno, NV 89557 USA
基金
国家重点研发计划; 美国国家科学基金会;
关键词
5G; fog computing; IDS; skyline query; node monitoring; FNFS; ARCHITECTURE; INTERNET; SYSTEM; CLOUD;
D O I
10.1109/ACCESS.2019.2899017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper studies intrusion detection for fog computing in fog radio access networks (F-RANs). As fog nodes are resource constrained, a traditional intrusion detection system (IDS) cannot be directly deployed in F-RANs due to the communication overhead and computational complexity. To address this challenge, we propose a skyline query-based scheme that can analyze the IDS log statistics of fog nodes and provide a complete data processing flow. Specifically, a three-step solution is proposed. First, a lightweight fog node filtering strategy is proposed to filter the raw data, which can reduce the fog-cloud communication overhead. Second, a sliding-window-based mechanism is developed in the cloud server to efficiently process the asynchronous data flow. Then, using the pre-processed data, a set of seriously attacked nodes will be identified by the skyline query. Third, the security threat level of each individual fog node is calculated using the unascertained measure, which can determine the degree of security threat. The numerical simulations show that the proposed scheme can significantly reduce communication overhead and computational complexity.
引用
收藏
页码:21879 / 21888
页数:10
相关论文
共 36 条
[1]   Hypergraph clustering model-based association analysis of DDOS attacks in fog computing intrusion detection system [J].
An, Xingshuo ;
Su, Jingtao ;
Lue, Xing ;
Lin, Fuhong .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,
[2]   A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing [J].
An, Xingshuo ;
Lin, Fuhong ;
Xu, Shenggang ;
Miao, Li ;
Gong, Chao .
SECURITY AND COMMUNICATION NETWORKS, 2018,
[3]   Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC [J].
An, Xingshuo ;
Zhou, Xianwei ;
Lu, Xing ;
Lin, Fuhong ;
Yang, Lei .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
[4]  
[Anonymous], 2017, PROC IEEE 22 INT WOR
[5]  
[Anonymous], P EUR C WIR SENS NET
[6]  
Barbarossa S, 2017, EUR CONF NETW COMMUN
[7]   The Skyline operator [J].
Börzsönyi, S ;
Kossmann, D ;
Stocker, K .
17TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 2001, :421-430
[8]   Fog and IoT: An Overview of Research Opportunities [J].
Chiang, Mung ;
Zhang, Tao .
IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (06) :854-864
[9]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[10]  
Hosseinpour F., 2016, Int. J. Digit. Content Technol. Appl., V10