Anomaly Behavior Analysis for Fog Nodes Availability Assurance in IoT Applications

被引:0
作者
Pacheco, Jesus [1 ]
Benitez, Victor H. [1 ]
Tunc, Cihan [2 ]
Grijalva, Clarisa [2 ]
机构
[1] Univ Sonora, Ind Engn Dept, Hermosillo, Sonora, Mexico
[2] Univ Arizona, Elect & Comp Engn Dept, Tucson, AZ USA
来源
2019 IEEE/ACS 16TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA 2019) | 2019年
基金
芬兰科学院;
关键词
Internet of Things; Cloud Computing; Fog Computing; Anomaly Behavior Analysis; Intrusion Detection System; THINGS; INTERNET; FRAMEWORK; RESILIENT; SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is the new trend to make devices interact among themselves. The IoT will connect not only computers and mobile devices, but also wearable devices, smart buildings, smart cities, electrical grids, and automobiles just to name few. IoT will lead to the development of a wide range of advanced information services that need to be processed in real-time and require large storage and computational power than can be provided by Cloud and Fog Computing. The integration of IoT with Cloud and Fog Computing make IoT capable of processing large-scale geo-distributed information. In any IoT application, communications are critical to deliver the required information to the end user, device or application, for instance to take actions during crisis events. However, IoT communication elements such as gateways or Fog nodes, will introduce major security challenges as they contribute to increase the attack surface, preventing the IoT to deliver accurate information. In this paper, we propose a methodology to develop an Intrusion Detection System (IDS) based on Anomaly Behavior Analysis (ABA) to detect when a Fog node has been compromised. The preliminary experimental results show that our proposed approach accurately detects known and unknown anomalies due to misuses or cyber-attacks, with high detection rate and low false alarms.
引用
收藏
页数:6
相关论文
共 26 条
  • [1] Testbed for Identify IoT-Devices Based on Digital Object Architecture
    Al-Bahri, Mahmood
    Yankovsky, Anton
    Borodin, Alexey
    Kirichek, Ruslan
    [J]. INTERNET OF THINGS, SMART SPACES, AND NEXT GENERATION NETWORKS AND SYSTEMS, NEW2AN 2018, 2018, 11118 : 129 - 137
  • [2] Internet of Things: A survey on the security of IoT frameworks
    Ammar, Mahmoud
    Russello, Giovanni
    Crispo, Bruno
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 : 8 - 27
  • [3] Bonomi F., 2012, P MCC SIGCOMM
  • [4] Can Okan., 2015, P 2015 6 INT C MODEL, P1, DOI 10.1109/ICMSAO.2015.7152200
  • [5] Internet of Things security and forensics: Challenges and opportunities
    Conti, Mauro
    Dehghantanha, Ali
    Franke, Katrin
    Watson, Steve
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 544 - 546
  • [6] Enabling low latency services in standard LTE networks
    Garcia-Perez, Cesar A.
    Merino, Pedro
    [J]. 2016 IEEE 1ST INTERNATIONAL WORKSHOPS ON FOUNDATIONS AND APPLICATIONS OF SELF* SYSTEMS (FAS*W), 2016, : 248 - 255
  • [7] Guth J, 2016, 2016 CLOUDIFICATION OF THE INTERNET OF THINGS (CIOT)
  • [8] Application orchestration in mobile edge cloud Placing of IoT applications to the edge
    Hegyi, Attila
    Flinck, Hannu
    Ketyko, Istvan
    Kuure, Pekka
    Nemes, Csaba
    Pinter, Lajos
    [J]. 2016 IEEE 1ST INTERNATIONAL WORKSHOPS ON FOUNDATIONS AND APPLICATIONS OF SELF* SYSTEMS (FAS*W), 2016, : 230 - 235
  • [9] JARWAR MA, 2018, STUDIES COMPUTATIONA, P112
  • [10] THE REAL STORY OF STUXNET
    Kushner, David
    [J]. IEEE SPECTRUM, 2013, 50 (03) : 48 - 53