Hybrid approach to intrusion detection in fog-based IoT environments

被引:92
作者
de Souza, Cristiano Antonio [1 ]
Westphall, Carlos Becker [2 ]
Machado, Renato Bobsin [3 ]
Mangueira Sobral, Joao Bosco [2 ]
Vieira, Gustavo dos Santos [4 ]
机构
[1] Univ Fed Santa Catarina, Comp Sci, Florianopolis, SC, Brazil
[2] Univ Fed Santa Catarina, Florianopolis, SC, Brazil
[3] State Univ Western Parana, Grad Program Elect & Comp Engin PGEEC, Foz Do Iguacu, Parana, Brazil
[4] State Univ Western Parana, Foz Do Iguacu, Parana, Brazil
关键词
Internet of things; Intrusion detection; Fog computing; Machine learning; DEEP LEARNING APPROACH; NEURAL-NETWORK; INTERNET; OPTIMIZATION; HYPERGRAPH; FRAMEWORK; IDS;
D O I
10.1016/j.comnet.2020.107417
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the Internet of Things (IoT) systems, information of various kinds is continuously captured, processed, and transmitted by systems generally interconnected by the Internet and distributed solutions. Attacks to capture information and overload services are common. This fact makes security techniques indispensable in IoT en-vironments. Intrusion detection is one of the vital security points, aimed at identifying attempted attacks. The characteristics of IoT devices make it impossible to apply these solutions in this environment. Also, the existing anomaly-based methods for multiclass detection do not present acceptable accuracy. We present an intrusion detection architecture that operates in the fog computing layer. It has two steps and aims to classify events into specific types of attacks or non-attacks, for the execution of countermeasures. Our work presents a relevant con-tribution to the state of the art in this aspect. We propose a hybrid binary classification method called DNN-kNN. It has high accuracy and recall rates and is ideal for composing the first level of the two-stage detection method of the presented architecture. The approach is based on Deep Neural Networks (DNN) and the k-Nearest Neighbor (kNN) algorithm. It was evaluated with the public databases NSL-KDD and CICIDS2017. We used the method of selecting attributes based on the rate of information gain. The approach proposed in this work obtained 99.77% accuracy for the NSL-KDD dataset and 99.85% accuracy for the CICIDS2017 dataset. The experimental results showed that the proposed hybrid approach was able to achieve greater precision about classic machine learning approaches and the recent advances in intrusion detection for IoT systems. In addition, the approach works with low overhead in terms of memory and processing costs.
引用
收藏
页数:18
相关论文
共 56 条
[1]  
ABADI M, 2015, TENSORFLOW LARGE SCA
[2]  
[Anonymous], 1998, UCI MACHINE LEARNING
[3]   COLIDE: a collaborative intrusion detection framework for Internet of Things [J].
Arshad, Junaid ;
Azad, Muhammad Ajmal ;
Abdellatif, Mohammad Mahmoud ;
Rehman, Muhammad Habib Ur ;
Salah, Khaled .
IET NETWORKS, 2019, 8 (01) :3-14
[4]   Fuzziness based semi-supervised learning approach for intrusion detection system [J].
Ashfaq, Rana Aamir Raza ;
Wang, Xi-Zhao ;
Huang, Joshua Zhexue ;
Abbas, Haider ;
He, Yu-Lin .
INFORMATION SCIENCES, 2017, 378 :484-497
[5]  
Atefi K, 2020, 2020 16TH IEEE INTERNATIONAL COLLOQUIUM ON SIGNAL PROCESSING & ITS APPLICATIONS (CSPA 2020), P29, DOI [10.1109/cspa48992.2020.9068725, 10.1109/CSPA48992.2020.9068725]
[6]  
Bansal Ashu, 2018, Advances in Computing and Data Sciences: Second International Conference, ICACDS 2018, Dehradun, India, April 20-21, 2018, Revised Selected Papers, Part I. Communications in Computer and Information Science (905), P372, DOI 10.1007/978-981-13-1810-8_37
[7]   Hierarchical Abnormal-node Detection using Fuzzy Logic for ECA Rule-based Wireless Sensor Networks [J].
Berjab, Nesrine ;
Hieu Hanh Le ;
Yu, Chia-Mu ;
Kuo, Sy-Yen ;
Yokota, Haruo .
2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, :289-298
[8]  
Bonomi F, 2012, P 1 ED MCC WORKSH MO, P13, DOI DOI 10.1145/2342509.2342513
[9]   Discovery of DoS attacks by the ZED-IDS anomaly detector [J].
Catillo, Marta ;
Rak, Massimiliano ;
Villano, Umberto .
JOURNAL OF HIGH SPEED NETWORKS, 2019, 25 (04) :349-365
[10]  
Cervantes C, 2015, PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), P606, DOI 10.1109/INM.2015.7140344