Hybrid approach to intrusion detection in fog-based IoT environments

被引:85
|
作者
de Souza, Cristiano Antonio [1 ]
Westphall, Carlos Becker [2 ]
Machado, Renato Bobsin [3 ]
Mangueira Sobral, Joao Bosco [2 ]
Vieira, Gustavo dos Santos [4 ]
机构
[1] Univ Fed Santa Catarina, Comp Sci, Florianopolis, SC, Brazil
[2] Univ Fed Santa Catarina, Florianopolis, SC, Brazil
[3] State Univ Western Parana, Grad Program Elect & Comp Engin PGEEC, Foz Do Iguacu, Parana, Brazil
[4] State Univ Western Parana, Foz Do Iguacu, Parana, Brazil
关键词
Internet of things; Intrusion detection; Fog computing; Machine learning; DEEP LEARNING APPROACH; NEURAL-NETWORK; INTERNET; OPTIMIZATION; HYPERGRAPH; FRAMEWORK; IDS;
D O I
10.1016/j.comnet.2020.107417
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the Internet of Things (IoT) systems, information of various kinds is continuously captured, processed, and transmitted by systems generally interconnected by the Internet and distributed solutions. Attacks to capture information and overload services are common. This fact makes security techniques indispensable in IoT en-vironments. Intrusion detection is one of the vital security points, aimed at identifying attempted attacks. The characteristics of IoT devices make it impossible to apply these solutions in this environment. Also, the existing anomaly-based methods for multiclass detection do not present acceptable accuracy. We present an intrusion detection architecture that operates in the fog computing layer. It has two steps and aims to classify events into specific types of attacks or non-attacks, for the execution of countermeasures. Our work presents a relevant con-tribution to the state of the art in this aspect. We propose a hybrid binary classification method called DNN-kNN. It has high accuracy and recall rates and is ideal for composing the first level of the two-stage detection method of the presented architecture. The approach is based on Deep Neural Networks (DNN) and the k-Nearest Neighbor (kNN) algorithm. It was evaluated with the public databases NSL-KDD and CICIDS2017. We used the method of selecting attributes based on the rate of information gain. The approach proposed in this work obtained 99.77% accuracy for the NSL-KDD dataset and 99.85% accuracy for the CICIDS2017 dataset. The experimental results showed that the proposed hybrid approach was able to achieve greater precision about classic machine learning approaches and the recent advances in intrusion detection for IoT systems. In addition, the approach works with low overhead in terms of memory and processing costs.
引用
收藏
页数:18
相关论文
共 50 条
  • [41] A Hybrid Deep Learning Approach for Intrusion Detection in IoT Networks
    Emec, Murat
    Ozcanhan, Mehmet Hilal
    ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, 2022, 22 (01) : 3 - 12
  • [42] Devote: Criticality-Aware Federated Service Provisioning in Fog-Based IoT Environments
    Tiwari, Minu
    Misra, Sudip
    Bishoyi, Pradyumna Kumar
    Yang, Laurence T.
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (13): : 10631 - 10638
  • [43] Intrusion Detection Based on Autoencoder and Isolation Forest in Fog Computing
    Sadaf, Kishwar
    Sultana, Jabeen
    IEEE ACCESS, 2020, 8 : 167059 - 167068
  • [44] Securing Fog-enabled IoT: federated learning and generative adversarial networks for intrusion detection
    Lei, Ting
    TELECOMMUNICATION SYSTEMS, 2025, 88 (01)
  • [45] Analyzing Meta-Heuristic Algorithms for Task Scheduling in a Fog-Based IoT Application
    Rahbari, Dadmehr
    ALGORITHMS, 2022, 15 (11)
  • [46] A Hierarchical Hybrid Intrusion Detection Approach in IoT Scenarios
    Bovenzi, Giampaolo
    Aceto, Giuseppe
    Ciuonzo, Domenico
    Persico, Valerio
    Pescape, Antonio
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [47] A Hybrid Classification Approach for Intrusion Detection in IoT Network
    Choudhary, Sarika
    Kesswani, Nishtha
    JOURNAL OF SCIENTIFIC & INDUSTRIAL RESEARCH, 2021, 80 (09): : 809 - 816
  • [48] TRFIoT: Trust and Reputation Model for Fog-based IoT
    Hussain, Yasir
    Huang, Zhiqiu
    CLOUD COMPUTING AND SECURITY, PT VI, 2018, 11068 : 187 - 198
  • [49] Blockchain-Enabled SDN for Securing Fog-Based Resource-Constrained IoT
    Misra, Sudip
    Deb, Pallav Kumar
    Pathak, Nidhi
    Mukherjee, Anandarup
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 490 - 495
  • [50] Intrusion detection systems for IoT-based smart environments: a survey
    Elrawy, Mohamed Faisal
    Awad, Ali Ismail
    Hamed, Hesham F. A.
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2018, 7