A Two-layer Fog-Cloud Intrusion Detection Model for IoT Networks

被引:25
作者
Roy, Souradip [1 ]
Li, Juan [1 ]
Bai, Yan [2 ]
机构
[1] North Dakota State Univ, Dept Comp Sci, Fargo, ND 58105 USA
[2] Univ Washington, Sch Engn & Technol, Tacoma, WA USA
基金
美国国家科学基金会;
关键词
Fog computing; Intrusion detection; IoT network; Machine learning; Security; DEEP LEARNING APPROACH; INTERNET;
D O I
10.1016/j.iot.2022.100557
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) and its applications are becoming ubiquitous in our life. However, the open deployment environment and the limited resources of IoT devices make them vulnerable to cyber threats. In this paper, we investigate intrusion detection techniques to mitigate attacks that exploit IoT security vulnerabilities. We propose a machine learning-based two-layer hierarchical intrusion detection mechanism that can effectively detect intrusions in IoT networks while satisfying the IoT resource constraints. Specifically, the proposed model effectively utilizes the resources in the fog layer of the IoT network by efficiently deploying multi-layered feedforward neural networks in the fog-cloud infrastructure for detecting network attacks. With a fog layer into the picture, analysis is dynamically distributed across the fog and cloud layer thus enabling real-time analytics of traffic data closer to IoT devices and end-users. We have performed extensive experiments using two publicly available datasets to test the proposed approach. Test results show that the proposed approach outperforms existing approaches in multiple performance metrics such as accuracy, precision, recall, and F1-score. Moreover, experiments also justified the proposed model in terms of improved service time, lower delay, and optimal energy utilization.
引用
收藏
页数:15
相关论文
共 43 条
[1]  
Ahsan M., 2020, P 35 INT C COMP THEI, P69, DOI DOI 10.29007/J35R
[2]   Anomaly detection optimization using big data and deep learning to reduce false-positive [J].
Al Jallad, Khloud ;
Aljnidi, Mohamad ;
Desouki, Mohammad Said .
JOURNAL OF BIG DATA, 2020, 7 (01)
[3]  
Alom MZ, 2015, PROC NAECON IEEE NAT, P339, DOI 10.1109/NAECON.2015.7443094
[4]  
Amaizu GC, 2020, I C INF COMM TECH CO, P1325, DOI 10.1109/ICTC49870.2020.9289329
[5]  
Amaral JP, 2014, IEEE ICC, P1796, DOI 10.1109/ICC.2014.6883583
[6]  
Atefi K, 2020, 2020 16TH IEEE INTERNATIONAL COLLOQUIUM ON SIGNAL PROCESSING & ITS APPLICATIONS (CSPA 2020), P29, DOI [10.1109/CSPA48992.2020.9068725, 10.1109/cspa48992.2020.9068725]
[7]  
Badarneh O. S., 2019, IEEE ACCESS
[8]  
Boukhamla A., 2018, Int. J. Inf. Comput. Secur.
[9]  
Cervantes C, 2015, PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), P606, DOI 10.1109/INM.2015.7140344
[10]   SMOTE: Synthetic minority over-sampling technique [J].
Chawla, Nitesh V. ;
Bowyer, Kevin W. ;
Hall, Lawrence O. ;
Kegelmeyer, W. Philip .
2002, American Association for Artificial Intelligence (16)