A Two-layer Fog-Cloud Intrusion Detection Model for IoT Networks

被引:25
作者
Roy, Souradip [1 ]
Li, Juan [1 ]
Bai, Yan [2 ]
机构
[1] North Dakota State Univ, Dept Comp Sci, Fargo, ND 58105 USA
[2] Univ Washington, Sch Engn & Technol, Tacoma, WA USA
基金
美国国家科学基金会;
关键词
Fog computing; Intrusion detection; IoT network; Machine learning; Security; DEEP LEARNING APPROACH; INTERNET;
D O I
10.1016/j.iot.2022.100557
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) and its applications are becoming ubiquitous in our life. However, the open deployment environment and the limited resources of IoT devices make them vulnerable to cyber threats. In this paper, we investigate intrusion detection techniques to mitigate attacks that exploit IoT security vulnerabilities. We propose a machine learning-based two-layer hierarchical intrusion detection mechanism that can effectively detect intrusions in IoT networks while satisfying the IoT resource constraints. Specifically, the proposed model effectively utilizes the resources in the fog layer of the IoT network by efficiently deploying multi-layered feedforward neural networks in the fog-cloud infrastructure for detecting network attacks. With a fog layer into the picture, analysis is dynamically distributed across the fog and cloud layer thus enabling real-time analytics of traffic data closer to IoT devices and end-users. We have performed extensive experiments using two publicly available datasets to test the proposed approach. Test results show that the proposed approach outperforms existing approaches in multiple performance metrics such as accuracy, precision, recall, and F1-score. Moreover, experiments also justified the proposed model in terms of improved service time, lower delay, and optimal energy utilization.
引用
收藏
页数:15
相关论文
共 43 条
[21]  
Kasinathan P, 2013, IEEE CONF WIREL MOB, P600, DOI 10.1109/WiMOB.2013.6673419
[22]   A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges [J].
Khraisat, Ansam ;
Alazab, Ammar .
CYBERSECURITY, 2021, 4 (01)
[23]  
Le A, 2011, IFIP WIREL DAY
[24]   A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network [J].
Li, Wenchao ;
Yi, Ping ;
Wu, Yue ;
Pan, Li ;
Li, Jianhua .
JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2014, 2014
[25]   Design, Resource Management, and Evaluation of Fog Computing Systems: A Survey [J].
Martinez, Ismael ;
Hafid, Abdelhakim Senhaji ;
Jarray, Abdallah .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (04) :2494-2516
[26]   Attojoule Optoelectronics for Low-Energy Information Processing and Communications [J].
Miller, David A. B. .
JOURNAL OF LIGHTWAVE TECHNOLOGY, 2017, 35 (03) :346-396
[27]   A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things [J].
Oh, Doohwan ;
Kim, Deokho ;
Ro, Andwon Woo .
SENSORS, 2014, 14 (12) :24188-24211
[28]  
Proti D.D., 2018, Vojnotehnicki Glasnik, V66, P580, DOI [10.5937/vojtehg66-16670, DOI 10.5937/VOJTEHG66-16670, DOI 10.5937/VOJTEHG-66-16670]
[29]  
Qureshi AU, 2018, COMPUT SCI ELECTR, P50, DOI 10.1109/CEEC.2018.8674228
[30]   Towards Effective Network Intrusion Detection: From Concept to Creation on Azure Cloud [J].
Rajagopal, Smitha ;
Kundapur, Poornima Panduranga ;
Hareesha, K. S. .
IEEE ACCESS, 2021, 9 :19723-19742