Intrusion Detection Based on Autoencoder and Isolation Forest in Fog Computing

被引:99
作者
Sadaf, Kishwar [1 ]
Sultana, Jabeen [1 ]
机构
[1] Majmaah Univ, Coll Comp & Informat Sci, Dept Comp Sci, Al Majmaah 11952, Saudi Arabia
关键词
Intrusion detection; Machine learning; Cloud computing; Edge computing; Forestry; Support vector machines; Autoencoder; fog computing; intrusion detection; isolation forest; DEEP LEARNING APPROACH; DETECTION SYSTEM; SPARSE AUTOENCODER; SECURITY; PRIVACY;
D O I
10.1109/ACCESS.2020.3022855
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog Computing has emerged as an extension to cloud computing by providing an efficient infrastructure to support IoT. Fog computing acting as a mediator provides local processing of the end-users' requests and reduced delays in communication between the end-users and the cloud via fog devices. Therefore, the authenticity of incoming network traffic on the fog devices is of immense importance. These devices are vulnerable to malicious attacks. All kinds of information, especially financial and health information travel through these devices. Attackers target these devices by sending malicious data packets. It is imperative to detect these intrusions to provide secure and reliable service to the user. So, an effective Intrusion Detection System (IDS) is essential for the secure functioning of fog without compromising efficiency. In this paper, we propose a method (Auto-IF) for intrusion detection based on deep learning approach using Autoencoder (AE) and Isolation Forest (IF) for the fog environment. This approach targets only binary classification of the incoming packets as fog devices are more concerned about differentiating attack from normal packets in real-time. We validate the proposed method on the benchmark NSL-KDD dataset. Our technique of intrusion detection achieves a high accuracy rate of 95.4% as compared to many other state-of-art intrusion detection methods.
引用
收藏
页码:167059 / 167068
页数:10
相关论文
共 53 条
[1]   Analytical Evaluation and Potentials of Frame Based Equipment for LTE-LAA/Wi-Fi Coexistence [J].
Abdelfattah, Amr ;
Malouch, Naceur ;
Ling, Jonathan .
2019 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2019, :762-768
[2]   A survey of network anomaly detection techniques [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Hu, Jiankun .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 :19-31
[3]   Identification of malicious activities in industrial internet of things based on deep learning models [J].
AL-Hawawreh, Muna ;
Moustafa, Nour ;
Sitnikova, Elena .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 :1-11
[4]   Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection [J].
Al-Qatf, Majjed ;
Yu Lasheng ;
Al-Habib, Mohammed ;
Al-Sabahi, Kamal .
IEEE ACCESS, 2018, 6 :52843-52856
[5]   A Detection and Prevention Technique for Man in the Middle Attack in Fog Computing [J].
Aliyu, Farouq ;
Sheltami, Tarek ;
Shakshuki, Elhadi M. .
9TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN-2018) / 8TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2018), 2018, 141 :24-31
[6]   Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model [J].
Aljawarneh, Shadi ;
Aldwairi, Monther ;
Yassein, Muneer Bani .
JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 25 :152-160
[7]   Deep recurrent neural network for IoT intrusion detection system [J].
Almiani, Muder ;
AbuGhazleh, Alia ;
Al-Rahayfeh, Amer ;
Atiewi, Saleh ;
Razaque, Abdul .
SIMULATION MODELLING PRACTICE AND THEORY, 2020, 101
[8]   Hypergraph clustering model-based association analysis of DDOS attacks in fog computing intrusion detection system [J].
An, Xingshuo ;
Su, Jingtao ;
Lue, Xing ;
Lin, Fuhong .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,
[9]   Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC [J].
An, Xingshuo ;
Zhou, Xianwei ;
Lu, Xing ;
Lin, Fuhong ;
Yang, Lei .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
[10]  
[Anonymous], 2006, P 12 ACM SIGKDD INT