Detecting Man-in-the-Middle Attack in Fog Computing for Social Media

被引:6
作者
Aliyu, Farouq [1 ]
Sheltami, Tarek [1 ]
Mahmoud, Ashraf [1 ]
Al-Awami, Louai [1 ]
Yasar, Ansar [2 ]
机构
[1] King Fahd Univ Petr & Minerals, Dhahran 31261, Saudi Arabia
[2] Hasselt Univ, Transportat Res Inst IMOB, B-3500 Hasselt, Belgium
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2021年 / 69卷 / 01期
关键词
Fog computing; man-in-the-middle attack; intrusion detection system and prevention system; network security; social media; INTRUSION DETECTION; CRYPTOGRAPHY;
D O I
10.32604/cmc.2021.016938
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing (FC) is a networking paradigm where wireless devices known as fog nodes are placed at the edge of the network (close to the Internet of Things (IoT) devices). Fog nodes provide services in lieu of the cloud. Thus, improving the performance of the network and making it attractive to social media-based systems. Security issues are one of the most challenges encountered in FC. In this paper, we propose an anomalybased Intrusion Detection and Prevention System (IDPS) against Man-in-theMiddle (MITM) attack in the fog layer. The system uses special nodes known as Intrusion Detection System (IDS) nodes to detect intrusion in the network. They periodically monitor the behavior of the fog nodes in the network. Any deviation from normal network activity is categorized as malicious, and the suspected node is isolated. Exponentially Weighted Moving Average (EWMA) is added to the system to smooth out the noise that is typically found in social media communications. Our results (with 95% confidence) show that the accuracy of the proposed system increases from 80% to 95% after EWMA is added. Also, with EWMA, the proposed system can detect the intrusion from 0.25- 0.5 s seconds faster than that without EWMA. However, it affects the latency of services provided by the fog nodes by at least 0.75-1.3 s. Finally, EWMA has not increased the energy overhead of the system, due to its lightweight.
引用
收藏
页码:1159 / 1181
页数:23
相关论文
共 75 条
[41]   Fog computing security: a review of current applications and security solutions [J].
Khan, Saad ;
Parkinson, Simon ;
Qin, Yongrui .
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2017, 6
[42]   A Lightweight Perceptron-Based Intrusion Detection System for Fog Computing [J].
Khater, Belal Sudqi ;
Wahab, Ainuddin Wahid Bin Abdul ;
Bin Idris, Mohd Yamani Idna ;
Hussain, Mohammed Abdulla ;
Ibrahim, Ashraf Ahmed .
APPLIED SCIENCES-BASEL, 2019, 9 (01)
[43]  
Lee Heejo., 2007, Proceedings of the 2nd ACM symposium on Information, computer and communications security, P20
[44]  
Lee K, 2015, INT CONF NETW FUT
[45]  
Li J, 2002, IEEE INFOCOM SER, P1557, DOI 10.1109/INFCOM.2002.1019407
[46]  
Liu J., 2012, PROC IEEE 32 INT C, P588, DOI [DOI 10.1109/ICDCSW.2012.23, 10.1109/icdcsw.2012.23]
[47]  
Mallik A., 2018, Cyberspace: Jurnal Pendidikan Teknologi Informasi, V2, P109
[48]   Modified DSR protocol for detection and removal of selective black hole attack in MANET [J].
Mohanapriya, M. ;
Krishnamurthi, Ilango .
COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (02) :530-538
[49]  
Mustafa A., 2015, THESIS HALMSTAD U UK
[50]  
Nasr OA, 2018, 2018 THIRD INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), P93, DOI 10.1109/FMEC.2018.8364050