Classifier Performance Evaluation for Lightweight IDS Using Fog Computing in IoT Security

被引:28
|
作者
Khater, Belal Sudqi [1 ]
Wahab, Ainuddin Wahid Abdul [1 ]
Idris, Mohd Yamani Idna [1 ]
Hussain, Mohammed Abdulla [2 ]
Ibrahim, Ashraf Ahmed [3 ]
Amin, Mohammad Arif [4 ]
Shehadeh, Hisham A. [5 ,6 ]
机构
[1] Univ Malaya, Dept Comp Syst & Technol, Fac Comp Sci & Informat Technol, Kuala Lumpur 50603, Malaysia
[2] Zayed Univ, Coll Technol Innovat, Dubai 19282, U Arab Emirates
[3] Mozn, Prince Turki Ibn Abdulaziz Al Awwal Rd, Riyadh 12362, Saudi Arabia
[4] Univ Teknol Malaysia, Dept Comp & Informat Syst, Fac Comp Sci & Informat Technol, Johor Baharu 81310, Malaysia
[5] Amman Arab Univ, Dept Comp Informat Syst, Fac Comp Sci & Informat, Amman 21156, Jordan
[6] Amman Arab Univ, Dept Comp Sci, Fac Comp Sci & Informat, Amman 21156, Jordan
关键词
IoT security; Fog Computing; intrusion detection; N-gram; multilayer perceptron; INTRUSION DETECTION SYSTEM; FEATURE-SELECTION; INTERNET; THINGS; CHALLENGES; ALGORITHM; MODEL;
D O I
10.3390/electronics10141633
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, a Host-Based Intrusion Detection System (HIDS) using a Modified Vector Space Representation (MVSR) N-gram and Multilayer Perceptron (MLP) model for securing the Internet of Things (IoT), based on lightweight techniques and using Fog Computing devices, is proposed. The Australian Defence Force Academy Linux Dataset (ADFA-LD), which contains exploits and attacks on various applications, is employed for the analysis. The proposed method is divided into the feature extraction stage, the feature selection stage, and classification modeling. To maintain the lightweight criteria, the feature extraction stage considers a combination of 1-gram and 2-gram for the system call encoding. In addition, a Sparse Matrix is used to reduce the space by keeping only the weight of the features that appear in the trace, thus ignoring the zero weights. Subsequently, Linear Correlation Coefficient (LCC) is utilized to compensate for any missing N-gram in the test data. In the feature selection stage, the Mutual Information (MI) method and Principle Component Analysis (PCA) are utilized and then compared to reduce the number of input features. Following the feature selection stage, the modeling and performance evaluation of various Machine Learning classifiers are conducted using a Raspberry Pi IoT device. Further analysis of the effect of MLP parameters, such as the number of nodes, number of features, activation, solver, and regularization parameters, is also conducted. From the simulation, it can be seen that different parameters affect the accuracy and lightweight evaluation. By using a single hidden layer and four nodes, the proposed method with MI can achieve 96% accuracy, 97% recall, 96% F1-Measure, 5% False Positive Rate (FPR), highest curve of Receiver Operating Characteristic (ROC), and 96% Area Under the Curve (AUC). It also achieved low CPU time usage of 4.404 (ms) milliseconds and low energy consumption of 8.809 (mj) millijoules.
引用
收藏
页数:52
相关论文
共 50 条
  • [1] Security and privacy for IoT and Fog Computing Paradigm
    Rauf, Abdul
    Shaikh, Riaz Ahmed
    Shah, Asadullah
    2018 15TH LEARNING AND TECHNOLOGY CONFERENCE (L&T), 2018, : 96 - 101
  • [2] Performance Evaluation to Provide StaaS to IoT Devices in Fog Computing Environment
    Machado, Jose dos Santos
    Silva, Danilo Souza
    Fontes, Raphael Silva
    Menezes, Adauto Cavalcante
    Moreno, Edward David
    Lima Ribeiro, Admilson de Ribamar
    2018 SYMPOSIUM ON HIGH PERFORMANCE COMPUTING SYSTEMS (WSCAD 2018), 2018, : 8 - 15
  • [3] A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications
    Suarez-Albela, Manuel
    Fernandez-Carames, Tiago M.
    Fraga-Lamas, Paula
    Castedo, Luis
    SENSORS, 2017, 17 (09)
  • [4] An Anomaly Mitigation Framework for IoT Using Fog Computing
    Lawal, Muhammad Aminu
    Shaikh, Riaz Ahmed
    Hassan, Syed Raheel
    ELECTRONICS, 2020, 9 (10) : 1 - 24
  • [5] A lightweight decentralized service placement policy for performance optimization in fog computing
    Guerrero, Carlos
    Lera, Isaac
    Juiz, Carlos
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (06) : 2447 - 2464
  • [6] Data Security Through Fog Computing Paradigm Using IoT
    Singh, Jayant Kumar
    Goel, Amit Kumar
    PROCEEDINGS OF ACADEMIA-INDUSTRY CONSORTIUM FOR DATA SCIENCE (AICDS 2020), 2022, 1411 : 95 - 103
  • [7] Design of Anomaly-Based Intrusion Detection System Using Fog Computing for IoT Network
    Kumar, Prabhat
    Gupta, Govind P.
    Tripathi, Rakesh
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2021, 55 (02) : 137 - 147
  • [8] Performance analysis of StaaS on IoT devices in fog computing environment using embedded systems
    Machado, Jose dos Santos
    Silva, Danilo Souza
    Fontes, Raphael Silva
    Menezes, Adauto Cavalcante
    Moreno, Edward David
    Lima Ribeiro, Admilson de Ribamar
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2020, 11 (04) : 554 - 567
  • [9] PROPOSED ACCESS CONTROL AND SECURITY ARCHITECTURE BASED ON FOG COMPUTING FOR IOT ENVIRONMENTS
    Bharathi, C. R.
    Ramesh, L. V.
    Priya, L. Vamsi
    INTERNATIONAL JOURNAL OF EARLY CHILDHOOD SPECIAL EDUCATION, 2022, 14 (02) : 1398 - 1404
  • [10] ENHANCING DATA SECURITY IN IoT HEALTHCARE SERVICES USING FOG COMPUTING
    Winnie, Yumnam
    Umamaheswari, E.
    Ajay, D. M.
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ADVANCED COMPUTING (ICRTAC-CPS 2018), 2018, : 200 - 205