Classifier Performance Evaluation for Lightweight IDS Using Fog Computing in IoT Security

被引:28
作者
Khater, Belal Sudqi [1 ]
Wahab, Ainuddin Wahid Abdul [1 ]
Idris, Mohd Yamani Idna [1 ]
Hussain, Mohammed Abdulla [2 ]
Ibrahim, Ashraf Ahmed [3 ]
Amin, Mohammad Arif [4 ]
Shehadeh, Hisham A. [5 ,6 ]
机构
[1] Univ Malaya, Dept Comp Syst & Technol, Fac Comp Sci & Informat Technol, Kuala Lumpur 50603, Malaysia
[2] Zayed Univ, Coll Technol Innovat, Dubai 19282, U Arab Emirates
[3] Mozn, Prince Turki Ibn Abdulaziz Al Awwal Rd, Riyadh 12362, Saudi Arabia
[4] Univ Teknol Malaysia, Dept Comp & Informat Syst, Fac Comp Sci & Informat Technol, Johor Baharu 81310, Malaysia
[5] Amman Arab Univ, Dept Comp Informat Syst, Fac Comp Sci & Informat, Amman 21156, Jordan
[6] Amman Arab Univ, Dept Comp Sci, Fac Comp Sci & Informat, Amman 21156, Jordan
关键词
IoT security; Fog Computing; intrusion detection; N-gram; multilayer perceptron; INTRUSION DETECTION SYSTEM; FEATURE-SELECTION; INTERNET; THINGS; CHALLENGES; ALGORITHM; MODEL;
D O I
10.3390/electronics10141633
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, a Host-Based Intrusion Detection System (HIDS) using a Modified Vector Space Representation (MVSR) N-gram and Multilayer Perceptron (MLP) model for securing the Internet of Things (IoT), based on lightweight techniques and using Fog Computing devices, is proposed. The Australian Defence Force Academy Linux Dataset (ADFA-LD), which contains exploits and attacks on various applications, is employed for the analysis. The proposed method is divided into the feature extraction stage, the feature selection stage, and classification modeling. To maintain the lightweight criteria, the feature extraction stage considers a combination of 1-gram and 2-gram for the system call encoding. In addition, a Sparse Matrix is used to reduce the space by keeping only the weight of the features that appear in the trace, thus ignoring the zero weights. Subsequently, Linear Correlation Coefficient (LCC) is utilized to compensate for any missing N-gram in the test data. In the feature selection stage, the Mutual Information (MI) method and Principle Component Analysis (PCA) are utilized and then compared to reduce the number of input features. Following the feature selection stage, the modeling and performance evaluation of various Machine Learning classifiers are conducted using a Raspberry Pi IoT device. Further analysis of the effect of MLP parameters, such as the number of nodes, number of features, activation, solver, and regularization parameters, is also conducted. From the simulation, it can be seen that different parameters affect the accuracy and lightweight evaluation. By using a single hidden layer and four nodes, the proposed method with MI can achieve 96% accuracy, 97% recall, 96% F1-Measure, 5% False Positive Rate (FPR), highest curve of Receiver Operating Characteristic (ROC), and 96% Area Under the Curve (AUC). It also achieved low CPU time usage of 4.404 (ms) milliseconds and low energy consumption of 8.809 (mj) millijoules.
引用
收藏
页数:52
相关论文
共 50 条
  • [21] Dynamic Offloading in Flying Fog Computing: Optimizing IoT Network Performance with Mobile Drones
    Min, Wei
    Khakimov, Abdukodir
    Ateya, Abdelhamied A.
    Elaffendi, Mohammed
    Muthanna, Ammar
    Abd El-Latif, Ahmed A.
    Muthanna, Mohammed Saleh Ali
    DRONES, 2023, 7 (10)
  • [22] Design a D-Fog Scheme to Enhance Processing Performance of Real-Time IoT Applications in Fog Computing
    Yang, Shin-Jer
    Liao, Wen-Hwa
    Liao, Wan-Lin Lu Wen-Hwa
    JOURNAL OF INTERNET TECHNOLOGY, 2021, 22 (06): : 1335 - 1345
  • [23] An IoT Management System Using Fog Computing
    Yildiran, Berkin
    Ozturk, Erel
    Ozkent, Necati
    Arslan, Yagizcan
    Korkmaz, Ilker
    2021 EIGHTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, SYSTEMS, MANAGEMENT AND SECURITY (IOTSMS), 2021, : 146 - 153
  • [24] Performance and Security Challenges Digital Rights Management (DRM) Approaches Using Fog Computing for Data Provenance: A Survey
    Hussain, Ali
    Kiah, Miss Laiha Mat
    Anuar, Nor Badrul
    Noor, Rafidah
    Ahmad, Muneer
    JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS, 2020, 10 (10) : 2404 - 2420
  • [25] A survey on performance evaluation of artificial intelligence algorithms for improving IoT security systems
    Meziane, Hind
    Ouerdi, Noura
    SCIENTIFIC REPORTS, 2023, 13 (01)
  • [26] Rotating behind Security: A Lightweight Authentication Protocol Based on IoT-Enabled Cloud Computing Environments
    Wu, Tsu-Yang
    Meng, Qian
    Kumari, Saru
    Zhang, Peng
    SENSORS, 2022, 22 (10)
  • [27] Fog Computing Based Intelligent Security Surveillance Using PTZ Controller Camera
    Sarkar, Indranil
    Kumar, Sanjay
    2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [28] A Lightweight Intrusion Detection System Using Convolutional Neural Network and Long Short-Term Memory in Fog Computing
    Alzahrani, Hawazen
    Sheltami, Tarek
    Barnawi, Abdulaziz
    Imam, Muhammad
    Yaser, Ansar
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (03): : 4703 - 4728
  • [29] A Brief Review on Security in IoT Environments Based on Fog Computing Architecture
    Damerdji, Djennet Oudjedi
    Lehsaini, Mohamed
    Benmahdi, Meryem Bochra
    PROGRAM OF THE 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND AUTOMATIC CONTROL, ICEEAC 2024, 2024,
  • [30] An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection
    Mohy-eddine, Mouaad
    Guezzaz, Azidine
    Benkirane, Said
    Azrour, Mourade
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (15) : 23615 - 23633