Classifier Performance Evaluation for Lightweight IDS Using Fog Computing in IoT Security

被引:28
作者
Khater, Belal Sudqi [1 ]
Wahab, Ainuddin Wahid Abdul [1 ]
Idris, Mohd Yamani Idna [1 ]
Hussain, Mohammed Abdulla [2 ]
Ibrahim, Ashraf Ahmed [3 ]
Amin, Mohammad Arif [4 ]
Shehadeh, Hisham A. [5 ,6 ]
机构
[1] Univ Malaya, Dept Comp Syst & Technol, Fac Comp Sci & Informat Technol, Kuala Lumpur 50603, Malaysia
[2] Zayed Univ, Coll Technol Innovat, Dubai 19282, U Arab Emirates
[3] Mozn, Prince Turki Ibn Abdulaziz Al Awwal Rd, Riyadh 12362, Saudi Arabia
[4] Univ Teknol Malaysia, Dept Comp & Informat Syst, Fac Comp Sci & Informat Technol, Johor Baharu 81310, Malaysia
[5] Amman Arab Univ, Dept Comp Informat Syst, Fac Comp Sci & Informat, Amman 21156, Jordan
[6] Amman Arab Univ, Dept Comp Sci, Fac Comp Sci & Informat, Amman 21156, Jordan
关键词
IoT security; Fog Computing; intrusion detection; N-gram; multilayer perceptron; INTRUSION DETECTION SYSTEM; FEATURE-SELECTION; INTERNET; THINGS; CHALLENGES; ALGORITHM; MODEL;
D O I
10.3390/electronics10141633
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, a Host-Based Intrusion Detection System (HIDS) using a Modified Vector Space Representation (MVSR) N-gram and Multilayer Perceptron (MLP) model for securing the Internet of Things (IoT), based on lightweight techniques and using Fog Computing devices, is proposed. The Australian Defence Force Academy Linux Dataset (ADFA-LD), which contains exploits and attacks on various applications, is employed for the analysis. The proposed method is divided into the feature extraction stage, the feature selection stage, and classification modeling. To maintain the lightweight criteria, the feature extraction stage considers a combination of 1-gram and 2-gram for the system call encoding. In addition, a Sparse Matrix is used to reduce the space by keeping only the weight of the features that appear in the trace, thus ignoring the zero weights. Subsequently, Linear Correlation Coefficient (LCC) is utilized to compensate for any missing N-gram in the test data. In the feature selection stage, the Mutual Information (MI) method and Principle Component Analysis (PCA) are utilized and then compared to reduce the number of input features. Following the feature selection stage, the modeling and performance evaluation of various Machine Learning classifiers are conducted using a Raspberry Pi IoT device. Further analysis of the effect of MLP parameters, such as the number of nodes, number of features, activation, solver, and regularization parameters, is also conducted. From the simulation, it can be seen that different parameters affect the accuracy and lightweight evaluation. By using a single hidden layer and four nodes, the proposed method with MI can achieve 96% accuracy, 97% recall, 96% F1-Measure, 5% False Positive Rate (FPR), highest curve of Receiver Operating Characteristic (ROC), and 96% Area Under the Curve (AUC). It also achieved low CPU time usage of 4.404 (ms) milliseconds and low energy consumption of 8.809 (mj) millijoules.
引用
收藏
页数:52
相关论文
共 50 条
  • [31] An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection
    Mohy-eddine, Mouaad
    Guezzaz, Azidine
    Benkirane, Said
    Azrour, Mourade
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (15) : 23615 - 23633
  • [32] Prototype of an Emergency Response System Using IoT in a Fog Computing Environment
    Ortiz-Garces, Ivan
    Andrade, Roberto O.
    Sanchez-Viteri, Santiago
    Villegas-Ch, William
    COMPUTERS, 2023, 12 (04)
  • [33] Secure framework for IoT applications using Deep Learning in fog Computing
    Chakraborty, Ananya
    Kumar, Mohit
    Chaurasia, Nisha
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 77
  • [34] Software randomness analysis and evaluation of lightweight ciphers: the prospective for IoT security
    Qasaimeh, Malik
    Al-Qassas, Raad S.
    Tedmori, Sara
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (14) : 18415 - 18449
  • [35] Design and Evaluation of a Lightweight Security Framework for IoT Applications
    Satamraju, Krishna Prasad
    Malarkodi, B.
    PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, : 522 - 526
  • [36] Design of Anomaly-Based Intrusion Detection System Using Fog Computing for IoT Network
    Govind P. Prabhat Kumar
    Rakesh Gupta
    Automatic Control and Computer Sciences, 2021, 55 : 137 - 147
  • [37] Secure and Reliable IoT Networks Using Fog Computing with Software-Defined Networking and Blockchain
    Muthanna, Ammar
    Ateya, Abdelhamied A.
    Khakimov, Abdukodir
    Gudkova, Irina
    Abuarqoub, Abdelrahman
    Samouylov, Konstantin
    Koucheryavy, Andrey
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2019, 8 (01)
  • [38] Performance Evaluation of Hybrid Cloud-Fog Computing Architectures in Smart Home IoT Environments: A Comparative Simulation Study Across Multiple Tools
    Ruchika
    Chhillar, Rajender Singh
    JOURNAL OF GRID COMPUTING, 2025, 23 (02)
  • [39] Performance evaluation of a Fog-assisted IoT solution for e-Health applications
    Vilela, Pedro H.
    Rodrigues, Joel J. P. C.
    Solic, Petar
    Saleem, Kashif
    Furtado, Vasco
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 97 : 379 - 386
  • [40] Machine Learning Techniques for Security of Internet of Things (IoT) and Fog Computing Systems
    Moh, Melody
    Raju, Robinson
    PROCEEDINGS 2018 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS), 2018, : 709 - 715