Classifier Performance Evaluation for Lightweight IDS Using Fog Computing in IoT Security

被引:28
作者
Khater, Belal Sudqi [1 ]
Wahab, Ainuddin Wahid Abdul [1 ]
Idris, Mohd Yamani Idna [1 ]
Hussain, Mohammed Abdulla [2 ]
Ibrahim, Ashraf Ahmed [3 ]
Amin, Mohammad Arif [4 ]
Shehadeh, Hisham A. [5 ,6 ]
机构
[1] Univ Malaya, Dept Comp Syst & Technol, Fac Comp Sci & Informat Technol, Kuala Lumpur 50603, Malaysia
[2] Zayed Univ, Coll Technol Innovat, Dubai 19282, U Arab Emirates
[3] Mozn, Prince Turki Ibn Abdulaziz Al Awwal Rd, Riyadh 12362, Saudi Arabia
[4] Univ Teknol Malaysia, Dept Comp & Informat Syst, Fac Comp Sci & Informat Technol, Johor Baharu 81310, Malaysia
[5] Amman Arab Univ, Dept Comp Informat Syst, Fac Comp Sci & Informat, Amman 21156, Jordan
[6] Amman Arab Univ, Dept Comp Sci, Fac Comp Sci & Informat, Amman 21156, Jordan
关键词
IoT security; Fog Computing; intrusion detection; N-gram; multilayer perceptron; INTRUSION DETECTION SYSTEM; FEATURE-SELECTION; INTERNET; THINGS; CHALLENGES; ALGORITHM; MODEL;
D O I
10.3390/electronics10141633
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, a Host-Based Intrusion Detection System (HIDS) using a Modified Vector Space Representation (MVSR) N-gram and Multilayer Perceptron (MLP) model for securing the Internet of Things (IoT), based on lightweight techniques and using Fog Computing devices, is proposed. The Australian Defence Force Academy Linux Dataset (ADFA-LD), which contains exploits and attacks on various applications, is employed for the analysis. The proposed method is divided into the feature extraction stage, the feature selection stage, and classification modeling. To maintain the lightweight criteria, the feature extraction stage considers a combination of 1-gram and 2-gram for the system call encoding. In addition, a Sparse Matrix is used to reduce the space by keeping only the weight of the features that appear in the trace, thus ignoring the zero weights. Subsequently, Linear Correlation Coefficient (LCC) is utilized to compensate for any missing N-gram in the test data. In the feature selection stage, the Mutual Information (MI) method and Principle Component Analysis (PCA) are utilized and then compared to reduce the number of input features. Following the feature selection stage, the modeling and performance evaluation of various Machine Learning classifiers are conducted using a Raspberry Pi IoT device. Further analysis of the effect of MLP parameters, such as the number of nodes, number of features, activation, solver, and regularization parameters, is also conducted. From the simulation, it can be seen that different parameters affect the accuracy and lightweight evaluation. By using a single hidden layer and four nodes, the proposed method with MI can achieve 96% accuracy, 97% recall, 96% F1-Measure, 5% False Positive Rate (FPR), highest curve of Receiver Operating Characteristic (ROC), and 96% Area Under the Curve (AUC). It also achieved low CPU time usage of 4.404 (ms) milliseconds and low energy consumption of 8.809 (mj) millijoules.
引用
收藏
页数:52
相关论文
共 50 条
  • [41] Evaluating Scalable Work Distribution Using IoT Devices in Fog Computing Scenarios
    Forsstroem, Stefan
    Lindqvist, Hans
    [J]. 2023 IEEE 9TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT, 2023,
  • [42] Cyber Security in Fog Computing Using Blockchain: A Mini Literature Review
    Alhumam, Norah Arif
    Alyemni, Noura Saud
    Rahman, M. M. Hafizur
    [J]. 2023 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE IN INFORMATION AND COMMUNICATION, ICAIIC, 2023, : 553 - 557
  • [43] Efficient resource management and workload allocation in fog-cloud computing paradigm in IoT using learning classifier systems
    Abbasi, Mahdi
    Yaghoobikia, Mina
    Rafiee, Milad
    Jolfaei, Alireza
    Khosravi, Mohammad R.
    [J]. COMPUTER COMMUNICATIONS, 2020, 153 (153) : 217 - 228
  • [44] Enhancing Security Using Secure Authentication Model in Fog Computing Model
    Satheesh, Kavuri K. S. V. A.
    Sree, T. Krishna
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2023, 130 (02) : 909 - 933
  • [45] Evaluation and Quality Assurance of Fog Computing-Based IoT for Health Monitoring System
    Chang, QingQing
    Ahmad, Iftikhar
    Liao, Xiaoqun
    Nazir, Shah
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [46] Fog computing-based IoT-enabled system security for electrical vehicles in the smart grid
    Sonker, Sanjay Kumar
    Raina, Vibha Kaw
    Sagar, Bharat Bhushan
    Bansal, Ramesh C.
    [J]. ELECTRICAL ENGINEERING, 2024, 106 (02) : 1339 - 1355
  • [47] A lightweight decentralized service placement policy for performance optimization in fog computing
    Carlos Guerrero
    Isaac Lera
    Carlos Juiz
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 2435 - 2452
  • [48] Security Issues in Fog Computing using Vehicular Cloud
    Tiwari, Vipul
    Chaurasia, Brijesh Kumar
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION, INSTRUMENTATION AND CONTROL (ICICIC), 2017,
  • [49] Random forest-based IDS for IIoT edge computing security using ensemble learning for dimensionality reduction
    Mohy-eddine, Mouaad
    Benkirane, Said
    Guezzaz, Azidine
    Azrour, Mourade
    [J]. INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2022, 15 (06) : 467 - 474
  • [50] A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT
    Lu, Rongxing
    Heung, Kevin
    Lashkari, Arash Habibi
    Ghorbani, Ali A.
    [J]. IEEE ACCESS, 2017, 5 : 3302 - 3312