Hybrid VGG19 and 2D-CNN for intrusion detection in the FOG-cloud environment

被引:12
|
作者
Binbusayyis, Adel [1 ]
机构
[1] Prince Sattam Bin Abdulaziz Univ, Coll Comp Engn & Sci, Dept Software Engn, Al Kharj 16278, Saudi Arabia
关键词
Deep learning; Hybrid model; Security; Intrusion detection; Feature selection; Dimensionality reduction; VGG19; Malicious attack prevention; ATTACK DETECTION FRAMEWORK; RECURRENT NEURAL-NETWORKS; AUTOENCODER; INTERNET; ENSEMBLE;
D O I
10.1016/j.eswa.2023.121758
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Fog computing (FC) extends cloud technology by providing services, storage, and network interaction between data centers and end devices. By putting storage and processing closer to the network edge, fog computing may improve IDS effectiveness and efficiency. We develop a cloud-fog intrusion detection system (CFIDS) that employs cloud and fog resources to identify threats in the current research. However, the attack affects data packets from Fog layer nodes. The majority of intrusive cyber-attacks are close variants of previously identified cyber attacks with duplicate data and attributes. In addition, the data packet must be analyzed to determine the intrusion. SYN packets, used to initiate TCP connections, flood a victim's network in a syn threat. To mitigate the impact of syn attacks in a FC environment, it is essential to implement the necessary security measures. Deep learning-based IDS are suitable for protecting fog computing layers from attacks and addressing current issues. The authors of this paper have put forth a new hybrid architecture for DL intrusion detection in fog computing, which combines the use of DL models. Due to the large dimensionality of network data, Radial basis functionbased support vector regression (RBFSVR) is initially used to minimize the dimensionality of the data and reduce the training time. Then, on the cloud server, the integrated VGG19 and 2DCNN are utilized to complete the dataset's training and transfer it to the fog layer, where data transmission is observed and threats are recognized. Experiments with the UNSW-NB15, CICIDS2017, and CICIDS2018 datasets demonstrate that the techniques presented in this paper outperforms other comparable techniques in terms of detection rate, F-score, precision, recall, FAR, and accuracy, thereby solving the problem of intrusion detection. In addition, by analyzing irregular patterns of network traffic, flow duration is utilized to avoid harmful attacks in a fog computing environment.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] Lung Cancer Detection Using CNN VGG19
    Patil, Nandkishor Chhagan
    Patil, Nitin Jagannath
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (03) : 541 - 550
  • [2] Fog-cloud distributed intrusion detection and cooperation
    Ghribi, Saadia
    Makhlouf, Amel Meddeb
    Zarai, Faouzi
    Guizani, Mohsen
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (08)
  • [3] A Two-layer Fog-Cloud Intrusion Detection Model for IoT Networks
    Roy, Souradip
    Li, Juan
    Bai, Yan
    INTERNET OF THINGS, 2022, 19
  • [4] An efficient resource allocation of IoT requests in hybrid fog-cloud environment
    Afzali, Mahboubeh
    Samani, Amin Mohammad Vali
    Naji, Hamid Reza
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (04): : 4600 - 4624
  • [5] A Hybrid Deep Learning Intrusion Detection Model for Fog Computing Environment
    Kalaivani, K.
    Chinnadurai, M.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2021, 30 (01): : 1 - 15
  • [6] A shallow 2D-CNN network for crack detection in concrete structures
    Honarjoo, Ahmad
    Darvishan, Ehsan
    INTERNATIONAL JOURNAL OF STRUCTURAL INTEGRITY, 2024, 15 (03) : 461 - 474
  • [7] Fog-cloud based intrusion detection system using Recurrent Neural Networks and feature selection for IoT networks
    Syed, Naeem Firdous
    Ge, Mengmeng
    Baig, Zubair
    COMPUTER NETWORKS, 2023, 225
  • [8] Hybrid heuristic algorithm for cost-efficient QoS aware task scheduling in fog-cloud environment
    Hussain, Syed Mujtiba
    Begh, Gh Rasool
    JOURNAL OF COMPUTATIONAL SCIENCE, 2022, 64
  • [9] Network Intrusion Detection Method Combining CNN and BiLSTM in Cloud Computing Environment
    Gao, Jing
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [10] Brain Tumor Detection and Classification Using Adjusted InceptionV3, AlexNet, VGG16, VGG19 with ResNet50-152 CNN Model
    Wankhede D.S.
    J.shelke C.
    Shrivastava V.K.
    Achary R.
    Mohanty S.N.
    EAI Endorsed Transactions on Pervasive Health and Technology, 2024, 10