Hybrid approach to intrusion detection in fog-based IoT environments

被引:77
|
作者
de Souza, Cristiano Antonio [1 ]
Westphall, Carlos Becker [2 ]
Machado, Renato Bobsin [3 ]
Mangueira Sobral, Joao Bosco [2 ]
Vieira, Gustavo dos Santos [4 ]
机构
[1] Univ Fed Santa Catarina, Comp Sci, Florianopolis, SC, Brazil
[2] Univ Fed Santa Catarina, Florianopolis, SC, Brazil
[3] State Univ Western Parana, Grad Program Elect & Comp Engin PGEEC, Foz Do Iguacu, Parana, Brazil
[4] State Univ Western Parana, Foz Do Iguacu, Parana, Brazil
关键词
Internet of things; Intrusion detection; Fog computing; Machine learning; DEEP LEARNING APPROACH; NEURAL-NETWORK; INTERNET; OPTIMIZATION; HYPERGRAPH; FRAMEWORK; IDS;
D O I
10.1016/j.comnet.2020.107417
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the Internet of Things (IoT) systems, information of various kinds is continuously captured, processed, and transmitted by systems generally interconnected by the Internet and distributed solutions. Attacks to capture information and overload services are common. This fact makes security techniques indispensable in IoT en-vironments. Intrusion detection is one of the vital security points, aimed at identifying attempted attacks. The characteristics of IoT devices make it impossible to apply these solutions in this environment. Also, the existing anomaly-based methods for multiclass detection do not present acceptable accuracy. We present an intrusion detection architecture that operates in the fog computing layer. It has two steps and aims to classify events into specific types of attacks or non-attacks, for the execution of countermeasures. Our work presents a relevant con-tribution to the state of the art in this aspect. We propose a hybrid binary classification method called DNN-kNN. It has high accuracy and recall rates and is ideal for composing the first level of the two-stage detection method of the presented architecture. The approach is based on Deep Neural Networks (DNN) and the k-Nearest Neighbor (kNN) algorithm. It was evaluated with the public databases NSL-KDD and CICIDS2017. We used the method of selecting attributes based on the rate of information gain. The approach proposed in this work obtained 99.77% accuracy for the NSL-KDD dataset and 99.85% accuracy for the CICIDS2017 dataset. The experimental results showed that the proposed hybrid approach was able to achieve greater precision about classic machine learning approaches and the recent advances in intrusion detection for IoT systems. In addition, the approach works with low overhead in terms of memory and processing costs.
引用
下载
收藏
页数:18
相关论文
共 50 条
  • [1] Trust-Aware Fog-Based IoT Environments: Artificial Reasoning Approach
    Ghaleb, Mustafa
    Azzedin, Farag
    APPLIED SCIENCES-BASEL, 2023, 13 (06):
  • [2] Hierarchical multistep approach for intrusion detection and identification in IoT and Fog computing-based environments
    de Souza, Cristiano Antonio
    Westphall, Carlos Becker
    Valencio, Jean Douglas Gomes
    Machado, Renato Bobsin
    Bezerra, Wesley dos R.
    AD HOC NETWORKS, 2024, 161
  • [3] A New Approach for Resource Recommendation in the Fog-Based IoT Using a Hybrid Algorithm
    Xu, Zhiwang
    Qin, Huibin
    Yang, Shengying
    Arefzadeh, Seyedeh Maryam
    COMPUTER JOURNAL, 2023, 66 (03): : 692 - 710
  • [4] Intrusion detection and prevention in fog based IoT environments: A systematic literature review
    de Souza, Cristiano Antonio
    Westphall, Carlos Becker
    Machado, Renato Bobsin
    Loffi, Leandro
    Westphall, Carla Merkle
    Geronimo, Guilherme Arthur
    COMPUTER NETWORKS, 2022, 214
  • [5] A fog-based privacy-preserving approach for distributed signature-based intrusion detection
    Wang, Yu
    Meng, Weizhi
    Li, Wenjuan
    Li, Jin
    Liu, Wai-Xi
    Xiang, Yang
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 122 : 26 - 35
  • [6] A fog-based collaborative intrusion detection framework for smart grid
    Li, Wenjuan
    Au, Man Ho
    Wang, Yu
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2021, 31 (02)
  • [7] Resource Provisioning in Fog-Based IoT
    Hatti, Daneshwari, I
    Sutagundar, Ashok, V
    INVENTIVE COMPUTATION AND INFORMATION TECHNOLOGIES, ICICIT 2021, 2022, 336 : 433 - 447
  • [8] Two-step ensemble approach for intrusion detection and identification in IoT and fog computing environments
    de Souza, Cristiano Antonio
    Westphall, Carlos Becker
    Machado, Renato Bobsin
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 98
  • [9] Enhancement of an IoT hybrid intrusion detection system based on fog-to-cloud computing
    Doaa Mohamed
    Osama Ismael
    Journal of Cloud Computing, 12
  • [10] Enhancement of an IoT hybrid intrusion detection system based on fog-to-cloud computing
    Mohamed, Doaa
    Ismael, Osama
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01):