Exact greedy algorithm based split finding approach for intrusion detection in fog-enabled IoT environment

被引:22
|
作者
Reddy, Dukka Karun Kumar [1 ]
Behera, H. S. [1 ]
Nayak, Janmenjoy [2 ]
Naik, Bighnaraj [3 ]
Ghosh, Uttam [4 ]
Sharma, Pradip Kumar [5 ]
机构
[1] Veer Surendra Sai Univ Technol, Dept Informat Technol, Burla 768018, India
[2] Aditya Inst Technol & Management AITAM, Dept Comp Sci & Engn, K Kotturu 532201, AP, India
[3] Veer Surendra Sai Univ Technol, Dept Comp Applicat, Burla 768018, India
[4] Vanderbilt Univ, Dept EECS, Nashville, TN USA
[5] Univ Aberdeen, Dept Comp Sci, Aberdeen, Scotland
关键词
Intrusion detection system (IDS); Internet of Things (IoT); Fog computing; Critical infrastructure (CI); Exact Greedy Boosting (XGBoost); Ensemble learning; Anomaly detection; ATTACK DETECTION;
D O I
10.1016/j.jisa.2021.102866
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The essential role of intrusion detection is to manage the critical infrastructure to detect malicious activity competently concerning the Internet of Things (IoT). The IoT network is used to communicate and control information among various components composing a critical system. The essential inclination of infrastructure swerves to confront security issues and challenges as network systems are examined to expose cyber-related threats. Additionally, accessing real-time information from the cloud leads to a massive problem of latency. Fog computing is a novel archetype to encompass the cloud to the network edge with practical computation and critical infrastructure. The fog layer makes the device vulnerable to numerous attacks because of rapid access to resources. The practical way of addressing these issues is to detect intrusions effectively and trace the path leading to the attack source. The intent of this paper is to present a security mechanism and assure truthful operation of IoT networks with the intrusion detection system. A network intrusion detection system is proposed based on the conception of the Exact Greedy Boosting ensemble method for device implementation in the fog node because of protecting critical infrastructure from timely and accurate detection of malicious activities. The proposed model explores the traffic flow monitoring in novel IoT Intrusion Dataset 2020(IoTID20) network traffic by identifying and classifying the type of attack based on anomalies from normal behavior. Further, the paper estimates the complete experimentation performance and evaluations with competitive machine learning algorithms. The experimental observation of the simulation work is evident in the proposed model's efficiency and robustness in categorizing the attacks.
引用
收藏
页数:35
相关论文
共 50 条
  • [1] Fog-enabled Event Processing Based on IoT Resource Models
    Zhang, Yang
    Sheng, Victor S.
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2019, 31 (09) : 1707 - 1721
  • [2] A new clustering-based optimised energy approach for fog-enabled IoT networks
    Essalhi, Salah Eddine
    Raiss El Fenni, Mohammed
    Chafnaji, Houda
    [J]. IET NETWORKS, 2023, 12 (04) : 155 - 166
  • [3] A Secure Data Sharing Based on Key Aggregate Searchable Encryption in Fog-Enabled IoT Environment
    Oh, Jihyeon
    Lee, JoonYoung
    Kim, MyeongHyun
    Park, Youngho
    Park, KiSung
    Noh, SungKee
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (06): : 4468 - 4481
  • [4] A Distributed Resource Allocation Algorithm for Task Offloading in Fog-enabled IoT Systems
    Tran-Dang, Hoa
    Kim, Dong-Seong
    [J]. 12TH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2021), 2021, : 455 - 460
  • [5] Task Priority-based Resource Allocation Algorithm for Task Offloading in Fog-enabled IoT Systems
    Tran-Dang, Hoa
    Kim, Dong-Seong
    [J]. 35TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2021), 2021, : 674 - 679
  • [6] Hybrid approach to intrusion detection in fog-based IoT environments
    de Souza, Cristiano Antonio
    Westphall, Carlos Becker
    Machado, Renato Bobsin
    Mangueira Sobral, Joao Bosco
    Vieira, Gustavo dos Santos
    [J]. COMPUTER NETWORKS, 2020, 180 (180)
  • [7] Blockchain-Based Key Management Scheme in Fog-Enabled IoT Systems
    Chen, Tong
    Zhang, Lei
    Choo, Kim-Kwang Raymond
    Zhang, Rui
    Meng, Xinyu
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (13) : 10766 - 10778
  • [8] Multiarmed-Bandit-Based Decentralized Computation Offloading in Fog-Enabled IoT
    Misra, Sudip
    Rachuri, Pramodh
    Deb, Pallav Kumar
    Mukherjee, Anandarup
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (12) : 10010 - 10017
  • [9] Routing in Fog-Enabled IoT Platforms: A Survey and an SDN-Based Solution
    Okay, Feyza Yildirim
    Ozdemir, Suat
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (06): : 4871 - 4889
  • [10] Swarm intelligence for IoT attack detection in fog-enabled cyber-physical system*
    Alohali, Manal Abdullah
    Elsadig, Muna
    Al-Wesabi, Fahd N.
    Al Duhayyim, Mesfer
    Hilal, Anwer Mustafa
    Motwakel, Abdelwahed
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2023, 108