Exact greedy algorithm based split finding approach for intrusion detection in fog-enabled IoT environment

被引:22
|
作者
Reddy, Dukka Karun Kumar [1 ]
Behera, H. S. [1 ]
Nayak, Janmenjoy [2 ]
Naik, Bighnaraj [3 ]
Ghosh, Uttam [4 ]
Sharma, Pradip Kumar [5 ]
机构
[1] Veer Surendra Sai Univ Technol, Dept Informat Technol, Burla 768018, India
[2] Aditya Inst Technol & Management AITAM, Dept Comp Sci & Engn, K Kotturu 532201, AP, India
[3] Veer Surendra Sai Univ Technol, Dept Comp Applicat, Burla 768018, India
[4] Vanderbilt Univ, Dept EECS, Nashville, TN USA
[5] Univ Aberdeen, Dept Comp Sci, Aberdeen, Scotland
关键词
Intrusion detection system (IDS); Internet of Things (IoT); Fog computing; Critical infrastructure (CI); Exact Greedy Boosting (XGBoost); Ensemble learning; Anomaly detection; ATTACK DETECTION;
D O I
10.1016/j.jisa.2021.102866
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The essential role of intrusion detection is to manage the critical infrastructure to detect malicious activity competently concerning the Internet of Things (IoT). The IoT network is used to communicate and control information among various components composing a critical system. The essential inclination of infrastructure swerves to confront security issues and challenges as network systems are examined to expose cyber-related threats. Additionally, accessing real-time information from the cloud leads to a massive problem of latency. Fog computing is a novel archetype to encompass the cloud to the network edge with practical computation and critical infrastructure. The fog layer makes the device vulnerable to numerous attacks because of rapid access to resources. The practical way of addressing these issues is to detect intrusions effectively and trace the path leading to the attack source. The intent of this paper is to present a security mechanism and assure truthful operation of IoT networks with the intrusion detection system. A network intrusion detection system is proposed based on the conception of the Exact Greedy Boosting ensemble method for device implementation in the fog node because of protecting critical infrastructure from timely and accurate detection of malicious activities. The proposed model explores the traffic flow monitoring in novel IoT Intrusion Dataset 2020(IoTID20) network traffic by identifying and classifying the type of attack based on anomalies from normal behavior. Further, the paper estimates the complete experimentation performance and evaluations with competitive machine learning algorithms. The experimental observation of the simulation work is evident in the proposed model's efficiency and robustness in categorizing the attacks.
引用
收藏
页数:35
相关论文
共 50 条
  • [11] An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT Environments
    Lin, Han-Yu
    Tsai, Tung-Tso
    Ting, Pei-Yih
    Chen, Ching-Chung
    [J]. SENSORS, 2022, 22 (11)
  • [12] Lightweight blockchain-based remote user authentication for fog-enabled IoT deployment
    Harbi, Yasmine
    Aliouat, Zibouda
    Harous, Saad
    Gueroui, Abdelhak Mourad
    [J]. COMPUTER COMMUNICATIONS, 2024, 221 : 90 - 105
  • [13] Online Learning based Matching for Decentralized Task Offloading in Fog-enabled IoT Systems
    Tran-Dang, Hoa
    Kim, Dong-Seong
    [J]. 2023 28TH ASIA PACIFIC CONFERENCE ON COMMUNICATIONS, APCC 2023, 2023, : 231 - 236
  • [14] Implementing attack detection system using filter-based feature selection methods for fog-enabled IoT networks
    Pooja Chaudhary
    Brij Gupta
    A. K. Singh
    [J]. Telecommunication Systems, 2022, 81 : 23 - 39
  • [15] Implementing attack detection system using filter-based feature selection methods for fog-enabled IoT networks
    Chaudhary, Pooja
    Gupta, Brij
    Singh, A. K.
    [J]. TELECOMMUNICATION SYSTEMS, 2022, 81 (01) : 23 - 39
  • [16] A revocable multi-authority attribute-based encryption scheme for fog-enabled IoT
    Penuelas-Angulo, Alejandro
    Feregrino-Uribe, Claudia
    Morales-Sandoval, Miguel
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 155
  • [17] Delay and energy aware task scheduling mechanism for fog-enabled IoT applications: A reinforcement learning approach
    Raju, Mekala Ratna
    Mothku, Sai Krishna
    [J]. COMPUTER NETWORKS, 2023, 224
  • [18] A Review on Matching-based Models for Distributed Computation Offloading in Fog-enabled IoT Systems
    Tran-Dang, Hoa
    Kim, Dong-Seong
    [J]. 2023 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN, 2023, : 758 - 763
  • [19] A novel hybrid optimization enabled robust CNN algorithm for an IoT network intrusion detection approach
    Bahaa, Ahmed
    Sayed, Abdalla
    Elfangary, Laila
    Fahmy, Hanan
    [J]. PLOS ONE, 2022, 17 (12):
  • [20] Deep learning enabled intrusion detection system for Industrial IOT environment
    Nandanwar, Himanshu
    Katarya, Rahul
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2024, 249