Enhancement of an IoT hybrid intrusion detection system based on fog-to-cloud computing

被引:0
|
作者
Doaa Mohamed
Osama Ismael
机构
[1] Cairo University,Department of Information Systems, Faculty of Computers and Artificial Intelligence
来源
关键词
Fog computing; Internet of things; Genetic algorithm; Intrusion detection; Neural network; Standard deviation;
D O I
暂无
中图分类号
学科分类号
摘要
Nowadays, with the proliferation of internet of things-connected devices, the scope of cyber-attacks on the internet of things has grown exponentially. So, it makes it a necessity to develop an efficient and accurate intrusion detection system that should be fast, dynamic, and scalable in an internet of things environment. On the other hand, Fog computing is a decentralized platform that extends Cloud computing to deal with the inherent issues of the Cloud computing. As well, maintaining a high level of security is critical in order to ensure secure and reliable communication between Fog nodes and internet of things devices. To address this issue, we present an intrusion detection method based on artificial neural networks and genetic algorithms to efficiently detect various types of network intrusions on local Fog nodes. Through this approach, we applied genetic algorithms to optimize the interconnecting weights of the network and the biases associated with each neuron. Therefore, it can quickly and effectively establish a back-propagation neural network model. Moreover, the distributed architecture of fog computing enables the distribution of the intrusion detection system over local Fog nodes with a centralized Cloud, which achieves faster attack detection than the Cloud intrusion detection mechanism. A set of experiments were conducted on the Raspberry Pi4 as a Fog node, based on the UNSW-NB15 and ToN_IoT data sets for binary-class classification, which showed that the optimized weights and biases achieved better performance than those who used the neural network without optimization. The optimized model showed interoperability, flexibility, and scalability. Furthermore, achieving a higher intrusion detection rate through decreasing the neural network error rate and increasing the true positive rate is also possible. According to the experiments, the suggested approach produces better outcomes in terms of detection accuracy and processing time. In this case, the proposed approach achieved an 16.35% and 37.07% reduction in execution time for both data sets, respectively, compared to other state-of-the-art methods, which enhanced the acceleration of the convergence process and saved processing power.
引用
收藏
相关论文
共 50 条
  • [41] A Collaborative Intrusion Detection and Prevention System in Cloud Computing
    Hassani, Mohamed
    Lebbat, Adil
    Talial, Saida
    Imedromi, Hicham
    [J]. AFRICON, 2013, 2013,
  • [42] Poster: Developing an Intrusion Detection System for Cloud Computing
    Dang Duy Thang
    Le Hoai Nam
    Nguyen Tan Khoi
    [J]. MOBISYS'16: COMPANION COMPANION PUBLICATION OF THE 14TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, 2016, : 20 - 20
  • [43] Proxy Network Intrusion Detection System for Cloud Computing
    Oktay, Ueman
    Sahingoz, Ozgur Koray
    [J]. 2013 INTERNATIONAL CONFERENCE ON TECHNOLOGICAL ADVANCES IN ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING (TAEECE), 2013, : 98 - 104
  • [44] Intrusion Detection Based on Autoencoder and Isolation Forest in Fog Computing
    Sadaf, Kishwar
    Sultana, Jabeen
    [J]. IEEE ACCESS, 2020, 8 : 167059 - 167068
  • [45] The Research of Intrusion Detection System in Cloud Computing Environment
    Wang, Huaibin
    Zhou, Haiyun
    [J]. ADVANCES IN MULTIMEDIA, SOFTWARE ENGINEERING AND COMPUTING, VOL 1, 2011, 128 : 45 - 49
  • [46] Intrusion Detection System in Cloud Computing: Challenges and Opportunities
    Mehmood, Yasir
    Shibli, Muhammad Awais
    Habiba, Umme
    Masood, Rahat
    [J]. 2013 2ND NATIONAL CONFERENCE ON INFORMATION ASSURANCE (NCIA), 2013, : 59 - 66
  • [47] An Intelligent Intrusion Detection System for Cloud Computing (SIDSCC)
    Alqahtani, Saeed M.
    Al Balushi, Maqbool
    John, Robert
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), VOL 2, 2014, : 135 - 141
  • [48] A smart fog-to-cloud system in airport: challenges and lessons learnt
    Salis, Antonio
    Jensen, Jens
    [J]. 2020 21ST IEEE INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT (MDM 2020), 2020, : 359 - 364
  • [49] Intrusion Detection in Cloud Computing
    Ficco, Massimo
    Tasquier, Luca
    Aversa, Rocco
    [J]. 2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 276 - 283
  • [50] Distributed intrusion detection based on hybrid gene expression programming and cloud computing in a cyber physical power system
    Deng, Song
    Zhou, Ai-Hua
    Yue, Dong
    Hu, Bin
    Zhu, Li-Peng
    [J]. IET CONTROL THEORY AND APPLICATIONS, 2017, 11 (11): : 1822 - 1829