Deep Learning Technique to Identify the Malicious Traffic in Fog based IoT Networks
Authors/Creators
- 1. Department of Computer Engineering, College of Engineering, Pune (Maharashtra), India.
- 2. Department of Computer Engineering, College of Engineering, Pune (Maharashtra), India.
Contributors
Contact person:
- 1. Department of Computer Engineering, College of Engineering, Pune (Maharashtra), India.
Description
Abstract: The network of devices known as the Internet of Things (IoT) consists of hardware with sensors and software. These devices communicate and exchange data through the internet. IoT device-based data exchanges are often processed at cloud servers. Since the number of edge devices and quantity of data exchanged is increasing, massive latency-related concerns are observed. The answer to these issues is fog computing technology. Fog computing layer is introduced between the edge devices and cloud servers. Edge devices can conveniently access data from the fog servers. Security of fog layer devices is a major concern. As it provides easy access to different resources, it is more vulnerable to different attacks. In this paper, a deep learning-based intrusion detection approach called Multi-LSTM Aggregate Classifier is proposed to identify malicious traffic for the fog-based IoT network. The MLAC approach contains a set of long short-term memory (LSTM) modules. The final outcomes of these modules are aggregated using a Random Forest to produce the final outcome. Network intrusion dataset UNSW-NB15 is used to evaluate performance of the MLAC technique. For binary classification accuracy of 89.40% has been achieved using the proposed deep learning-based MLAC model.
Notes
Files
H91790711822.pdf
Files
(751.0 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:e26d9f630bb7330f97cf3d08db6a1058
|
751.0 kB | Preview Download |
Additional details
Related works
- Is cited by
- Journal article: 2278-3075 (ISSN)
References
- SenguptaJ. Sushmita R. and Das S. B. A comprehensive survey on attacks, security issues and blockchain solutions for iot and iiot. Journal of Net. and Comp. App., 149:102481, 2020.
- GhofraneFersi. Fog computing and iot in one building block: a survey and an overview of interacting techs. The Cluster Computing, 24, 12 2021.
- B. Flavio and Milito R. Fog computing and its role in the iot. The Proceedings of the MCC workshop on Mobile Cloud Computing, 08 2012.
- L. Vaquero and L.Rodero M. Finding your way in the fog: Towards comprehensive def. of fog comp. The HP Laboratories Technical Report, 44, 01 2014.
- Lei S. Choudhary N. Kumar V. Maglaras L. MukherjeeM., MatamR. and Ferrag M. A. Sec. and privacy in fog comp.: Challenges. IEEE Acc, PP, 09 2017.
- Dr.WangandDr.BasarSmys S. Hybrid ids for iot. J. of ISMAC, 2:190–199, 09 2020.
- Pahl M-O, Aubet F-X All eyes on you: distributed multidimensional IoT microservice anomaly detection, pp 72–80. IEEE
- Pajouh HH, Dastghaibyfard G, Hashemi S Two-tier network anomaly detection model: a machine learning approach. J Intell Inf Syst 48(1):61–74
- Moustafa N, Slay J The evaluation of network anomaly detection systems: statistical analysis of the UNSW-NB15 data set and the comparison with the kdd99 data set. Inf Secur J Glob Perspect 25(1–3):18–31
- Pajouh HH, Javidan R, Khayami R, Ali D, Choo KKR A two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Transactions on Emerging Topics in Computing
- Kumar V, Das AK, Sinha D UIDS: a unifed intrusion detection system for IoT environment. Evol Intell. https://doi.org/10.1007/ s12065-019-00291-w
- Prabhat Kumar, Gupta, G.P. & Tripathi, R. Design of Anomaly-Based Intrusion Detection System Using Fog Computing for IoT Network. Aut. Control Comp. Sci. 55, 137–147 (2021).
- Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using deep learning approach for internet of things. Future Gener Comput Syst 82:761–768
- Papamartzivanos D, Mármol FG, Kambourakis G Dendron: genetic trees driven rule induction for network intrusion detection systems. Future Gener Comput Syst 79:558–574
- Prabavathy S, Sundarakantham K, Shalinie SM Design of cognitive fog computing for intrusion detection in internet of things. J Commun Netw 20(3):291–298
- Kumar, Prabhat & Gupta, Govind & Tripathi, Rakesh. . A distributed ensemble design based intrusion detection system using fog computing to protect the internet of things networks. Journal of Ambient Intelligence and Humanized Computing.
- Kasongo, S.M., Sun, Y. Performance Analysis of Intrusion Detection Systems Using a Feature Selection Method on the UNSW-NB15 Dataset. J Big Data 7, 105 (2020)
- Khan FA, Gumaei A, Derhab A, Hussain A A novel two-stage deep learning model for efcient network intrusion detection. IEEE Access 7:30373–30385
- K. Jiang, W. Wang, A. Wang and H. Wu, "Network Intrusion Detection Combined Hybrid Sampling With Deep Hierarchical Network," in IEEE Access, vol. 8, pp. 32464-32476, 2020, doi: 10.1109/ACCESS.2020.2973730.
- Hasan, Mahmudul & Islam, Md & Islam, Ishrak & Hashem, M.M.A. (2019). Attack and Anomaly Detection in IoT Sensors in IoT Sites Using Machine Learning Approaches. 100059. 10.1016/j.iot.2019.100059.
Subjects
- ISSN: 2278-3075 (Online)
- https://portal.issn.org/resource/ISSN/2278-3075#
- Retrieval Number: 100.1/ijitee.H91790711822
- https://www.ijitee.org/portfolio-item/h91790711822/
- Journal Website: www.ijitee.org
- https://www.ijitee.org/
- Publisher: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP)
- https://www.blueeyesintelligence.org/