Published July 30, 2022 | Version CC BY-NC-ND 4.0
Journal article Open

Deep Learning Technique to Identify the Malicious Traffic in Fog based IoT Networks

  • 1. Department of Computer Engineering, College of Engineering, Pune (Maharashtra), India.
  • 2. Department of Computer Engineering, College of Engineering, Pune (Maharashtra), India.

Contributors

Contact person:

  • 1. Department of Computer Engineering, College of Engineering, Pune (Maharashtra), India.

Description

Abstract: The network of devices known as the Internet of Things (IoT) consists of hardware with sensors and software. These devices communicate and exchange data through the internet. IoT device-based data exchanges are often processed at cloud servers. Since the number of edge devices and quantity of data exchanged is increasing, massive latency-related concerns are observed. The answer to these issues is fog computing technology. Fog computing layer is introduced between the edge devices and cloud servers. Edge devices can conveniently access data from the fog servers. Security of fog layer devices is a major concern. As it provides easy access to different resources, it is more vulnerable to different attacks. In this paper, a deep learning-based intrusion detection approach called Multi-LSTM Aggregate Classifier is proposed to identify malicious traffic for the fog-based IoT network. The MLAC approach contains a set of long short-term memory (LSTM) modules. The final outcomes of these modules are aggregated using a Random Forest to produce the final outcome. Network intrusion dataset UNSW-NB15 is used to evaluate performance of the MLAC technique. For binary classification accuracy of 89.40% has been achieved using the proposed deep learning-based MLAC model.

Notes

Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP) © Copyright: All rights reserved.

Files

H91790711822.pdf

Files (751.0 kB)

Name Size Download all
md5:e26d9f630bb7330f97cf3d08db6a1058
751.0 kB Preview Download

Additional details

Related works

Is cited by
Journal article: 2278-3075 (ISSN)

References

  • SenguptaJ. Sushmita R. and Das S. B. A comprehensive survey on attacks, security issues and blockchain solutions for iot and iiot. Journal of Net. and Comp. App., 149:102481, 2020.
  • GhofraneFersi. Fog computing and iot in one building block: a survey and an overview of interacting techs. The Cluster Computing, 24, 12 2021.
  • B. Flavio and Milito R. Fog computing and its role in the iot. The Proceedings of the MCC workshop on Mobile Cloud Computing, 08 2012.
  • L. Vaquero and L.Rodero M. Finding your way in the fog: Towards comprehensive def. of fog comp. The HP Laboratories Technical Report, 44, 01 2014.
  • Lei S. Choudhary N. Kumar V. Maglaras L. MukherjeeM., MatamR. and Ferrag M. A. Sec. and privacy in fog comp.: Challenges. IEEE Acc, PP, 09 2017.
  • Dr.WangandDr.BasarSmys S. Hybrid ids for iot. J. of ISMAC, 2:190–199, 09 2020.
  • Pahl M-O, Aubet F-X All eyes on you: distributed multidimensional IoT microservice anomaly detection, pp 72–80. IEEE
  • Pajouh HH, Dastghaibyfard G, Hashemi S Two-tier network anomaly detection model: a machine learning approach. J Intell Inf Syst 48(1):61–74
  • Moustafa N, Slay J The evaluation of network anomaly detection systems: statistical analysis of the UNSW-NB15 data set and the comparison with the kdd99 data set. Inf Secur J Glob Perspect 25(1–3):18–31
  • Pajouh HH, Javidan R, Khayami R, Ali D, Choo KKR A two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Transactions on Emerging Topics in Computing
  • Kumar V, Das AK, Sinha D UIDS: a unifed intrusion detection system for IoT environment. Evol Intell. https://doi.org/10.1007/ s12065-019-00291-w
  • Prabhat Kumar, Gupta, G.P. & Tripathi, R. Design of Anomaly-Based Intrusion Detection System Using Fog Computing for IoT Network. Aut. Control Comp. Sci. 55, 137–147 (2021).
  • Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using deep learning approach for internet of things. Future Gener Comput Syst 82:761–768
  • Papamartzivanos D, Mármol FG, Kambourakis G Dendron: genetic trees driven rule induction for network intrusion detection systems. Future Gener Comput Syst 79:558–574
  • Prabavathy S, Sundarakantham K, Shalinie SM Design of cognitive fog computing for intrusion detection in internet of things. J Commun Netw 20(3):291–298
  • Kumar, Prabhat & Gupta, Govind & Tripathi, Rakesh. . A distributed ensemble design based intrusion detection system using fog computing to protect the internet of things networks. Journal of Ambient Intelligence and Humanized Computing.
  • Kasongo, S.M., Sun, Y. Performance Analysis of Intrusion Detection Systems Using a Feature Selection Method on the UNSW-NB15 Dataset. J Big Data 7, 105 (2020)
  • Khan FA, Gumaei A, Derhab A, Hussain A A novel two-stage deep learning model for efcient network intrusion detection. IEEE Access 7:30373–30385
  • K. Jiang, W. Wang, A. Wang and H. Wu, "Network Intrusion Detection Combined Hybrid Sampling With Deep Hierarchical Network," in IEEE Access, vol. 8, pp. 32464-32476, 2020, doi: 10.1109/ACCESS.2020.2973730.
  • Hasan, Mahmudul & Islam, Md & Islam, Ishrak & Hashem, M.M.A. (2019). Attack and Anomaly Detection in IoT Sensors in IoT Sites Using Machine Learning Approaches. 100059. 10.1016/j.iot.2019.100059.

Subjects

ISSN: 2278-3075 (Online)
https://portal.issn.org/resource/ISSN/2278-3075#
Retrieval Number: 100.1/ijitee.H91790711822
https://www.ijitee.org/portfolio-item/h91790711822/
Journal Website: www.ijitee.org
https://www.ijitee.org/
Publisher: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP)
https://www.blueeyesintelligence.org/