Skip to main content
Top
Published in: Journal of Network and Systems Management 1/2022

01-01-2022

Human Immune-Based Intrusion Detection and Prevention System for Fog Computing

Authors: Farouq Aliyu, Tarek Sheltami, Mohamed Deriche, Nidal Nasser

Published in: Journal of Network and Systems Management | Issue 1/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The exponential increase in Internet of Things devices on the Internet causes a deluge of traffic at the cloud. Most of the traffic data is redundant. However, fog computing solves the problems by processing data at the network’s edge. Lately, the fog layer is a target of cyberattacks, due to its resource constraints. In this paper, we proposed a lightweight, human immune, and anomaly-based intrusion detection system (IDS) for the fog layer. The proposed system achieves low resource overhead by distributing the IDS functions among the fog nodes and the cloud. We obtained an accuracy of up to 98.8%. Also, we recorded a 10% reduction in the energy consumption of the fog node when compared with deploying a neural network on the fog node.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Prabhu, C.: Fog Computing. Springer, Deep learning and big data analytics-research directions (2019) Prabhu, C.: Fog Computing. Springer, Deep learning and big data analytics-research directions (2019)
2.
go back to reference Turner, V., MacGillivray, C., Gaw, J., Clarke, R., Morales, M., Kraus, B.: IDC futurescape: worldwide internet of things 2015 predictions. In: IDC (2014) Turner, V., MacGillivray, C., Gaw, J., Clarke, R., Morales, M., Kraus, B.: IDC futurescape: worldwide internet of things 2015 predictions. In: IDC (2014)
3.
go back to reference Computing, F.: The internet of things: extend the cloud to where the things are (2016) Computing, F.: The internet of things: extend the cloud to where the things are (2016)
4.
go back to reference Li, C., Qin, Z., Novak, E., Li, Q.: Securing SDN infrastructure of IoT-fog networks from MITM attacks. IEEE Internet Things J. 4(5), 1156–1164 (2017)CrossRef Li, C., Qin, Z., Novak, E., Li, Q.: Securing SDN infrastructure of IoT-fog networks from MITM attacks. IEEE Internet Things J. 4(5), 1156–1164 (2017)CrossRef
6.
go back to reference Hu, P., Dhelim, S., Ning, H., Qiu, T.: Survey on fog computing: architecture, key technologies, applications and open issues. J. Netw. Comput. Appl. 98, 27–42 (2017)CrossRef Hu, P., Dhelim, S., Ning, H., Qiu, T.: Survey on fog computing: architecture, key technologies, applications and open issues. J. Netw. Comput. Appl. 98, 27–42 (2017)CrossRef
7.
go back to reference Sequeira, D.: Intrusion prevention systems: securitys silver bullet? Bus. Commun. Rev. 33(3), 36–41 (2003) Sequeira, D.: Intrusion prevention systems: securitys silver bullet? Bus. Commun. Rev. 33(3), 36–41 (2003)
9.
go back to reference Scarfone, K., Mell, P.: Special Publication 800–94: Guide to Intrusion Detection and Prevention Systems. National Institute Standard and Technology, Gaithersburg (2012) Scarfone, K., Mell, P.: Special Publication 800–94: Guide to Intrusion Detection and Prevention Systems. National Institute Standard and Technology, Gaithersburg (2012)
10.
go back to reference Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J.: Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2(1), 20 (2019)CrossRef Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J.: Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2(1), 20 (2019)CrossRef
11.
go back to reference Aloqaily, M., Balasubramanian, V., Zaman, F., Al Ridhawi, I., Jararweh, Y.: Congestion mitigation in densely crowded environments for augmenting qos in vehicular clouds. In: Proceedings of the 8th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, DIVANet’18, pp. 49–56. Association for Computing Machinery, New York (2018). https://doi.org/10.1145/3272036.3272038 Aloqaily, M., Balasubramanian, V., Zaman, F., Al Ridhawi, I., Jararweh, Y.: Congestion mitigation in densely crowded environments for augmenting qos in vehicular clouds. In: Proceedings of the 8th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, DIVANet’18, pp. 49–56. Association for Computing Machinery, New York (2018). https://​doi.​org/​10.​1145/​3272036.​3272038
13.
go back to reference Otoum, Y., Nayak, A.: As-ids: anomaly and signature based ids for the internet of things. J. Netw. Syst. Manag. 29(3), 1–26 (2021)CrossRef Otoum, Y., Nayak, A.: As-ids: anomaly and signature based ids for the internet of things. J. Netw. Syst. Manag. 29(3), 1–26 (2021)CrossRef
15.
go back to reference Pacheco, J., Benitez, V.H., Félix-Herrán, L.C., Satam, P.: Artificial neural networks-based intrusion detection system for internet of things fog nodes. IEEE Access 8, 73907–73918 (2020)CrossRef Pacheco, J., Benitez, V.H., Félix-Herrán, L.C., Satam, P.: Artificial neural networks-based intrusion detection system for internet of things fog nodes. IEEE Access 8, 73907–73918 (2020)CrossRef
16.
go back to reference Al-Omari, M., Rawashdeh, M., Qutaishat, F., Mohammad, A., Ababneh, N.: An intelligent tree-based intrusion detection model for cyber security. J. Netw. Syst. Manag. 29(2), 1–18 (2021)CrossRef Al-Omari, M., Rawashdeh, M., Qutaishat, F., Mohammad, A., Ababneh, N.: An intelligent tree-based intrusion detection model for cyber security. J. Netw. Syst. Manag. 29(2), 1–18 (2021)CrossRef
17.
go back to reference Ou, C.M.: Host-based intrusion detection systems inspired by machine learning of agent-based artificial immune systems. In: 2019 IEEE International Symposium on INnovations in Intelligent SysTems and Applications (INISTA), pp. 1–5. IEEE (2019) Ou, C.M.: Host-based intrusion detection systems inspired by machine learning of agent-based artificial immune systems. In: 2019 IEEE International Symposium on INnovations in Intelligent SysTems and Applications (INISTA), pp. 1–5. IEEE (2019)
18.
go back to reference Wang, W., Ren, L., Chen, L., Ding, Y.: Intrusion detection and security calculation in industrial cloud storage based on an improved dynamic immune algorithm. Inf. Sci. 501, 543–557 (2019)CrossRef Wang, W., Ren, L., Chen, L., Ding, Y.: Intrusion detection and security calculation in industrial cloud storage based on an improved dynamic immune algorithm. Inf. Sci. 501, 543–557 (2019)CrossRef
19.
go back to reference Igbe, O., Saadawi, T., Darwish, I.: Digital immune system for intrusion detection on data processing systems and networks (2017). US Patent App. 15/633,056 Igbe, O., Saadawi, T., Darwish, I.: Digital immune system for intrusion detection on data processing systems and networks (2017). US Patent App. 15/633,056
20.
go back to reference Greensmith, J., Aickelin, U.: The deterministic dendritic cell algorithm. In: International Conference on Artificial Immune Systems, pp. 291–302. Springer (2008) Greensmith, J., Aickelin, U.: The deterministic dendritic cell algorithm. In: International Conference on Artificial Immune Systems, pp. 291–302. Springer (2008)
23.
go back to reference Pump, R., Ahlers, V., Koschel, A.: State of the art in artificial immune-based intrusion detection systems for smart grids. In: 2018 Second World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), pp. 119–126. IEEE (2018) Pump, R., Ahlers, V., Koschel, A.: State of the art in artificial immune-based intrusion detection systems for smart grids. In: 2018 Second World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), pp. 119–126. IEEE (2018)
24.
go back to reference Matzinger, P.: Tolerance, danger, and the extended family. Ann. Rev. Immunol. 12(1), 991–1045 (1994)CrossRef Matzinger, P.: Tolerance, danger, and the extended family. Ann. Rev. Immunol. 12(1), 991–1045 (1994)CrossRef
26.
go back to reference Hosseinpour, F., Amoli, P.V., Farahnakian, F., Plosila, J., Hämäläinen, T.: Artificial immune system based intrusion detection: innate immunity using an unsupervised learning approach. Int. J. Digital Content Technol. Appl. 8(5), 1 (2014) Hosseinpour, F., Amoli, P.V., Farahnakian, F., Plosila, J., Hämäläinen, T.: Artificial immune system based intrusion detection: innate immunity using an unsupervised learning approach. Int. J. Digital Content Technol. Appl. 8(5), 1 (2014)
27.
go back to reference Hosseinpour, F., Vahdani Amoli, P., Plosila, J., Hämäläinen, T., Tenhunen, H.: An intrusion detection system for fog computing and IoT based logistic systems using a smart data approach. Int. J. Digital Content Technol. Appl. 10 (2016) Hosseinpour, F., Vahdani Amoli, P., Plosila, J., Hämäläinen, T., Tenhunen, H.: An intrusion detection system for fog computing and IoT based logistic systems using a smart data approach. Int. J. Digital Content Technol. Appl. 10 (2016)
32.
go back to reference Nath, O.: Review on raspberry pi 3b+ and its scope. Int. J. Eng. Appl. Sci. Technol. 4(9), 157–159 (2020) Nath, O.: Review on raspberry pi 3b+ and its scope. Int. J. Eng. Appl. Sci. Technol. 4(9), 157–159 (2020)
34.
go back to reference Crovella, M.E., Carter, R.L.: Dynamic server selection in the internet. In: Third IEEE workshop on the architecture and implementation of high performance communication subsystems (HPCS) (1995) Crovella, M.E., Carter, R.L.: Dynamic server selection in the internet. In: Third IEEE workshop on the architecture and implementation of high performance communication subsystems (HPCS) (1995)
36.
go back to reference Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., et al.: Scikit-learn: machine learning in python. J. Mach. Learn. Res. 12, 2825–2830 (2011)MathSciNetMATH Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., et al.: Scikit-learn: machine learning in python. J. Mach. Learn. Res. 12, 2825–2830 (2011)MathSciNetMATH
39.
go back to reference Sudqi Khater, B., Abdul Wahab, A., Idris, M., Abdulla Hussain, M., Ahmed Ibrahim, A.: A lightweight perceptron-based intrusion detection system for fog computing. Appl. Sci. 9(1), 178 (2019)CrossRef Sudqi Khater, B., Abdul Wahab, A., Idris, M., Abdulla Hussain, M., Ahmed Ibrahim, A.: A lightweight perceptron-based intrusion detection system for fog computing. Appl. Sci. 9(1), 178 (2019)CrossRef
40.
go back to reference Krügel, C., Toth, T., Kirda, E.: Service specific anomaly detection for network intrusion detection. In: Proceedings of the 2002 ACM symposium on applied computing, pp. 201–208 (2002) Krügel, C., Toth, T., Kirda, E.: Service specific anomaly detection for network intrusion detection. In: Proceedings of the 2002 ACM symposium on applied computing, pp. 201–208 (2002)
Metadata
Title
Human Immune-Based Intrusion Detection and Prevention System for Fog Computing
Authors
Farouq Aliyu
Tarek Sheltami
Mohamed Deriche
Nidal Nasser
Publication date
01-01-2022
Publisher
Springer US
Published in
Journal of Network and Systems Management / Issue 1/2022
Print ISSN: 1064-7570
Electronic ISSN: 1573-7705
DOI
https://doi.org/10.1007/s10922-021-09616-6

Other articles of this Issue 1/2022

Journal of Network and Systems Management 1/2022 Go to the issue

Premium Partner