Skip to main content

Deep Learning Approach-Based Network Intrusion Detection System for Fog-Assisted IoT

  • Conference paper
  • First Online:
Proceedings of International Conference on Big Data, Machine Learning and their Applications

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 150))

Abstract

In an Internet of Things (IoT) network, miscellaneous devices exchange their resources as per their requirement via the Internet. The data aggregated from these IoT devices are stored in the cloud layer. Increment in the number of IoT devices and accessing real-time data leads to a huge latency issue. One solution is to use the fog layer which is an adjunct layer between the cloud layer and the end-user. It is very convenient for the user to access the data from the fog layer as it is at the brink of the network. Security in the fog layer is a major drawback. Easy accessing of resources from the fog layer makes the system more vulnerable to various attacks. In this research work, network intrusion detection system (NIDS) is developed based on the conception of deep learning. NIDS is a device implemented in the fog node for attack detection. This model proficiently detects any kind of malicious activity. UNSW-NB15 and NSL-KDD datasets are used to evaluate the performance of the proposed NIDS model. Accuracy of the model is also compared with these datasets. The result analysis shows that the model is working more efficiently for the NSL-KDD dataset. The accuracy of the proposed NIDS model for the UNSW-NB15 and NSL-KDD datasets is 91.20% and 95.40%, respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kaur, H., & Sood, S. K. (2019). Fog-assisted IoT-enabled scalable network infrastructure for wildfire surveillance. Journal of Network and Computer Applications, 144, 171–183.

    Article  Google Scholar 

  2. Mutlag, A. A., Ghani, M. K. A., Arunkumar, N. A., Mohammed, M. A., & Mohd, O. (2019). Enabling technologies for fog computing in healthcare IoT systems. Future Generation Computer Systems, 90, 62–78.

    Article  Google Scholar 

  3. Thamilarasu, G., & Chawla, S. (2019). Towards deep-learning-driven intrusion detection for the Internet of Things. Sensors, 19(9), 1977.

    Article  Google Scholar 

  4. Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems, 82, 761–768.

    Article  Google Scholar 

  5. Mohsen, H., El-Dahshan, E. S. A., El-Horbaty, E. S. M., & Salem, A. B. M. (2018). Classification using deep learning neural networks for brain tumors. Future Computing and Informatics Journal, 3(1), 68–71.

    Article  Google Scholar 

  6. Dung, C. V. (2019). Autonomous concrete crack detection using deep fully convolutional neural network. Automation in Construction, 99, 52–58.

    Article  Google Scholar 

  7. Feng, S., Zhou, H., & Dong, H. (2019). Using deep neural network with the small dataset to predict material defects. Materials & Design, 162, 300–310.

    Article  Google Scholar 

  8. Tuli, S., Basumatary, N., Gill, S. S., Kahani, M., Arya, R. C., Wander, G. S., & Buyya, R. (2020). HealthFog: An ensemble deep learning based Smart Healthcare System for Automatic Diagnosis of Heart Diseases in integrated IoT and fog computing environments. Future Generation Computer Systems, 104, 187–200.

    Article  Google Scholar 

  9. Zhang, P., Wang, S., Guo, K., & Wang, J. (2018). A secure data collection scheme based on compressive sensing in wireless sensor networks. Ad Hoc Networks, 70, 73–84.

    Article  Google Scholar 

  10. Feng, F., Liu, X., Yong, B., Zhou, R., & Zhou, Q. (2019). Anomaly detection in ad-hoc networks based on deep learning model: A plug and play device. Ad Hoc Networks, 84, 82–89.

    Article  Google Scholar 

  11. Karatas, G., Demir, O., & Sahingoz, O. K. (2018, December). Deep learning in intrusion detection systems. In 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT) (pp. 113–116). IEEE.

    Google Scholar 

  12. Vijayakumar, R., Alazab, M., Soman, K. P., Poornachandran, P., Al-Nemrat, A., & Venkatraman, S. (2019). Deep learning approach for the intelligent intrusion detection system. IEEE Access, 7, 41525–41550.

    Article  Google Scholar 

  13. Muna, A. H., Moustafa, N., & Sitnikova, E. (2018). Identification of malicious activities in the industrial internet of things based on deep learning models. Journal of Information Security and Applications, 41, 1–11.

    Article  Google Scholar 

  14. Abusitta, A., Bellaiche, M., Dagenais, M., & Halabi, T. (2019). A deep learning approach for the proactive multi-cloud cooperative intrusion detection system. Future Generation Computer Systems, 98, 308–318.

    Article  Google Scholar 

  15. Kong, Y., Gao, J., Xu, Y., Pan, Y., Wang, J., & Liu, J. (2019). Classification of autism spectrum disorder by combining brain connectivity and deep neural network classifier. Neurocomputing, 324, 63–68.

    Article  Google Scholar 

  16. Aloqaily, M., Otoum, S., & Al Ridhawi, I. (2019). & Jararweh, YAnintrusion detection system for connected vehicles in smart cities. Ad Hoc Networks, 90, 101842.

    Article  Google Scholar 

  17. Elsaeidy, A., Munasinghe, K. S., Sharma, D., & Jamalipour, A. (2019). Intrusion detection in smart cities using Restricted Boltzmann Machines. Journal of Network and Computer Applications, 135, 76–83.

    Article  Google Scholar 

  18. Song, H. M., Woo, J., & Kim, H. K. (2020). In-vehicle network intrusion detection using deep convolutional neural network. Vehicular Communications, 21, 100198.

    Article  Google Scholar 

  19. Amanullah, M. A., Habeeb, R. A. A., Nasaruddin, F. H., Gani, A., Ahmed, E., Nainar, A. S. M., et al. (2020). Deep learning and big data technologies for IoT security. Computer Communications.

    Google Scholar 

  20. Choudhary, S., & Kesswani, N. (2020). Analysis of KDD-Cup’99, NSL-KDD and UNSW-NB15 Datasets using Deep Learning in IoT. Procedia Computer Science, 167, 1561–1573.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nausheen Sahar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sahar, N., Mishra, R., Kalam, S. (2021). Deep Learning Approach-Based Network Intrusion Detection System for Fog-Assisted IoT. In: Tiwari, S., Suryani, E., Ng, A.K., Mishra, K.K., Singh, N. (eds) Proceedings of International Conference on Big Data, Machine Learning and their Applications. Lecture Notes in Networks and Systems, vol 150. Springer, Singapore. https://doi.org/10.1007/978-981-15-8377-3_4

Download citation

Publish with us

Policies and ethics