Abstract
In an Internet of Things (IoT) network, miscellaneous devices exchange their resources as per their requirement via the Internet. The data aggregated from these IoT devices are stored in the cloud layer. Increment in the number of IoT devices and accessing real-time data leads to a huge latency issue. One solution is to use the fog layer which is an adjunct layer between the cloud layer and the end-user. It is very convenient for the user to access the data from the fog layer as it is at the brink of the network. Security in the fog layer is a major drawback. Easy accessing of resources from the fog layer makes the system more vulnerable to various attacks. In this research work, network intrusion detection system (NIDS) is developed based on the conception of deep learning. NIDS is a device implemented in the fog node for attack detection. This model proficiently detects any kind of malicious activity. UNSW-NB15 and NSL-KDD datasets are used to evaluate the performance of the proposed NIDS model. Accuracy of the model is also compared with these datasets. The result analysis shows that the model is working more efficiently for the NSL-KDD dataset. The accuracy of the proposed NIDS model for the UNSW-NB15 and NSL-KDD datasets is 91.20% and 95.40%, respectively.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kaur, H., & Sood, S. K. (2019). Fog-assisted IoT-enabled scalable network infrastructure for wildfire surveillance. Journal of Network and Computer Applications, 144, 171–183.
Mutlag, A. A., Ghani, M. K. A., Arunkumar, N. A., Mohammed, M. A., & Mohd, O. (2019). Enabling technologies for fog computing in healthcare IoT systems. Future Generation Computer Systems, 90, 62–78.
Thamilarasu, G., & Chawla, S. (2019). Towards deep-learning-driven intrusion detection for the Internet of Things. Sensors, 19(9), 1977.
Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems, 82, 761–768.
Mohsen, H., El-Dahshan, E. S. A., El-Horbaty, E. S. M., & Salem, A. B. M. (2018). Classification using deep learning neural networks for brain tumors. Future Computing and Informatics Journal, 3(1), 68–71.
Dung, C. V. (2019). Autonomous concrete crack detection using deep fully convolutional neural network. Automation in Construction, 99, 52–58.
Feng, S., Zhou, H., & Dong, H. (2019). Using deep neural network with the small dataset to predict material defects. Materials & Design, 162, 300–310.
Tuli, S., Basumatary, N., Gill, S. S., Kahani, M., Arya, R. C., Wander, G. S., & Buyya, R. (2020). HealthFog: An ensemble deep learning based Smart Healthcare System for Automatic Diagnosis of Heart Diseases in integrated IoT and fog computing environments. Future Generation Computer Systems, 104, 187–200.
Zhang, P., Wang, S., Guo, K., & Wang, J. (2018). A secure data collection scheme based on compressive sensing in wireless sensor networks. Ad Hoc Networks, 70, 73–84.
Feng, F., Liu, X., Yong, B., Zhou, R., & Zhou, Q. (2019). Anomaly detection in ad-hoc networks based on deep learning model: A plug and play device. Ad Hoc Networks, 84, 82–89.
Karatas, G., Demir, O., & Sahingoz, O. K. (2018, December). Deep learning in intrusion detection systems. In 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT) (pp. 113–116). IEEE.
Vijayakumar, R., Alazab, M., Soman, K. P., Poornachandran, P., Al-Nemrat, A., & Venkatraman, S. (2019). Deep learning approach for the intelligent intrusion detection system. IEEE Access, 7, 41525–41550.
Muna, A. H., Moustafa, N., & Sitnikova, E. (2018). Identification of malicious activities in the industrial internet of things based on deep learning models. Journal of Information Security and Applications, 41, 1–11.
Abusitta, A., Bellaiche, M., Dagenais, M., & Halabi, T. (2019). A deep learning approach for the proactive multi-cloud cooperative intrusion detection system. Future Generation Computer Systems, 98, 308–318.
Kong, Y., Gao, J., Xu, Y., Pan, Y., Wang, J., & Liu, J. (2019). Classification of autism spectrum disorder by combining brain connectivity and deep neural network classifier. Neurocomputing, 324, 63–68.
Aloqaily, M., Otoum, S., & Al Ridhawi, I. (2019). & Jararweh, YAnintrusion detection system for connected vehicles in smart cities. Ad Hoc Networks, 90, 101842.
Elsaeidy, A., Munasinghe, K. S., Sharma, D., & Jamalipour, A. (2019). Intrusion detection in smart cities using Restricted Boltzmann Machines. Journal of Network and Computer Applications, 135, 76–83.
Song, H. M., Woo, J., & Kim, H. K. (2020). In-vehicle network intrusion detection using deep convolutional neural network. Vehicular Communications, 21, 100198.
Amanullah, M. A., Habeeb, R. A. A., Nasaruddin, F. H., Gani, A., Ahmed, E., Nainar, A. S. M., et al. (2020). Deep learning and big data technologies for IoT security. Computer Communications.
Choudhary, S., & Kesswani, N. (2020). Analysis of KDD-Cup’99, NSL-KDD and UNSW-NB15 Datasets using Deep Learning in IoT. Procedia Computer Science, 167, 1561–1573.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sahar, N., Mishra, R., Kalam, S. (2021). Deep Learning Approach-Based Network Intrusion Detection System for Fog-Assisted IoT. In: Tiwari, S., Suryani, E., Ng, A.K., Mishra, K.K., Singh, N. (eds) Proceedings of International Conference on Big Data, Machine Learning and their Applications. Lecture Notes in Networks and Systems, vol 150. Springer, Singapore. https://doi.org/10.1007/978-981-15-8377-3_4
Download citation
DOI: https://doi.org/10.1007/978-981-15-8377-3_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-8376-6
Online ISBN: 978-981-15-8377-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)