Skip to main content
Erschienen in: Automatic Control and Computer Sciences 2/2021

01.03.2021

Design of Anomaly-Based Intrusion Detection System Using Fog Computing for IoT Network

verfasst von: Prabhat Kumar, Govind P. Gupta, Rakesh Tripathi

Erschienen in: Automatic Control and Computer Sciences | Ausgabe 2/2021

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With increase in the demand for Internet of Things (IoT)-based services, the capability to detect anomalies such as malicious control, spying and other threats within IoT-based network has become a major issue. Traditional Intrusion Detection Systems (IDSs) cannot be used in typical IoT-based network due to various constraints in terms of battery life, memory capacity and computational capability. In order to address these issues, various IDSs have been proposed in literature. However, most of the IDSs face problem of high false alarm rate and low accuracy in anomaly detection process. In this paper, we have proposed a anomaly-based intrusion detection system by decentralizing the existing cloud based security architecture to local fog nodes. In order to evaluate the effectiveness of the proposed model various machine learning algorithms such as Random Forest, K-Nearest Neighbor and Decision Tree are used. Performance of our proposed model is tested using actual IoT-based dataset. The evaluation of the underlying approach outperforms in high detection accuracy and low false alarm rate using Random Forest algorithm.
Literatur
1.
Zurück zum Zitat Evans, D., The Internet of Things: How the Next Evolution of the Internet Is Changing Everything, Cisco White Paper, 2011. Evans, D., The Internet of Things: How the Next Evolution of the Internet Is Changing Everything, Cisco White Paper, 2011.
3.
Zurück zum Zitat Etherington, D. and Conger, K., Large DDoS attacks cause outages at Twitter, Spotify, and other sites, TechCrunch, 2016. Etherington, D. and Conger, K., Large DDoS attacks cause outages at Twitter, Spotify, and other sites, TechCrunch, 2016.
7.
Zurück zum Zitat Pahl, M.O. and Aubet, F.X., All eyes on you: Distributed multi-dimensional IoT microservice anomaly detection, 14th Int. Conf. Netw. Serv. Manag. CNSM 2018 Work. 1st Int. Work. High-Precision Networks Oper. Control. HiPNet 2018 1st Work. Segm. Routing Serv. Funct. Chain. SR+SFC 2, 2018, pp. 72–80. Pahl, M.O. and Aubet, F.X., All eyes on you: Distributed multi-dimensional IoT microservice anomaly detection, 14th Int. Conf. Netw. Serv. Manag. CNSM 2018 Work. 1st Int. Work. High-Precision Networks Oper. Control. HiPNet 2018 1st Work. Segm. Routing Serv. Funct. Chain. SR+SFC 2, 2018, pp. 72–80.
9.
Zurück zum Zitat Pajouh, H.H., Javidan, R., Khayami, R., Dehghantanha, A., and Choo, K.K.R., A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks, IEEE Trans. Emerg. Top. Comput., 2019, vol. 7, no. 2, pp. 314–323. https://doi.org/10.1109/TETC.2016.2633228CrossRef Pajouh, H.H., Javidan, R., Khayami, R., Dehghantanha, A., and Choo, K.K.R., A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks, IEEE Trans. Emerg. Top. Comput., 2019, vol. 7, no. 2, pp. 314–323. https://​doi.​org/​10.​1109/​TETC.​2016.​2633228CrossRef
17.
20.
Zurück zum Zitat Reddy, G.T., Kaluri, R., Reddy, P.K., Lakshmanna, K., Koppu, S., and Rajput, D.S., A novel approach for home surveillance system using IoT adaptive security, Proceedings of International Conference on Sustainable Computing in Science, Technology and Management (SUSCOM), Amity University Rajasthan, Jaipur - India, February 26–28, 2019, 2019, pp. 1616–1620. https://doi.org/10.2139/ssrn.3356525 Reddy, G.T., Kaluri, R., Reddy, P.K., Lakshmanna, K., Koppu, S., and Rajput, D.S., A novel approach for home surveillance system using IoT adaptive security, Proceedings of International Conference on Sustainable Computing in Science, Technology and Management (SUSCOM), Amity University Rajasthan, Jaipur - India, February 26–28, 2019, 2019, pp. 1616–1620. https://​doi.​org/​10.​2139/​ssrn.​3356525
21.
Zurück zum Zitat Talia, D., Trunfio, P., and Marozzo, F., Data Analysis in the Cloud: Models, Techniques and Applications, Elsevier, 2015. Talia, D., Trunfio, P., and Marozzo, F., Data Analysis in the Cloud: Models, Techniques and Applications, Elsevier, 2015.
23.
Zurück zum Zitat DS2OS traffic traces, Kaggle. https://www.kaggle.com/francoisxa/ds2ostraffictraces. Accessed September 25, 2019. DS2OS traffic traces, Kaggle. https://​www.​kaggle.​com/​francoisxa/​ds2ostraffictrac​es.​ Accessed September 25, 2019.
25.
Zurück zum Zitat Milosevic, J., Regazzoni, F., and Malek, M., Malware threats and solutions for trustworthy mobile systems design, Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment, Springer, 2017. Milosevic, J., Regazzoni, F., and Malek, M., Malware threats and solutions for trustworthy mobile systems design, Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment, Springer, 2017.
Metadaten
Titel
Design of Anomaly-Based Intrusion Detection System Using Fog Computing for IoT Network
verfasst von
Prabhat Kumar
Govind P. Gupta
Rakesh Tripathi
Publikationsdatum
01.03.2021
Verlag
Pleiades Publishing
Erschienen in
Automatic Control and Computer Sciences / Ausgabe 2/2021
Print ISSN: 0146-4116
Elektronische ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411621020085

Weitere Artikel der Ausgabe 2/2021

Automatic Control and Computer Sciences 2/2021 Zur Ausgabe