Skip to main content
Erschienen in: Mobile Networks and Applications 1/2022

20.01.2022

Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration

verfasst von: Ruizhong Du, Yun Li, Xiaoyan Liang, Junfeng Tian

Erschienen in: Mobile Networks and Applications | Ausgabe 1/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Fog computing is a new computing paradigm in the era of the Internet of Things. Aiming at the problem that fog nodes are closer to user equipment, with heterogeneous nodes, limited storage capacity resources, and greater vulnerability to intrusion, a lightweight support vector machine intrusion detection model based on Cloud-Fog Collaboration(CFC-SVM) is proposed. Due to the high dimensionality of network data, first, Principal Component Analysis (PCA) is used to reduce the dimensionality of the data, eliminate the correlation between attributes and reduce the training time. Then, in the cloud server, a support vector machine (SVM) optimized by the particle swarm algorithm is used to complete the training of the dataset, obtain the optimal SVM intrusion-detection classifier, send it to the fog node, and carry out attack detection at the fog node. Experiments with the classic KDD CUP 99 dataset show that the model in this paper is better than other similar algorithms in regard to detection time, detection rate and accuracy, which can effectively solve the problem of intrusion detection in the fog environment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Shi W, Cao J, Zhang Q, Li Y, Xu L (2016) Edge computing: Vision and challenges. IEEE Internet Things J 3(5):637–646CrossRef Shi W, Cao J, Zhang Q, Li Y, Xu L (2016) Edge computing: Vision and challenges. IEEE Internet Things J 3(5):637–646CrossRef
2.
Zurück zum Zitat Liu C, Xiang F, Wang P, Sun Z (2019) A review of issues and challenges in fog computing environment. DASC/PiCom/DataCom/CyberSciTech 232–237 Liu C, Xiang F, Wang P, Sun Z (2019) A review of issues and challenges in fog computing environment. DASC/PiCom/DataCom/CyberSciTech 232–237
3.
Zurück zum Zitat Puliafito C, Mingozzi E, Longo F, Puliafito A, Rana O (2019) Fog computing for the Internet of Things: A Survey. ACM Trans Internet Techn 19(2):18:1–18:41CrossRef Puliafito C, Mingozzi E, Longo F, Puliafito A, Rana O (2019) Fog computing for the Internet of Things: A Survey. ACM Trans Internet Techn 19(2):18:1–18:41CrossRef
4.
Zurück zum Zitat Oma R, Nakamura S, Duolikun D, Enokido T, Takizawa M (2018) An energy-efficient model for fog computing in the Internet of Things (IoT). Internet Things 1-2:14–26CrossRef Oma R, Nakamura S, Duolikun D, Enokido T, Takizawa M (2018) An energy-efficient model for fog computing in the Internet of Things (IoT). Internet Things 1-2:14–26CrossRef
5.
Zurück zum Zitat Puthal D, Mohanty SP, Bhavake SA, Morgan G, Ranjan R (2019) Fog computing security challenges and future directions [Energy and Securi-ty]. IEEE Consum Electron Mag 8(3):92–96CrossRef Puthal D, Mohanty SP, Bhavake SA, Morgan G, Ranjan R (2019) Fog computing security challenges and future directions [Energy and Securi-ty]. IEEE Consum Electron Mag 8(3):92–96CrossRef
6.
Zurück zum Zitat Hassan N, Salman O, Chehab A, Couturier R (2019) Preserving data security in distributed fog computing. Ad Hoc Netw, 94 Hassan N, Salman O, Chehab A, Couturier R (2019) Preserving data security in distributed fog computing. Ad Hoc Netw, 94
7.
Zurück zum Zitat Elazhary H (2019) Internet of Things (IoT), mobile cloud, cloudlet, mobile IoT, IoT cloud, fog, mobile edge, and edge emerging computing paradigms: Disambiguation and research directions. J Netw Comput Appl 128:105–140CrossRef Elazhary H (2019) Internet of Things (IoT), mobile cloud, cloudlet, mobile IoT, IoT cloud, fog, mobile edge, and edge emerging computing paradigms: Disambiguation and research directions. J Netw Comput Appl 128:105–140CrossRef
8.
Zurück zum Zitat Parikh S, Dave D, Patel R, Doshi N (2019) Security and privacy issues in cloud, fog and edge computing. EUSPN/ICTH 734–739 Parikh S, Dave D, Patel R, Doshi N (2019) Security and privacy issues in cloud, fog and edge computing. EUSPN/ICTH 734–739
9.
Zurück zum Zitat Khan S, Parkinson S, Qin Y (2017) Fog computing security: a review of current applications and security solutions. J Cloud Comput 6:19CrossRef Khan S, Parkinson S, Qin Y (2017) Fog computing security: a review of current applications and security solutions. J Cloud Comput 6:19CrossRef
10.
Zurück zum Zitat D’Souza C, Ahn G-J, Taguinod M (2014) Policy-driven security manage-ment for fog computing: Preliminary framework and a case study. IRI 16–23 D’Souza C, Ahn G-J, Taguinod M (2014) Policy-driven security manage-ment for fog computing: Preliminary framework and a case study. IRI 16–23
11.
Zurück zum Zitat Ficco M (2019) Internet-of-Things and fog-computing as enablers of new security and privacy threats. Internet of Things 8 Ficco M (2019) Internet-of-Things and fog-computing as enablers of new security and privacy threats. Internet of Things 8
12.
Zurück zum Zitat Razouk W, Sgandurra D, Sakurai K (2017) A new security middleware archi-tecture based on fog computing and cloud to support IoT constrained devices. IML 35:1–35:8 Razouk W, Sgandurra D, Sakurai K (2017) A new security middleware archi-tecture based on fog computing and cloud to support IoT constrained devices. IML 35:1–35:8
13.
Zurück zum Zitat Hosseinpour F, Amoli PV, Plosila J et al (2016) An intrusion detection system for fog computing and iot based logistic systems using a smart data approach. Int J Digit Content Technol Appl 10(5) Hosseinpour F, Amoli PV, Plosila J et al (2016) An intrusion detection system for fog computing and iot based logistic systems using a smart data approach. Int J Digit Content Technol Appl 10(5)
14.
Zurück zum Zitat Peng K, Leung VCM, Zheng L, Wang S, Huang C, Lin T (2018) Intrusion detection system based on decision tree over big data in fog envi-ronment. Wirel Commun Mob Comput 2018 Peng K, Leung VCM, Zheng L, Wang S, Huang C, Lin T (2018) Intrusion detection system based on decision tree over big data in fog envi-ronment. Wirel Commun Mob Comput 2018
15.
Zurück zum Zitat Zhou L, Guo H, Deng G (2019) A fog computing based approach to DDoS mitigation in IIoT systems. Comput Secur 85:51–62CrossRef Zhou L, Guo H, Deng G (2019) A fog computing based approach to DDoS mitigation in IIoT systems. Comput Secur 85:51–62CrossRef
16.
Zurück zum Zitat An X, Zhou X, Lü X, Lin F, Yang L (2018) Sample selected ex-treme learning machine based intrusion detection in fog computing and MEC. Wirel Commun Mob Comput 2018 An X, Zhou X, Lü X, Lin F, Yang L (2018) Sample selected ex-treme learning machine based intrusion detection in fog computing and MEC. Wirel Commun Mob Comput 2018
17.
Zurück zum Zitat Prabavathy S, Sundarakantham K, Shalinie SM (2018) Design of cognitive fog compu-ting for intrusion detection in Internet of Things. J Commun Netw 20(3):291–298CrossRef Prabavathy S, Sundarakantham K, Shalinie SM (2018) Design of cognitive fog compu-ting for intrusion detection in Internet of Things. J Commun Netw 20(3):291–298CrossRef
18.
Zurück zum Zitat Liu Y, Bi J-W, Fan Z-P (2017) A method for multi-class sentiment classification based on an improved one-vs-one (OVO) strategy and the support vector machine (SVM) algorithm. Inf Sci 394:38–52CrossRef Liu Y, Bi J-W, Fan Z-P (2017) A method for multi-class sentiment classification based on an improved one-vs-one (OVO) strategy and the support vector machine (SVM) algorithm. Inf Sci 394:38–52CrossRef
19.
Zurück zum Zitat Cui J, Shi G, Gong C (2017) A fast classification method of faults in power electronic circuits based on support vector machines. Nephron Clin Pract 24(4):701–720 Cui J, Shi G, Gong C (2017) A fast classification method of faults in power electronic circuits based on support vector machines. Nephron Clin Pract 24(4):701–720
20.
Zurück zum Zitat Li L (2020) Analysis and data mining of intellectual property using GRNN and SVM. Pers Ubiquit Comput 24(1):139–150CrossRef Li L (2020) Analysis and data mining of intellectual property using GRNN and SVM. Pers Ubiquit Comput 24(1):139–150CrossRef
21.
Zurück zum Zitat Gu J, Wang L, Wang H, Wang S (2019) A novel approach to intrusion detection using SVM ensemble with feature augmentation. Comput Secur 86:53–62CrossRef Gu J, Wang L, Wang H, Wang S (2019) A novel approach to intrusion detection using SVM ensemble with feature augmentation. Comput Secur 86:53–62CrossRef
Metadaten
Titel
Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration
verfasst von
Ruizhong Du
Yun Li
Xiaoyan Liang
Junfeng Tian
Publikationsdatum
20.01.2022
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 1/2022
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-021-01838-x

Weitere Artikel der Ausgabe 1/2022

Mobile Networks and Applications 1/2022 Zur Ausgabe