IJCNIS Vol. 16, No. 2, 8 Apr. 2024
Cover page and Table of Contents: PDF (size: 1454KB)
PDF (1454KB), PP.79-91
Views: 0 Downloads: 0
Fog Computing, Intrusion Detection System, Effective Seeker Optimization Algorithm, Improved Whale Optimization, Hybrid Extreme Learning Machine
In fog computing, computing resources are deployed at the network edge, which can include routers, switches, gateways, and even end-user devices. Fog computing focuses on running computations and storing data directly on or near the fog devices themselves. The data processing occurs locally on the device, reducing the reliance on network connectivity and allowing for faster response times. However, the conventional intrusion detection system (IDS) failed to provide security during the data transfer between fog nodes to cloud, fog data centres. So, this work implemented the optimized IDS in fog computing environment (OIDS-FCE) using advanced naturally inspired optimization algorithms with extreme learning. Initially, the data preprocessing operation maintains the uniform characteristics in the dataset by normalizing the columns. Then, comprehensive learning particle swarm based effective seeker optimization (CLPS-ESO) algorithm extracts the intrusion specific features by analyzing the internal patterns of all rows, columns. In addition, automatic termination-based whale optimization algorithm (ATWOA) selects the best intrusion features from CLPS-ESO resultant features using correlation analysis. Finally, the hybrid extreme learning machine (HELM) classifies the varies instruction types from ATWOA optimal features. The simulation results show that the proposed OIDS-FCE achieved 98.52% accuracy, 96.38% precision, 95.50% of recall, and 95.90% of F1-score using UNSW-NB dataset, which are higher than other artificial intelligence IDS models.
Dipti Prava Sahu, Biswajit Tripathy, Leena Samantaray, "Optimized Intrusion Detection System in Fog Computing Environment Using Automatic Termination-based Whale Optimization with ELM", International Journal of Computer Network and Information Security(IJCNIS), Vol.16, No.2, pp.79-91, 2024. DOI:10.5815/ijcnis.2024.02.07
[1]Yi, L., Yin, M., and Darbandi, M., “A deep and systematic review of the intrusion detection systems in the fog environment,” Transactions on Emerging Telecommunications Technologies, vol. 34(1), September 2022.
[2]Hazra, A., Rana, P., Adhikari, M., and Amgoth, T, “Fog computing for next-generation internet of things: fundamental, state-of-the-art and research challenges,” Computer Science Review, vol. 48, May 2023.
[3]Das, R., and Inuwa, M. M, “A review on fog computing: issues, characteristics, challenges, and potential applications,” Telematics and Informatics Reports, vol. 10, June 2023.
[4]Aqib, M., Kumar, D., and Tripathi, S., “Machine Learning for Fog Computing: Review, Opportunities and a Fog Application Classifier and Scheduler,” Wireless Personal Communications, vol. 129(2), pp. 853-880, December 2022.
[5]Chakraborty, A., Kumar, M., and Chaurasia, N, “Secure framework for IoT applications using Deep Learning in fog Computing,” Journal of Information Security and Applications, vol. 77, Sept. 2023.
[6]Azizpour, S., and Majma, M., “Nada: new architecture for detecting dos and ddos attacks in fog computing,” Journal of Computer Virology and Hacking Techniques, vol. 19(1), pp. 51-64, March 2023.
[7]Yao, W., Shi, H., and Zhao, H., “Scalable anomaly-based intrusion detection for secure Internet of Things using generative adversarial networks in fog environment,” Journal of Network and Computer Applications, vol. 214, May 2023.
[8]Hussein, W. N., Hussain, H. N., Hussain, H. N., and Mallah, A. Q., “A deployment model for IoT devices based on fog computing for data management and analysis,” Wireless Personal Communications, pp. 1-13, Feb 2023.
[9]Syed, N. F., Ge, M., and Baig, Z., “Fog-cloud based intrusion detection system using Recurrent Neural Networks and feature selection for IoT networks,” Computer Networks, vol. 225, April 2023.
[10]Bukhari, O., Agarwal, P., Koundal, D., and Zafar, S., “Anomaly detection using ensemble techniques for boosting the security of intrusion detection system,” Procedia Computer Science, vol. 218, pp. 1003-1013, Jan 2023.
[11]Aliyu, F., Sheltami, T., Deriche, M., and Nasser, N., “Human immune-based intrusion detection and prevention system for fog computing,” Journal of Network and Systems Management, vol. 30, pp. 1-27, October 2021.
[12]Chen, Y., Lin, Q., Wei, W., Ji, J., Wong, K. C., and Coello, C. A. C., “Intrusion detection using multi-objective evolutionary convolutional neural network for Internet of Things in Fog computing,” Knowledge-Based Systems, vol. 244, May 2022.
[13]Labiod, Y., Korba, A. A., and Ghoualmi, N., “Fog computing-based intrusion detection architecture to protect IoT networks,” Wireless Personal Communications, vol. 125(1), pp. 231-259, Feb 2022.
[14]Telikani, A., Adhikari, M., Pourzandi, M., and Zohrevand, A., “Industrial IoT intrusion detection via evolutionary cost-sensitive learning and fog computing,” IEEE Internet of Things Journal, vol. 9(22), pp. 23260-23271, Nov 2022.
[15]De Souza, C. A., Westphall, C. B., and Machado, R. B., “Two-step ensemble approach for intrusion detection and identification in IoT and fog computing environments,” Computers & Electrical Engineering, vol. 98, March 2022.
[16]Ramkumar, M. P., Ramprakash, T., Subramaniam, S., and Natarajan, P., “Intrusion detection using optimized ensemble classification in fog computing paradigm,” Knowledge-Based Systems, vol. 252, September 2022.
[17]Chang, V., Li, J., Li, Y., Yan, X., Zhang, J., and Sun, Q., “A survey on intrusion detection systems for fog and cloud computing”. Future Internet, vol. 14(3), March 2022.
[18]Lussi, E. W., Silva, J. L., Sanz, J. L., and Souza, F. B., “A lightweight fog-based internal intrusion detection system for smart environments,” International Journal of Intelligent Internet of Things Computing, vol. 1(4), pp. 287-299, Feb 2023.
[19]Zhao, G., Wang, Y., and Wang, J., “Lightweight Intrusion Detection Model of the Internet of Things with Hybrid Cloud-Fog Computing,” Security and Communication Networks, vol. 2023, pp. 1-11, Jan 2023.
[20]Alzahrani, R. J., and Alzahrani, A., “A novel multi-algorithm approach to identify network anomalies in the IoT using Fog computing and a model to distinguish between IoT and Non-IoT devices,” Journal of Sensor and Actuator Networks, vol. 12(2), February 2023.
[21]Sadaf, K., and Sultana, J., “Intrusion Detection Based on Autoencoder and Isolation Forest in Fog Computing”. IEEE Access, vol. 8, pp. 167059-167068, Sept 2020.
[22]Du, R., Li, Y., Liang, X., and Tian, J., “Support vector machine intrusion detection scheme based on cloud-fog collaboration,” Mobile Networks and Applications, vol. 27(1), pp. 431-440, January 2022.
[23]Peng, K., Leung, V., Zheng, L., Wang, S., Huang, C., and Lin, T., “Intrusion detection system based on decision tree over big data in fog environment”, Wireless Communications and Mobile Computing, vol. 2018, Mar 2018.
[24]De Souza, C. A., Westphall, C. B., Machado, R. B., Sobral, J. B. M., and dos Santos Vieira, G., “Hybrid approach to intrusion detection in fog based IoT environments,” Computer Networks, vol. 180, Oct 2020.
[25]Alzubi, O. A., Alzubi, J. A., Alazab, M., Alrabea, A., Awajan, A., and Qiqieh, I., “Optimized machine learning-based intrusion detection system for fog and edge computing environment,” Electronics, vol. 11(19), Sept. 2022.