Intrusion detection in Edge-of-Things computing

Abstract Edge-of-Things (EoT) is a new evolving computing model driven by the Internet of Things (IoT). It enables data processing, storage, and service to be shifted from the Cloud to nearby Edge devices/systems such as smartphones, routers, and base stations on the IoT paradigm. However, this architectural shift causes the security and privacy issues to migrate to the different layers of the Edge architecture. Therefore, detecting intrusion in such a distributed environment is difficult. In this scenario, an Intrusion Detection Systems is necessary. Here, we propose an approach to quickly and accurately detect intrusive activities in the EoT network, to realize the full potential of the IoT. Specifically, we propose a deep belief network (DBN) based on an advanced intrusion detection approach. We studied different detection models, by using different structures of DBNs, and compared them with existing detection techniques. Test results show that the proposed methodology performs essentially superior to the current state-of-the-art approaches.

[1]  Ling Gao,et al.  An Intrusion Detection Model Based on Deep Belief Networks , 2014 .

[2]  Ozgur Koray Sahingoz,et al.  Neural network based intrusion detection systems with different training functions , 2018, 2018 6th International Symposium on Digital Forensic and Security (ISDFS).

[3]  R Vinayakumar,et al.  Intrusion detection systems using classical machine learning techniques vs integrated unsupervised feature learning and deep neural network , 2019, Internet Technol. Lett..

[4]  Mansoor Alam,et al.  A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.

[5]  Yuefei Zhu,et al.  A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.

[6]  Chin-Teng Lin,et al.  Edge of Things: The Big Picture on the Integration of Edge, IoT and the Cloud in a Distributed Computing Environment , 2018, IEEE Access.

[7]  Gozde Karatas,et al.  Deep Learning in Intrusion Detection Systems , 2018, 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT).

[8]  MengChu Zhou,et al.  An Efficient Cooperative Medium Access Control Protocol for Wireless IoT networks in Smart World System , 2019, J. Netw. Comput. Appl..

[9]  Chase Qishi Wu,et al.  An Effective Deep Learning Based Scheme for Network Intrusion Detection , 2018, 2018 24th International Conference on Pattern Recognition (ICPR).

[10]  Kangfeng Zheng,et al.  Improving the Classification Effectiveness of Intrusion Detection by Using Improved Conditional Variational AutoEncoder and Deep Neural Network , 2019, Sensors.

[11]  Tarek M. Taha,et al.  Intrusion Detection Using Deep Belief Network and Extreme Learning Machine , 2015, Int. J. Monit. Surveillance Technol. Res..

[12]  Hannu Tenhunen,et al.  An Intrusion Detection System for Fog Computing and IoT based Logistic Systems using a Smart Data Approach , 2016 .

[13]  Christian Diedrich,et al.  Accelerated deep neural networks for enhanced Intrusion Detection System , 2016, 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA).

[14]  Dong Hyun Jeong,et al.  A survey of cloud-based network intrusion detection analysis , 2016, Human-centric Computing and Information Sciences.

[15]  Awais Ahmad,et al.  Real time intrusion detection system for ultra-high-speed big data environments , 2016, The Journal of Supercomputing.

[16]  Yu Wang,et al.  Adaptive machine learning‐based alarm reduction via edge computing for distributed intrusion detection systems , 2019, Concurr. Comput. Pract. Exp..

[17]  Ainuddin Wahid Abdul Wahab,et al.  A Lightweight Perceptron-Based Intrusion Detection System for Fog Computing , 2019, Applied Sciences.

[18]  Rodrigo Roman,et al.  Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..

[19]  Ahmad S. Al-Mogren,et al.  Simple and Effective Secure Group Communications in Dynamic Wireless Sensor Networks , 2019, Sensors.

[20]  Abbas Ghaemi Bafghi,et al.  A Systematic Mapping Study on Intrusion Alert Analysis in Intrusion Detection Systems , 2018, ACM Comput. Surv..

[21]  Giancarlo Fortino,et al.  Autonomic computation offloading in mobile edge for IoT applications , 2019, Future Gener. Comput. Syst..

[22]  Giancarlo Fortino,et al.  Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs , 2019, Inf. Sci..

[23]  Roberto Di Pietro,et al.  Intrusion Detection at the Network Edge: Solutions, Limitations, and Future Directions , 2019, EDGE.

[24]  Xinyu Yang,et al.  A Survey on the Edge Computing for the Internet of Things , 2018, IEEE Access.

[25]  Ahmad Almogren,et al.  Workload aware VM consolidation method in edge/cloud computing for IoT applications , 2019, J. Parallel Distributed Comput..

[26]  Ahmad Almogren,et al.  An automated and intelligent Parkinson disease monitoring system using wearable computing and cloud technology , 2018, Cluster Computing.