Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing

The increase in the number and diversity of smart objects has raised substantial cybersecurity challenges due to the recent exponential rise in the occurrence and sophistication of attacks. Although cloud computing has transformed the world of business in a dramatic way, its centralization hammers the application of distributed services such as security mechanisms for IoT applications. The new and emerging IoT applications require novel cybersecurity controls, models, and decisions distributed at the edge of the network. Despite the success of the existing cryptographic solutions in the traditional Internet, factors such as system development flaws, increased attack surfaces, and hacking skills have proven the inevitability of detection mechanisms. The traditional approaches such as classical machine-learning-based attack detection mechanisms have been successful in the last decades, but it has already been proven that they have low accuracy and less scalability for cyber-attack detection in massively distributed nodes such as IoT. The proliferation of deep learning and hardware technology advancement could pave a way to detecting the current level of sophistication of cyber-attacks in edge networks. The application of deep networks has already been successful in big data areas, and this indicates that fog-tothings computing can be the ultimate beneficiary of the approach for attack detection because a massive amount of data produced by IoT devices enable deep models to learn better than shallow algorithms. In this article, we propose a novel distributed deep learning scheme of cyber-attack detection in fog-to-things computing. Our experiments show that deep models are superior to shallow models in detection accuracy, false alarm rate, and scalability.

[1]  Naveen K. Chilamkurti,et al.  Lightweight Cybersecurity Schemes Using Elliptic Curve Cryptography in Publish-Subscribe fog Computing , 2017, Mobile Networks and Applications.

[2]  Ivan Stojmenovic,et al.  An overview of Fog computing and its security issues , 2016, Concurr. Comput. Pract. Exp..

[3]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[4]  Vrizlynn L. L. Thing,et al.  IEEE 802.11 Network Anomaly Detection and Attack Classification: A Deep Learning Approach , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).

[5]  Weizhong Yan,et al.  On Accurate and Reliable Anomaly Detection for Gas Turbine Combustors: A Deep Learning Approach , 2015, Annual Conference of the PHM Society.

[6]  Mounir Ghogho,et al.  Deep learning approach for Network Intrusion Detection in Software Defined Networking , 2016, 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM).

[7]  Je-Won Kang,et al.  A Novel Intrusion Detection Method Using Deep Neural Network for In-Vehicle Network Security , 2016, 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring).

[8]  Mansoor Alam,et al.  A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.

[9]  L. Javier García-Villalba,et al.  A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things , 2016, Sensors.

[10]  Takehisa Yairi,et al.  Anomaly Detection Using Autoencoders with Nonlinear Dimensionality Reduction , 2014, MLSDA'14.

[11]  Yuancheng Li,et al.  A Hybrid Malicious Code Detection Method based on Deep Learning , 2015 .