FBAD: Fog-based Attack Detection for IoT Healthcare in Smart Cities

The number of zero-day attacks has been exponentially increasing due to a variety of heterogeneous Internet of Things (IoT) protocols. Many centralized-based techniques have been introduced to identify malicious activities in IoT environments. However, these techniques have suffered including a high latency to satisfy IoT requirements. This paper proposes a fog-based attack detection (FBAD) framework using an ensemble of online sequential extreme learning machine (EOS-ELM) for efficiently detecting malicious activities. We indicate a high-level view of the efficient proposed framework for deploying the distributed attack detection technique in fog computing due to high accuracy and low latency, as it is closer to the IoT devices at the network edge. Furthermore, we compare the performance of our framework with other existing approaches including ELM and OS-ELM. The results of the experiment demonstrate that distributed architecture outperforms centralized architecture in terms of the detection time and classification accuracy.

[1]  Xavier Masip-Bruin,et al.  Do we all really know what a fog node is? Current trends towards an open definition , 2017, Comput. Commun..

[2]  Yuan Lan,et al.  Ensemble of online sequential extreme learning machine , 2009, Neurocomputing.

[3]  Weihua Sheng,et al.  Delivering home healthcare through a Cloud-based Smart Home Environment (CoSHE) , 2018, Future Gener. Comput. Syst..

[4]  Liang Xiao,et al.  IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security? , 2018, IEEE Signal Processing Magazine.

[5]  Wenjia Li,et al.  Policy-Based Secure and Trustworthy Sensing for Internet of Things in Smart Cities , 2018, IEEE Internet of Things Journal.

[6]  Naveen K. Chilamkurti,et al.  Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..

[7]  Ali Dehghantanha,et al.  A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks , 2019, IEEE Transactions on Emerging Topics in Computing.

[8]  Sean Carlisto de Alvarenga,et al.  A survey of intrusion detection in Internet of Things , 2017, J. Netw. Comput. Appl..

[9]  Albert Y. Zomaya,et al.  A Dimension Reduction Model and Classifier for Anomaly-Based Intrusion Detection in Internet of Things , 2017, 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).

[10]  Mingzhe Jiang,et al.  Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach , 2018, Future Gener. Comput. Syst..

[11]  Sandeep K. Sood,et al.  Fog Assisted-IoT Enabled Patient Health Monitoring in Smart Homes , 2018, IEEE Internet of Things Journal.

[12]  Elisa Bertino,et al.  Botnets and Internet of Things Security , 2017, Computer.

[13]  David Hutchison,et al.  The Extended Cloud: Review and Analysis of Mobile Edge Computing and Fog From a Security and Resilience Perspective , 2017, IEEE Journal on Selected Areas in Communications.

[14]  Narasimhan Sundararajan,et al.  A Fast and Accurate Online Sequential Learning Algorithm for Feedforward Networks , 2006, IEEE Transactions on Neural Networks.

[15]  Xuemin Shen,et al.  Securing Fog Computing for Internet of Things Applications: Challenges and Solutions , 2018, IEEE Communications Surveys & Tutorials.

[16]  Thomas G. Dietterich Multiple Classifier Systems , 2000, Lecture Notes in Computer Science.

[17]  Peng Liu,et al.  The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved , 2018, IEEE Internet of Things Journal.

[18]  Jiankun Hu,et al.  A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems , 2018, IEEE Access.

[19]  Ioannis D. Moscholios,et al.  A Signature-based Intrusion Detection System for the Internet of Things , 2018 .

[20]  Chee Kheong Siew,et al.  Extreme learning machine: Theory and applications , 2006, Neurocomputing.

[21]  S. Mercy Shalinie,et al.  Design of cognitive fog computing for intrusion detection in Internet of Things , 2018, Journal of Communications and Networks.

[22]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[23]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[24]  Min-Woo Park,et al.  Multi-level Intrusion Detection System and log management in Cloud Computing , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).

[25]  Roberto Di Pietro,et al.  Smart health: A context-aware health paradigm within smart cities , 2014, IEEE Communications Magazine.

[26]  Ali Alqazzaz,et al.  AD-IoT: Anomaly Detection of IoT Cyberattacks in Smart City Using Machine Learning , 2019, 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC).

[27]  Shadi Aljawarneh,et al.  Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model , 2017, J. Comput. Sci..

[28]  Joel J. P. C. Rodrigues,et al.  Enabling Technologies for the Internet of Health Things , 2018, IEEE Access.

[29]  N. Arunkumar,et al.  Enabling technologies for fog computing in healthcare IoT systems , 2019, Future Gener. Comput. Syst..

[30]  S. P. Shantharajah,et al.  A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification Algorithms , 2015 .