The essential role of intrusion detection is to manage the critical infrastructure to detect malicious activity competently concerning the Internet of Things (IoT). The IoT network is used to communicate and control information among various components composing a critical system. The essential inclination of infrastructure swerves to confront security issues and challenges as network systems are examined to expose cyber-related threats. Additionally, accessing real-time information from the cloud leads to a massive problem of latency. Fog computing is a novel archetype to encompass the cloud to the network edge with practical computation and critical infrastructure. The fog layer makes the device vulnerable to numerous attacks because of rapid access to resources. The practical way of addressing these issues is to detect intrusions effectively and trace the path leading to the attack source. The intent of this paper is to present a security mechanism and assure truthful operation of IoT networks with the intrusion detection system. A network intrusion detection system is proposed based on the conception of the Exact Greedy Boosting ensemble method for device implementation in the fog node because of protecting critical infrastructure from timely and accurate detection of malicious activities. The proposed model explores the traffic flow monitoring in novel IoT Intrusion Dataset 2020(IoTID20) network traffic by identifying and classifying the type of attack based on anomalies from normal behavior. Further, the paper estimates the complete experimentation performance and evaluations with competitive machine learning algorithms. The experimental observation of the simulation work is evident in the proposed model's efficiency and robustness in categorizing the attacks.
- Intrusion detection system (IDS)
- Internet of Things (IoT)
- Fog computing
- Critical infrastructure (CI)
- Exact Greedy Boosting (XGBoost)
- Ensemble learning
- Anomaly detection