Exact greedy algorithm based split finding approach for intrusion detection in fog-enabled IoT environment

Dukka Karun Kumar Reddy, H.S. Behera, Janmenjoy Nayak, Bighnaraj Naik, Uttam Ghosh, Pradip Kumar Sharma*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

17 Citations (Scopus)

Abstract

The essential role of intrusion detection is to manage the critical infrastructure to detect malicious activity competently concerning the Internet of Things (IoT). The IoT network is used to communicate and control information among various components composing a critical system. The essential inclination of infrastructure swerves to confront security issues and challenges as network systems are examined to expose cyber-related threats. Additionally, accessing real-time information from the cloud leads to a massive problem of latency. Fog computing is a novel archetype to encompass the cloud to the network edge with practical computation and critical infrastructure. The fog layer makes the device vulnerable to numerous attacks because of rapid access to resources. The practical way of addressing these issues is to detect intrusions effectively and trace the path leading to the attack source. The intent of this paper is to present a security mechanism and assure truthful operation of IoT networks with the intrusion detection system. A network intrusion detection system is proposed based on the conception of the Exact Greedy Boosting ensemble method for device implementation in the fog node because of protecting critical infrastructure from timely and accurate detection of malicious activities. The proposed model explores the traffic flow monitoring in novel IoT Intrusion Dataset 2020(IoTID20) network traffic by identifying and classifying the type of attack based on anomalies from normal behavior. Further, the paper estimates the complete experimentation performance and evaluations with competitive machine learning algorithms. The experimental observation of the simulation work is evident in the proposed model's efficiency and robustness in categorizing the attacks.
Original languageEnglish
Article number102866
Number of pages35
JournalJournal of Information Security and Applications
Volume60
Early online date3 Jun 2021
DOIs
Publication statusPublished - 1 Aug 2021

Keywords

  • Intrusion detection system (IDS)
  • Internet of Things (IoT)
  • Fog computing
  • Critical infrastructure (CI)
  • Exact Greedy Boosting (XGBoost)
  • Ensemble learning
  • Anomaly detection

Fingerprint

Dive into the research topics of 'Exact greedy algorithm based split finding approach for intrusion detection in fog-enabled IoT environment'. Together they form a unique fingerprint.

Cite this