Attack Detection and Mitigation in IoT-Fog Architecture: Handling Class Imbalance Problem

Authors

  • Navnath B. Pokale School of Engineering and Technology,D Y Patil Univeristy, Ambi, Pune- 410506, Maharashtra, India
  • Pooja Sharma School of Engineering and Technology,D Y Patil Univeristy, Ambi, Pune- 410506, Maharashtra, India
  • Deepak T. Mane ishwakarma Institute of Technology, Pune-411037, Maharashtra, India

Keywords:

Attack Detection, IoT-Fog Architecture, Bi-GRU, LSTM, Mitigation

Abstract

The occurrence of data breaches and cyberattacks has greatly increased across numerous companies, organizations, & industries as a result of the exploitation of security holes in IoT devices. There are more zero-day threats presently since more IoT devices are being linked and employ the various protocols. In the realms of big data and cyber-security, DL (deep learning) has shown to be the most effective technique. because it can extract and learn deep features from known assaults and identify novel attacks. Adopting the DL based assaults identification is the greatest crisis in IoT -Fog architecture since it endures with poor or low degree of data privacy. Thereby, this paper focuses on both attack detection and mitigation of attacker in network. The process starts with the class imbalance problem solving via advanced class imbalanced processing. Subsequently, as the extraction of handcrafted features give addition information related to attack behavior, this paper intends to extract the features like correlation-based features, raw data, improved entropy-based features, as well as statistical features. Attack detection will take place based on the retrieved features trained with the DL combo architecture; a novel hybrid detection model combining Bi-GRU and LSTM, detecting the presence of attack in network. However, it is important to mitigate the attacker existing in the network, and hence a new entropy based mitigation procedure is followed in this article. Finally, the results and discussion section shows the efficiency of proposed work over the conventional methods in terms of different performance analysis.

Downloads

Download data is not yet available.

References

Manimurugan, S. IoT-Fog-Cloud model for anomaly detection using improved Naïve Bayes and principal component analysis. J Ambient Intell Human Comput (2021). https://doi.org/10.1007/s12652-020-02723-3

A. Samy, H. Yu and H. Zhang, "Fog-Based Attack Detection Framework for Internet of Things Using Deep Learning," IEEE Access, vol. 8, pp. 74571-74585, 2020, doi: 10.1109/ACCESS.2020.2988854.

P. Sanju, "Enhancing intrusion detection in IoT systems: A hybrid metaheuristics-deep learning approach with ensemble of recurrent neural networks" Journal of Engineering ResearchAvailable online 19 June 2023In press, corrected proofArticle 100122

MirdulaSRoopa M, "MUD enabled deep learning framework for anomaly detection in IoT integrated smart building," e-Prime - Advances in Electrical Engineering, Electronics and Energy10 June 2023Volume 5 (Cover date: September 2023)Article 100186.

K. L. K. Sudheera, D. M. Divakaran, R. P. Singh and M. Gurusamy, "ADEPT: Detection and Identification of Correlated Attack Stages in IoT Networks," IEEE Internet of Things Journal, vol. 8, no. 8, pp. 6591-6607, 15 April15, 2021, doi: 10.1109/JIOT.2021.3055937.

Rania A. ElsayedReem A. HamadaShaimaa Ahmed Elsaid, "Securing IoT and SDN systems using deep-learning based automatic intrusion detection" Ain Shams Engineering Journal3 March 2023Volume 14, Issue 10 (Cover date: October 2023)Article 102211.

BhukyaMadhuM. Venu Gopala ChariVeerenderAerranagula, "Intrusion detection models for IOT networks via deep learning approaches", Measurement: Sensors12 December 2022Volume 25 (Cover date: February 2023)Article 100641.

Kumar, P., Gupta, G.P. & Tripathi, R. Toward Design of an Intelligent Cyber Attack Detection System using Hybrid Feature Reduced Approach for IoT Networks. Arab J Sci Eng 46, 3749–3778 (2021). https://doi.org/10.1007/s13369-020-05181-3

H. Al-Hamadi, I. -R. Chen, D. -C. Wang and M. Almashan, "Attack and Defense Strategies for Intrusion Detection in Autonomous Distributed IoT Systems," IEEE Access, vol. 8, pp. 168994-169009, 2020, doi: 10.1109/ACCESS.2020.3023616.

L. Liu, X. Xu, Y. Liu, Z. Ma and J. Peng, "A Detection Framework Against CPMA Attack Based on Trust Evaluation and Machine Learning in IoT Network," IEEE Internet of Things Journal, vol. 8, no. 20, pp. 15249-15258, 15 Oct.15, 2021, doi: 10.1109/JIOT.2020.3047642.

I. Ullah and Q. H. Mahmoud, "Design and Development of a Deep Learning-Based Model for Anomaly Detection in IoT Networks," IEEE Access, vol. 9, pp. 103906-103926, 2021, doi: 10.1109/ACCESS.2021.3094024.

L. Vu, Q. U. Nguyen, D. N. Nguyen, D. T. Hoang and E. Dutkiewicz, "Deep Transfer Learning for IoT Attack Detection," IEEE Access, vol. 8, pp. 107335-107344, 2020, doi: 10.1109/ACCESS.2020.3000476.

M. Hossain and J. Xie, "Third Eye: Context-Aware Detection for Hidden Terminal Emulation Attacks in Cognitive Radio-Enabled IoT Networks," IEEE Transactions on Cognitive Communications and Networking, vol. 6, no. 1, pp. 214-228, March 2020, doi: 10.1109/TCCN.2020.2968324.

D. -C. Wang, I. -R. Chen and H. Al-Hamadi, "Reliability of Autonomous Internet of Things Systems With Intrusion Detection Attack-Defense Game Design," IEEE Transactions on Reliability, vol. 70, no. 1, pp. 188-199, March 2021, doi: 10.1109/TR.2020.2983610.

A. Y. Khan, R. Latif, S. Latif, S. Tahir, G. Batool and T. Saba, "Malicious Insider Attack Detection in IoTs Using Data Analytics," IEEE Access, vol. 8, pp. 11743-11753, 2020, doi: 10.1109/ACCESS.2019.2959047.

Kumar, P., Gupta, G.P. & Tripathi, R. A distributed ensemble design based intrusion detection system using fog computing to protect the internet of things networks. J Ambient Intell Human Comput 12, 9555–9572 (2021). https://doi.org/10.1007/s12652-020-02696-3

Babu, M.R., K.N.Veena Implementing optimized classifier for distributed attack detection and BAIT-based attack correction in IoT. Int J Syst Assur Eng Manag (2021). https://doi.org/10.1007/s13198-021-01115-w

Krishna, E.S.P., Thangavelu, A. Attack detection in IoT devices using hybrid metaheuristic lion optimization algorithm and firefly optimization algorithm. Int J Syst Assur Eng Manag (2021). https://doi.org/10.1007/s13198-021-01150-7

Fotohi, R., Pakdel, H. A Lightweight and Scalable Physical Layer Attack Detection Mechanism for the Internet of Things (IoT) Using Hybrid Security Schema. Wireless PersCommun 119, 3089–3106 (2021). https://doi.org/10.1007/s11277-021-08388-1

Duraisamy, A., Subramaniam, M. Attack Detection on IoT Based Smart Cities using IDS Based MANFIS Classifier and Secure Data Transmission Using IRSA Encryption. Wireless PersCommun 119, 1913–1934 (2021). https://doi.org/10.1007/s11277-021-08362-x

https://cloudstor.aarnet.edu.au/plus/index.php/s/2DhnLGDdEECo4ys?path=%2FUNSW-NB15%20-%20CSV%20Files

https://www.unb.ca/cic/datasets/index.html

https://www.kaggle.com/datasets/solarmainframe/ids-intrusion-csv.

Ahmed, S.; Khan, Z.A.; Mohsin, S.M.; Latif, S.; Aslam, S.; Mujlid, H.; Adil, M.; Najam, Z. Effective and Efficient DDoS Attack Detection Using Deep Learning Algorithm, Multi-Layer Perceptron. Future Internet 2023, 15, 76. https://doi.org/10.3390/fi15020076

Alibrahimi, Fuqdan&Amintoosi, Haleh. (2020). A Hybrid Method of Genetic Algorithm and Support Vector Machine for DNS Tunneling Detection.

Dr. S.A. Sivakumar. (2019). Hybrid Design and RF Planning for 4G networks using Cell Prioritization Scheme. International Journal of New Practices in Management and Engineering, 8(02), 08 - 15. https://doi.org/10.17762/ijnpme.v8i02.76

Jackson, B., Lewis, M., González, M., Gonzalez, L., & González, M. Improving Natural Language Understanding with Transformer Models. Kuwait Journal of Machine Learning, 1(4). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/152

Kshirsagar, P. R., Reddy, D. H., Dhingra, M., Dhabliya, D., & Gupta, A. (2022). A review on application of deep learning in natural language processing. Paper presented at the Proceedings of 5th International Conference on Contemporary Computing and Informatics, IC3I 2022, 1834-1840. doi:10.1109/IC3I56241.2022.10073309 Retrieved from www.scopus.com

Downloads

Published

16.08.2023

How to Cite

Pokale, N. B. ., Sharma, P. ., & Mane, D. T. . (2023). Attack Detection and Mitigation in IoT-Fog Architecture: Handling Class Imbalance Problem. International Journal of Intelligent Systems and Applications in Engineering, 11(10s), 195–216. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3245

Issue

Section

Research Article