Gold Rush Optimization-Driven Random Forest Approach for Intrusion Detection System in Edge and Fog Computing Settings

Authors

  • Sweta Kumari, Shweta Singh, Beemkumar Nagappan, Satish Kumar Jangid, Sachin Mittal

Keywords:

Edge computing, fog computing, Gold Rush Optimization-Driven Random Forest (GRO-RF), Intrusion Detection Systems (IDS), Security.

Abstract

Although both edge and fog computing architectures improve latency minimization and real-time data processing, their scattered nature presents significant security problems, particularly in intrusion detection. In this study, we provided an innovative gold rush optimization-driven random forest (GRO-RF) technique for effective intrusion detection systems (IDS). To examine the performance, the UNSW-NB15 public dataset is utilized to train the suggested GRO-RF technique. The z-score normalization approach is used to preprocess the raw samples to rearrange the data without noise and duplicates. To extract important features, the cleaned data is subjected to additional processing throughout the feature extraction process using linear discriminate analysis (LDA). The RF technique is used to identify intrusions in edge and fog computing environments using the retrieved data. GRO is designed to enhance the misclassification of RF by increasing accuracy and reducing the error rate in categorization. The suggested method is implemented using a Python program and its efficacy in detecting intrusions is evaluated against other current approaches using various metrics such as precision (98.45%), accuracy (99%), F-measure (96.89%) and recall (97.25%). We show that, in edge and fog computing scenarios, the GRO-RF technique has the highest intrusion detection accuracy compared to the other methods, based on the results of the experiment.

Downloads

Download data is not yet available.

References

Eskandari, M., Janjua, Z. H., Vecchio, M., & Antonelli, F. (2020). Passban IDS: An intelligent anomaly-based intrusion detection system for IoT edge devices. IEEE Internet of Things Journal, 7(8), 6882-6897.

Smys, S., Basar, A., & Wang, H. (2020). Hybrid intrusion detection system for internet of things (IoT). Journal of ISMAC, 2(04), 190-199.

Ferrag, M. A., Maglaras, L., Moschoyiannis, S., & Janicke, H. (2020). Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. Journal of Information Security and Applications, 50, 102419.

Lopez-Martin, M., Carro, B., & Sanchez-Esguevillas, A. (2020). Application of deep reinforcement learning to intrusion detection for supervised problems. Expert Systems with Applications, 141, 112963.

Kasongo, S. M., & Sun, Y. (2020). A deep learning method with wrapper based feature extraction for wireless intrusion detection system. Computers & Security, 92, 101752.

Kalaivani, K., & Chinnadurai, M. (2021). A Hybrid Deep Learning Intrusion Detection Model for Fog Computing Environment. Intelligent Automation & Soft Computing, 30(1).

Aliyu, F., Sheltami, T., Deriche, M., & Nasser, N. (2022). Human immune-based intrusion detection and prevention system for fog computing. Journal of Network and Systems Management, 30, 1-27.

Kumar, P., Gupta, G. P., & Tripathi, R. (2021). Design of anomaly-based intrusion detection system using fog computing for IoT network. Automatic Control and Computer Sciences, 55(2), 137-147.

Labiod, Y., Amara Korba, A., & Ghoualmi, N. (2022). Fog computing-based intrusion detection architecture to protect iot networks. Wireless Personal Communications, 125(1), 231-259.

Saheed, Y. K. (2022). Performance Improvement of Intrusion Detection System for Detecting Attacks on Internet of Things and Edge of Things. In Artificial Intelligence for Cloud and Edge Computing (pp. 321-339). Cham: Springer International Publishing.

Ashiku, L., & Dagli, C. (2021). Network intrusion detection system using deep learning. Procedia Computer Science, 185, 239-247.

Verma, A., & Ranga, V. (2020). Machine learning based intrusion detection systems for IoT applications. Wireless Personal Communications, 111, 2287-2310.

Alhajjar, E., Maxwell, P., & Bastian, N. (2021). Adversarial machine learning in network intrusion detection systems. Expert Systems with Applications, 186, 115782.

Kasongo, S. M., & Sun, Y. (2020). Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset. Journal of Big Data, 7, 1-20.

Alqarni, A. A. (2023). Toward support-vector machine-based ant colony optimization algorithms for intrusion detection. Soft Computing, 27(10), 6297-6305.

Bulso, N., Marsili, M., & Roudi, Y. (2019). On the complexity of logistic regression models. Neural computation, 31(8), 1592-1623.

Zhang, P., Jia, Y., & Shang, Y. (2022). Research and application of XGBoost in imbalanced data. International Journal of Distributed Sensor Networks, 18(6), 15501329221106935.

Downloads

Published

26.03.2024

How to Cite

Satish Kumar Jangid, Sachin Mittal, S. K. S. S. B. N. . (2024). Gold Rush Optimization-Driven Random Forest Approach for Intrusion Detection System in Edge and Fog Computing Settings. International Journal of Intelligent Systems and Applications in Engineering, 12(21s), 1470–1477. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5618

Issue

Section

Research Article