Gold Rush Optimization-Driven Random Forest Approach for Intrusion Detection System in Edge and Fog Computing Settings
Keywords:
Edge computing, fog computing, Gold Rush Optimization-Driven Random Forest (GRO-RF), Intrusion Detection Systems (IDS), Security.Abstract
Although both edge and fog computing architectures improve latency minimization and real-time data processing, their scattered nature presents significant security problems, particularly in intrusion detection. In this study, we provided an innovative gold rush optimization-driven random forest (GRO-RF) technique for effective intrusion detection systems (IDS). To examine the performance, the UNSW-NB15 public dataset is utilized to train the suggested GRO-RF technique. The z-score normalization approach is used to preprocess the raw samples to rearrange the data without noise and duplicates. To extract important features, the cleaned data is subjected to additional processing throughout the feature extraction process using linear discriminate analysis (LDA). The RF technique is used to identify intrusions in edge and fog computing environments using the retrieved data. GRO is designed to enhance the misclassification of RF by increasing accuracy and reducing the error rate in categorization. The suggested method is implemented using a Python program and its efficacy in detecting intrusions is evaluated against other current approaches using various metrics such as precision (98.45%), accuracy (99%), F-measure (96.89%) and recall (97.25%). We show that, in edge and fog computing scenarios, the GRO-RF technique has the highest intrusion detection accuracy compared to the other methods, based on the results of the experiment.
Downloads
References
Eskandari, M., Janjua, Z. H., Vecchio, M., & Antonelli, F. (2020). Passban IDS: An intelligent anomaly-based intrusion detection system for IoT edge devices. IEEE Internet of Things Journal, 7(8), 6882-6897.
Smys, S., Basar, A., & Wang, H. (2020). Hybrid intrusion detection system for internet of things (IoT). Journal of ISMAC, 2(04), 190-199.
Ferrag, M. A., Maglaras, L., Moschoyiannis, S., & Janicke, H. (2020). Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. Journal of Information Security and Applications, 50, 102419.
Lopez-Martin, M., Carro, B., & Sanchez-Esguevillas, A. (2020). Application of deep reinforcement learning to intrusion detection for supervised problems. Expert Systems with Applications, 141, 112963.
Kasongo, S. M., & Sun, Y. (2020). A deep learning method with wrapper based feature extraction for wireless intrusion detection system. Computers & Security, 92, 101752.
Kalaivani, K., & Chinnadurai, M. (2021). A Hybrid Deep Learning Intrusion Detection Model for Fog Computing Environment. Intelligent Automation & Soft Computing, 30(1).
Aliyu, F., Sheltami, T., Deriche, M., & Nasser, N. (2022). Human immune-based intrusion detection and prevention system for fog computing. Journal of Network and Systems Management, 30, 1-27.
Kumar, P., Gupta, G. P., & Tripathi, R. (2021). Design of anomaly-based intrusion detection system using fog computing for IoT network. Automatic Control and Computer Sciences, 55(2), 137-147.
Labiod, Y., Amara Korba, A., & Ghoualmi, N. (2022). Fog computing-based intrusion detection architecture to protect iot networks. Wireless Personal Communications, 125(1), 231-259.
Saheed, Y. K. (2022). Performance Improvement of Intrusion Detection System for Detecting Attacks on Internet of Things and Edge of Things. In Artificial Intelligence for Cloud and Edge Computing (pp. 321-339). Cham: Springer International Publishing.
Ashiku, L., & Dagli, C. (2021). Network intrusion detection system using deep learning. Procedia Computer Science, 185, 239-247.
Verma, A., & Ranga, V. (2020). Machine learning based intrusion detection systems for IoT applications. Wireless Personal Communications, 111, 2287-2310.
Alhajjar, E., Maxwell, P., & Bastian, N. (2021). Adversarial machine learning in network intrusion detection systems. Expert Systems with Applications, 186, 115782.
Kasongo, S. M., & Sun, Y. (2020). Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset. Journal of Big Data, 7, 1-20.
Alqarni, A. A. (2023). Toward support-vector machine-based ant colony optimization algorithms for intrusion detection. Soft Computing, 27(10), 6297-6305.
Bulso, N., Marsili, M., & Roudi, Y. (2019). On the complexity of logistic regression models. Neural computation, 31(8), 1592-1623.
Zhang, P., Jia, Y., & Shang, Y. (2022). Research and application of XGBoost in imbalanced data. International Journal of Distributed Sensor Networks, 18(6), 15501329221106935.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.