Skip to main content

Deep Forest-Based Intrusion Detection System for Edge Intelligence Assisted Smart Homes

  • Conference paper
  • First Online:
Computing, Communication and Learning (CoCoLe 2024)

Abstract

Edge computing has revolutionized distributed architectures, enabling workloads to be strategically positioned at the network’s edge, where data is generated and actions are initiated. This paradigm facilitates various applications, including the Internet of Things (IoT), smart grids, and smart homes, by providing cloud services directly to end-users. In particular, delay-sensitive applications benefit from the mobility, low latency, bandwidth, and location awareness offered by edge computing. Edge computing is an ideal platform for efficient data processing in smart homes. However, the security of edge gateways and nodes within smart home environments remains susceptible to security threats. This paper presents a novel approach employing a Deep Forest (DF)-based Intrusion Detection System (IDS) for Edge Intelligence. By embedding an IDS in edge nodes, this approach leverages edge computing to enhance security in smart home environments. The Deep Forest Classifier (DF) is innovative because it effectively addresses data imbalance in training datasets, a crucial factor in anomaly detection for binary-class classification. This integration enables real-time, low-latency threat detection and significantly improves security metrics, demonstrating substantial performance enhancements over traditional machine learning models. Experiments conducted on the UNSW-NB15 dataset demonstrate that the proposed binary classifier improves Accuracy by 26.24% over Naïve Bayes, 11.68% over Logistic Regression and 6.20% over KNN models.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shi, W., Cao, J., Zhang, Q., Li, Y., Xu, L.: Edge computing: vision and challenges. IEEE Internet of Things J., 3(5), 637–646 (2016)

    Google Scholar 

  2. Ande, R., Adebisi, B., Hammoudeh, M., Saleem, J.: Internet of Things: Evolution and technologies from a security perspective. In: Sustainable Cities and Society, vol. 26, Art. no. 101728 (Jul. 2019)

    Google Scholar 

  3. Mosenia, A., Jha, N.K.: A comprehensive study of the security of Internet-of-Things. IEEE Trans. Emerg. Topics Comput., 5(4), 586–602 (Oct. 2017)

    Google Scholar 

  4. Raza, S., Wallgren, L., Voigt, T.: SVELTE: real-time intrusion detection in the Internet of Things. Ad Hoc Netw., 11(8), 2661–2674 (Nov. 2013)

    Google Scholar 

  5. Yim, K., Chen, I.-R., Cho, J.-H.: Intrusion detection systems for networked unmanned aerial vehicles: a survey. In: Proceedings of the 14th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 560–565 (Jun. 2018)

    Google Scholar 

  6. Wifi network security statistics/graph. http://graphs.net/wifistats.html/, accessed on Dec. 7, 2016. [Online]

  7. Vinayakumar, R., Alazab, M., Soman, K.P., Poornachandran, P., Al-Nemrat, A., Venkatraman, S.: Deep learning approach for intelligent intrusion detection system. In: IEEE Access, 7, 41525–41550 (2019)

    Google Scholar 

  8. Xin, Y., Kong, L., Liu, Z., Chen, Y., Li, Y., Zhu, H., Gao, M., Hou, H., Wang, C.: Machine learning and deep learning methods for cybersecurity. IEEE Access, 6, 35365–35381 (2018)

    Google Scholar 

  9. Shenfield, A., Day, D., Ayesh, A.: Intelligent intrusion detection systems using artificial neural networks. ICT Express, 4(2), 95–99 (Jun. 2018)

    Google Scholar 

  10. Yu, W.: A survey on the edge computing for the Internet of Things. IEEE Access, 6, 6900–6919 (2018)

    Google Scholar 

  11. Xu, Z., Gu, R., Huang, T., Xiang, H., Zhang, X., Qi, L., Xu, X.: An IoT-oriented offloading method with privacy preservation for cloudlet-enabled wireless metropolitan area networks. In: Sensors, 18(9), Art. no. 3030 (2018)

    Google Scholar 

  12. Chen, W., Wang, D., Li, K.: Multi-user multi-task computation offloading in green mobile edge cloud computing. In press. IEEE Transactions on Services Computing (2019)

    Google Scholar 

  13. Jia, G., Han, G., Xie, H., Du, J.: Hybrid-LRU caching for optimizing data storage and retrieval in edge computing-based wearable sensors. In press, IEEE Internet of Things Journal (2019)

    Book  MATH  Google Scholar 

  14. Zhao, Z., Min, G., Gao, W., Wu, Y., Duan, H., Ni, Q.: Deploying edge computing nodes for large-scale IoT: A diversity aware approach. In: IEEE Internet of Things J., 5(5), 3606–3614 (2018)

    Google Scholar 

  15. Chen, M., Li, W., Hao, Y., Qian, Y., Humar, I.: Edge cognitive computing based smart healthcare system. Future Gener. Comput. Syst., 86, 403–411 (2018)

    Google Scholar 

  16. Kozik, R., Choraś, M., Ficco, M., Palmieri, F.: A scalable distributed machine learning approach for attack detection in edge computing environments. J. Parallel Distribut. Comput., 119, 18–26 (2018)

    Google Scholar 

  17. Zhou, Z.-H., Feng, J.: Deep Forest: Towards an alternative to deep neural networks. In: Proceedings of the 26th International Joint Conference on Artificial Intelligence (IJCAI), pp. 3553–3559 (2017)

    Google Scholar 

  18. Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems. In Proceedings of the 2015 Military Communications and Information Systems Conference (MilCIS), pp. 1–6, Canberra, ACT, Australia (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to J. Vakala Rani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jakka, A., Rani, J.V., Budhathoki, B., Swathi, Y., Jayanthi, M. (2025). Deep Forest-Based Intrusion Detection System for Edge Intelligence Assisted Smart Homes. In: Panda, S.K., et al. Computing, Communication and Learning. CoCoLe 2024. Communications in Computer and Information Science, vol 2317. Springer, Cham. https://doi.org/10.1007/978-3-031-79041-6_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-79041-6_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-79040-9

  • Online ISBN: 978-3-031-79041-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics