Abstract
Edge computing has revolutionized distributed architectures, enabling workloads to be strategically positioned at the network’s edge, where data is generated and actions are initiated. This paradigm facilitates various applications, including the Internet of Things (IoT), smart grids, and smart homes, by providing cloud services directly to end-users. In particular, delay-sensitive applications benefit from the mobility, low latency, bandwidth, and location awareness offered by edge computing. Edge computing is an ideal platform for efficient data processing in smart homes. However, the security of edge gateways and nodes within smart home environments remains susceptible to security threats. This paper presents a novel approach employing a Deep Forest (DF)-based Intrusion Detection System (IDS) for Edge Intelligence. By embedding an IDS in edge nodes, this approach leverages edge computing to enhance security in smart home environments. The Deep Forest Classifier (DF) is innovative because it effectively addresses data imbalance in training datasets, a crucial factor in anomaly detection for binary-class classification. This integration enables real-time, low-latency threat detection and significantly improves security metrics, demonstrating substantial performance enhancements over traditional machine learning models. Experiments conducted on the UNSW-NB15 dataset demonstrate that the proposed binary classifier improves Accuracy by 26.24% over Naïve Bayes, 11.68% over Logistic Regression and 6.20% over KNN models.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shi, W., Cao, J., Zhang, Q., Li, Y., Xu, L.: Edge computing: vision and challenges. IEEE Internet of Things J., 3(5), 637–646 (2016)
Ande, R., Adebisi, B., Hammoudeh, M., Saleem, J.: Internet of Things: Evolution and technologies from a security perspective. In: Sustainable Cities and Society, vol. 26, Art. no. 101728 (Jul. 2019)
Mosenia, A., Jha, N.K.: A comprehensive study of the security of Internet-of-Things. IEEE Trans. Emerg. Topics Comput., 5(4), 586–602 (Oct. 2017)
Raza, S., Wallgren, L., Voigt, T.: SVELTE: real-time intrusion detection in the Internet of Things. Ad Hoc Netw., 11(8), 2661–2674 (Nov. 2013)
Yim, K., Chen, I.-R., Cho, J.-H.: Intrusion detection systems for networked unmanned aerial vehicles: a survey. In: Proceedings of the 14th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 560–565 (Jun. 2018)
Wifi network security statistics/graph. http://graphs.net/wifistats.html/, accessed on Dec. 7, 2016. [Online]
Vinayakumar, R., Alazab, M., Soman, K.P., Poornachandran, P., Al-Nemrat, A., Venkatraman, S.: Deep learning approach for intelligent intrusion detection system. In: IEEE Access, 7, 41525–41550 (2019)
Xin, Y., Kong, L., Liu, Z., Chen, Y., Li, Y., Zhu, H., Gao, M., Hou, H., Wang, C.: Machine learning and deep learning methods for cybersecurity. IEEE Access, 6, 35365–35381 (2018)
Shenfield, A., Day, D., Ayesh, A.: Intelligent intrusion detection systems using artificial neural networks. ICT Express, 4(2), 95–99 (Jun. 2018)
Yu, W.: A survey on the edge computing for the Internet of Things. IEEE Access, 6, 6900–6919 (2018)
Xu, Z., Gu, R., Huang, T., Xiang, H., Zhang, X., Qi, L., Xu, X.: An IoT-oriented offloading method with privacy preservation for cloudlet-enabled wireless metropolitan area networks. In: Sensors, 18(9), Art. no. 3030 (2018)
Chen, W., Wang, D., Li, K.: Multi-user multi-task computation offloading in green mobile edge cloud computing. In press. IEEE Transactions on Services Computing (2019)
Jia, G., Han, G., Xie, H., Du, J.: Hybrid-LRU caching for optimizing data storage and retrieval in edge computing-based wearable sensors. In press, IEEE Internet of Things Journal (2019)
Zhao, Z., Min, G., Gao, W., Wu, Y., Duan, H., Ni, Q.: Deploying edge computing nodes for large-scale IoT: A diversity aware approach. In: IEEE Internet of Things J., 5(5), 3606–3614 (2018)
Chen, M., Li, W., Hao, Y., Qian, Y., Humar, I.: Edge cognitive computing based smart healthcare system. Future Gener. Comput. Syst., 86, 403–411 (2018)
Kozik, R., Choraś, M., Ficco, M., Palmieri, F.: A scalable distributed machine learning approach for attack detection in edge computing environments. J. Parallel Distribut. Comput., 119, 18–26 (2018)
Zhou, Z.-H., Feng, J.: Deep Forest: Towards an alternative to deep neural networks. In: Proceedings of the 26th International Joint Conference on Artificial Intelligence (IJCAI), pp. 3553–3559 (2017)
Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems. In Proceedings of the 2015 Military Communications and Information Systems Conference (MilCIS), pp. 1–6, Canberra, ACT, Australia (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Jakka, A., Rani, J.V., Budhathoki, B., Swathi, Y., Jayanthi, M. (2025). Deep Forest-Based Intrusion Detection System for Edge Intelligence Assisted Smart Homes. In: Panda, S.K., et al. Computing, Communication and Learning. CoCoLe 2024. Communications in Computer and Information Science, vol 2317. Springer, Cham. https://doi.org/10.1007/978-3-031-79041-6_28
Download citation
DOI: https://doi.org/10.1007/978-3-031-79041-6_28
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-79040-9
Online ISBN: 978-3-031-79041-6
eBook Packages: Computer ScienceComputer Science (R0)