Abstract
Fog computing is a new computing paradigm in the era of the Internet of Things. Aiming at the problem that fog nodes are closer to user equipment, with heterogeneous nodes, limited storage capacity resources, and greater vulnerability to intrusion, a lightweight support vector machine intrusion detection model based on Cloud-Fog Collaboration(CFC-SVM) is proposed. Due to the high dimensionality of network data, first, Principal Component Analysis (PCA) is used to reduce the dimensionality of the data, eliminate the correlation between attributes and reduce the training time. Then, in the cloud server, a support vector machine (SVM) optimized by the particle swarm algorithm is used to complete the training of the dataset, obtain the optimal SVM intrusion-detection classifier, send it to the fog node, and carry out attack detection at the fog node. Experiments with the classic KDD CUP 99 dataset show that the model in this paper is better than other similar algorithms in regard to detection time, detection rate and accuracy, which can effectively solve the problem of intrusion detection in the fog environment.
Similar content being viewed by others
References
Shi W, Cao J, Zhang Q, Li Y, Xu L (2016) Edge computing: Vision and challenges. IEEE Internet Things J 3(5):637–646
Liu C, Xiang F, Wang P, Sun Z (2019) A review of issues and challenges in fog computing environment. DASC/PiCom/DataCom/CyberSciTech 232–237
Puliafito C, Mingozzi E, Longo F, Puliafito A, Rana O (2019) Fog computing for the Internet of Things: A Survey. ACM Trans Internet Techn 19(2):18:1–18:41
Oma R, Nakamura S, Duolikun D, Enokido T, Takizawa M (2018) An energy-efficient model for fog computing in the Internet of Things (IoT). Internet Things 1-2:14–26
Puthal D, Mohanty SP, Bhavake SA, Morgan G, Ranjan R (2019) Fog computing security challenges and future directions [Energy and Securi-ty]. IEEE Consum Electron Mag 8(3):92–96
Hassan N, Salman O, Chehab A, Couturier R (2019) Preserving data security in distributed fog computing. Ad Hoc Netw, 94
Elazhary H (2019) Internet of Things (IoT), mobile cloud, cloudlet, mobile IoT, IoT cloud, fog, mobile edge, and edge emerging computing paradigms: Disambiguation and research directions. J Netw Comput Appl 128:105–140
Parikh S, Dave D, Patel R, Doshi N (2019) Security and privacy issues in cloud, fog and edge computing. EUSPN/ICTH 734–739
Khan S, Parkinson S, Qin Y (2017) Fog computing security: a review of current applications and security solutions. J Cloud Comput 6:19
D’Souza C, Ahn G-J, Taguinod M (2014) Policy-driven security manage-ment for fog computing: Preliminary framework and a case study. IRI 16–23
Ficco M (2019) Internet-of-Things and fog-computing as enablers of new security and privacy threats. Internet of Things 8
Razouk W, Sgandurra D, Sakurai K (2017) A new security middleware archi-tecture based on fog computing and cloud to support IoT constrained devices. IML 35:1–35:8
Hosseinpour F, Amoli PV, Plosila J et al (2016) An intrusion detection system for fog computing and iot based logistic systems using a smart data approach. Int J Digit Content Technol Appl 10(5)
Peng K, Leung VCM, Zheng L, Wang S, Huang C, Lin T (2018) Intrusion detection system based on decision tree over big data in fog envi-ronment. Wirel Commun Mob Comput 2018
Zhou L, Guo H, Deng G (2019) A fog computing based approach to DDoS mitigation in IIoT systems. Comput Secur 85:51–62
An X, Zhou X, Lü X, Lin F, Yang L (2018) Sample selected ex-treme learning machine based intrusion detection in fog computing and MEC. Wirel Commun Mob Comput 2018
Prabavathy S, Sundarakantham K, Shalinie SM (2018) Design of cognitive fog compu-ting for intrusion detection in Internet of Things. J Commun Netw 20(3):291–298
Liu Y, Bi J-W, Fan Z-P (2017) A method for multi-class sentiment classification based on an improved one-vs-one (OVO) strategy and the support vector machine (SVM) algorithm. Inf Sci 394:38–52
Cui J, Shi G, Gong C (2017) A fast classification method of faults in power electronic circuits based on support vector machines. Nephron Clin Pract 24(4):701–720
Li L (2020) Analysis and data mining of intellectual property using GRNN and SVM. Pers Ubiquit Comput 24(1):139–150
Gu J, Wang L, Wang H, Wang S (2019) A novel approach to intrusion detection using SVM ensemble with feature augmentation. Comput Secur 86:53–62
KDD CUP 99 data set. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
Acknowledgements
This project is supported by Natural Science Foundation of China (No. 61572170, No.61170254), The Key Projects of Natural Science Foundation of Hebei Provience (No. F2019201290). We hereby express our thanks.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Du, R., Li, Y., Liang, X. et al. Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration. Mobile Netw Appl 27, 431–440 (2022). https://doi.org/10.1007/s11036-021-01838-x
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-021-01838-x