Skip to main content
Log in

Enhancing Intrusion Detection System Performance to Detect Attacks on Edge of Things

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

Edge computing is an emerging network system under which the data source and data process are brought to the end node (edge device) for computation and which is used to speed up response time, save bandwidth, and increase the efficiency of the application. Edge of Things (EoT) is the group of entirely Edge node that has the power to connect to the network/internet to gather and share data in a computing environment. Protecting EoT environments with traditional Intrusion Detection Systems (IDSs) is a severe problem because of the large number of EoT devices and various types of EoT devices being used due to large amounts of data being collected and data processed on the network. Edge architecture consists of several layers. Due to architectural changes, privacy and security concerns in the EoT are moving to different layers of edge architecture. As a result, it can be difficult to detect intrusion threats in decentralized systems. Therefore, intrusion detection systems are needed. Several approaches to IDS have been proposed and developed to reduce and avoid cyber-attacks, but new techniques still need to be enhanced. This study aims to offer an improved IDS model for classifying attacks on EoT networks. To protect EoT network, an improved EoT-IDS is proposed by applying multiple machine learning (ML) models. This research work uses the combination-based grouping method for optimal class feature selection. Afterward, the filter-based feature selection technique was performed for optimal reduced features. We focus on the optimal features selection framework, because for better accuracy and anomaly detection of ML models, the effectiveness of feature selection is imperative. The research was executed on the UNSW-NB15 dataset. The performance results show an accuracy of 98.72%, a detection rate (DR) of 98.47%, and a false alarm rate (FAR) of 0.87% for optimal reduced features using the Random Forest classifier.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Shi W, Cao J, Zhang Q, Li Y, Xu L. Edge computing: vision and challenges. IEEE Internet Things J. 2016;3:637–46. https://doi.org/10.1109/JIOT.2016.2579198.

    Article  Google Scholar 

  2. Zhou Y, Zhang D, Xiong N. Post-cloud computing paradigms: a survey and comparison. Tsinghua Sci Technol. 2017;22(6):714-32 https://doi.org/10.23919/TST.2017.8195353.

  3. Prabadevi B, Deepa N, Pham QV, Nguyen DC, Reddy T, Pathirana PN, Dobre O. Toward blockchain for edge-of-things: a new paradigm, opportunities, and future directions. IEEE Internet Things Magazine. 2021;4(2):102–8. https://doi.org/10.1109/IOTM.0001.2000191.

    Article  Google Scholar 

  4. Xiao Y, Jia Y, Liu C, Cheng X, Yu J, Lv W. Edge computing security: state of the art and challenges. Proc IEEE. 2019. https://doi.org/10.1109/JPROC.2019.2918437.

    Article  Google Scholar 

  5. Yang R, Yu FR, Si P, Yang Z, Zhang Y. Integrated blockchain and edge computing systems: a survey, some research issues and challenges. IEEE Commun Surveys Tutorials. 2019. https://doi.org/10.1109/COMST.2019.2894727.

    Article  Google Scholar 

  6. Li Y, Liu Q. A comprehensive review study of cyber-attacks and cyber security; emerging trends and recent developments. Energy Rep. 2021;7:8176–86. https://doi.org/10.1016/j.egyr.2021.08.126.

    Article  Google Scholar 

  7. Ometov A, Molua OL, Komarov M, Nurmi J. A survey of security in cloud, edge, and fog computing. Sensors. 2022. https://doi.org/10.3390/s22030927.

    Article  Google Scholar 

  8. Ahmed M, Naser Mahmood A, Hu J. A survey of network anomaly detection techniques. J Netwk Comput Appl. 2016. https://doi.org/10.1016/j.jnca.2015.11.016.

    Article  Google Scholar 

  9. Alwarafy A, Al-Thelaya KA, Abdallah M, Schneider J, Hamdi M. A survey on security and privacy issues in edge-computing-assisted internet of things. EEE Internet Things J. 2021. https://doi.org/10.1109/JIOT.2020.3015432.

    Article  Google Scholar 

  10. Ahmad Z, Shahid Khan A, Wai Shiang C, Abdullah J, Ahmad F. Network intrusion detection system: a systematic study of machine learning and deep learning approaches. Tran Emerg Telecommun Technol. 2021. https://doi.org/10.1002/ett.4150.

    Article  Google Scholar 

  11. Khraisat A, Gondal I, Vamplew P, Kamruzzaman J. Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity. 2019. https://doi.org/10.1186/s42400-019-0038-7.

    Article  Google Scholar 

  12. Haque S, Eberhart Z, Bansal A, McMillan C. Semantic similarity metrics for evaluating source code summarization. In IEEE International Conference on Program Comprehension 2022; pp. 36-47 https://doi.org/10.1145/nnnnnnn.nnnnnnn.

  13. Almogren AS. Intrusion detection in edge-of-things computing. J Parallel Distrib Comput. 2020;137:259–65. https://doi.org/10.1016/j.jpdc.2019.12.008.

    Article  Google Scholar 

  14. Bagui S, Kalaimannan E, Bagui S, Nandi D, Pinto A. Using machine learning techniques to identify rare cyber-attacks on the UNSW-NB15 dataset. Secur Priv. 2019. https://doi.org/10.1002/spy2.91.

    Article  Google Scholar 

  15. Dickson A, Thomas C. Analysis of UNSW-NB15 dataset using machine learning classifiers. In: communications in computer and information science. Springer Science and Business Media Deutschland GmbH. 2021. p. 198–207. https://doi.org/10.1007/978-981-16-0419-5_16.

  16. Ring M, Wunderlich S, Scheuring D, Landes D, Hotho A. A survey of network-based intrusion detection data sets. Comput Secur. 2019. https://doi.org/10.1016/j.cose.2019.06.005.

    Article  Google Scholar 

  17. Al-Daweri MS, Ariffin KAZ, Abdullah S, Senan MFEM. An analysis of the KDD99 and UNSW-NB15 datasets for the intrusion detection system. Symmetry (Basel). 2020;12:1–32. https://doi.org/10.3390/sym12101666.

    Article  Google Scholar 

  18. Meftah S, Rachidi T, Assem N. Network based intrusion detection using the UNSW-NB15 dataset. Int J Comput Digit Syst. 2019;8(5):478–87. https://doi.org/10.12785/ijcds/080505.

    Article  Google Scholar 

  19. Janarthanan T, Zargari S. Feature selection in UNSW-NB15 and KDDCUPâ€TM99 datasets. 2017.

  20. Singh AP, Singh M. A comparative review of malware analysis and detection in HTTPs traffic. Int J Comput Digit Syst. 2021;10(1):111-23 https://doi.org/10.12785/ijcds/100111

  21. Aggarwal P, Sharma SK. Analysis of KDD dataset attributes - class wise for intrusion detection. In: Procedia Computer Science. Elsevier 2015. p. 842–851. https://doi.org/10.1016/j.procs.2015.07.490.

  22. Disha RA, Waheed S. Performance analysis of machine learning models for intrusion detection system using Gini Impurity-based Weighted Random Forest (GIWRF) feature selection technique. Cybersecurity. 2022. https://doi.org/10.1186/s42400-021-00103-8.

    Article  Google Scholar 

  23. Ahmed HA, Hameed A, Bawany NZ. Network intrusion detection using oversampling technique and machine learning algorithms. PeerJ Comput Sci. 2022. https://doi.org/10.7717/PEERJ-CS.820.

    Article  Google Scholar 

  24. Kumar V, Das AK, Sinha D. UIDS: a unified intrusion detection system for IoT environment. Evol Intell. 2021;14:47–59. https://doi.org/10.1007/s12065-019-00291-w.

    Article  Google Scholar 

  25. Disha RA, Waheed S. A Comparative study of machine learning models for Network Intrusion Detection System using UNSW-NB 15 dataset. In: Proceedings of International Conference on Electronics, Communications and Information Technology, ICECIT 2021. Institute of Electrical and Electronics Engineers Inc. 2021. https://doi.org/10.1109/ICECIT54077.2021.964147.

  26. Hammad M, El-Medany W, Ismail Y. Intrusion detection system using feature selection with clustering and classification machine learning algorithms on the UNSW-NB15 dataset. In: 2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies, 3ICT 2020. Institute of Electrical and Electronics Engineers Inc. 2020. https://doi.org/10.1109/3ICT51146.2020.9312002.

  27. Kasongo SM, Sun Y. Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset. J Big Data. 2020. https://doi.org/10.1186/s40537-020-00379-6.

    Article  Google Scholar 

  28. Sarhan M, Layeghy S, Portmann M. Towards a standard feature set for network intrusion detection system datasets. Mobile Netwks Appl. 2022;27:357–70. https://doi.org/10.1007/s11036-021-01843-0.

    Article  Google Scholar 

  29. Moualla S, Khorzom K, Jafar A. Improving the performance of machine learning-based network intrusion detection systems on the UNSW-NB15 dataset. Comput Intell Neurosci. 2021. https://doi.org/10.1155/2021/5557577.

    Article  Google Scholar 

  30. Sarker IH. Machine learning: algorithms, real-world applications and research directions. SN Comput Sci. 2021. https://doi.org/10.1007/s42979-021-00592-x.

    Article  Google Scholar 

  31. Singh AP, Kumar S, Kumar A, Usama M. Machine learning based intrusion detection system for minority attacks classification. In 2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES), Greater Noida, India. 2022. pp. 256-261 https://doi.org/10.1109/CISES54857.2022.9844381

  32. Saheed YK. Performance improvement of intrusion detection system for detecting attacks on internet of things and edge of things. In artificial intelligence for cloud and edge computing. Internet of things 2022. Springer, Cham

  33. UNSW-NB15 Dataset, UNSW Canberra Cyber 2015, Available online at https://www.unsw.adfa.edu.au/unswcanberra-cyber/cybersecurity/ADFA-NB15-Datasets, Accessed on 10 January 2020.

  34. Singh S, Kumar K, Kumar B. Sentiment analysis of twitter data using TF-IDF and machine learning techniques. In: International conference on machine learning, big data, cloud and parallel computing (COM-IT-CON), Faridabad, India. 2022. p. 252–255. https://doi.org/10.1109/COM-IT-CON54601.2022.9850477.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vipin Kumar.

Ethics declarations

Conflict of Interest

On behalf of all the authors, the corresponding author states that there is no conflict of interest.

Ethics Approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the topical collection “Industrial IoT and Cyber-Physical Systems” guest edited by Arun K Somani, Seeram Ramakrishnan, Anil Chaudhary and Mehul Mahrishi.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, V., Kumar, V., Singh, N. et al. Enhancing Intrusion Detection System Performance to Detect Attacks on Edge of Things. SN COMPUT. SCI. 4, 802 (2023). https://doi.org/10.1007/s42979-023-02242-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-023-02242-w

Keywords

Navigation