Skip to main content
Log in

Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

Fog computing is a new computing paradigm in the era of the Internet of Things. Aiming at the problem that fog nodes are closer to user equipment, with heterogeneous nodes, limited storage capacity resources, and greater vulnerability to intrusion, a lightweight support vector machine intrusion detection model based on Cloud-Fog Collaboration(CFC-SVM) is proposed. Due to the high dimensionality of network data, first, Principal Component Analysis (PCA) is used to reduce the dimensionality of the data, eliminate the correlation between attributes and reduce the training time. Then, in the cloud server, a support vector machine (SVM) optimized by the particle swarm algorithm is used to complete the training of the dataset, obtain the optimal SVM intrusion-detection classifier, send it to the fog node, and carry out attack detection at the fog node. Experiments with the classic KDD CUP 99 dataset show that the model in this paper is better than other similar algorithms in regard to detection time, detection rate and accuracy, which can effectively solve the problem of intrusion detection in the fog environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Shi W, Cao J, Zhang Q, Li Y, Xu L (2016) Edge computing: Vision and challenges. IEEE Internet Things J 3(5):637–646

    Article  Google Scholar 

  2. Liu C, Xiang F, Wang P, Sun Z (2019) A review of issues and challenges in fog computing environment. DASC/PiCom/DataCom/CyberSciTech 232–237

  3. Puliafito C, Mingozzi E, Longo F, Puliafito A, Rana O (2019) Fog computing for the Internet of Things: A Survey. ACM Trans Internet Techn 19(2):18:1–18:41

    Article  Google Scholar 

  4. Oma R, Nakamura S, Duolikun D, Enokido T, Takizawa M (2018) An energy-efficient model for fog computing in the Internet of Things (IoT). Internet Things 1-2:14–26

    Article  Google Scholar 

  5. Puthal D, Mohanty SP, Bhavake SA, Morgan G, Ranjan R (2019) Fog computing security challenges and future directions [Energy and Securi-ty]. IEEE Consum Electron Mag 8(3):92–96

    Article  Google Scholar 

  6. Hassan N, Salman O, Chehab A, Couturier R (2019) Preserving data security in distributed fog computing. Ad Hoc Netw, 94

  7. Elazhary H (2019) Internet of Things (IoT), mobile cloud, cloudlet, mobile IoT, IoT cloud, fog, mobile edge, and edge emerging computing paradigms: Disambiguation and research directions. J Netw Comput Appl 128:105–140

    Article  Google Scholar 

  8. Parikh S, Dave D, Patel R, Doshi N (2019) Security and privacy issues in cloud, fog and edge computing. EUSPN/ICTH 734–739

  9. Khan S, Parkinson S, Qin Y (2017) Fog computing security: a review of current applications and security solutions. J Cloud Comput 6:19

    Article  Google Scholar 

  10. D’Souza C, Ahn G-J, Taguinod M (2014) Policy-driven security manage-ment for fog computing: Preliminary framework and a case study. IRI 16–23

  11. Ficco M (2019) Internet-of-Things and fog-computing as enablers of new security and privacy threats. Internet of Things 8

  12. Razouk W, Sgandurra D, Sakurai K (2017) A new security middleware archi-tecture based on fog computing and cloud to support IoT constrained devices. IML 35:1–35:8

  13. Hosseinpour F, Amoli PV, Plosila J et al (2016) An intrusion detection system for fog computing and iot based logistic systems using a smart data approach. Int J Digit Content Technol Appl 10(5)

  14. Peng K, Leung VCM, Zheng L, Wang S, Huang C, Lin T (2018) Intrusion detection system based on decision tree over big data in fog envi-ronment. Wirel Commun Mob Comput 2018

  15. Zhou L, Guo H, Deng G (2019) A fog computing based approach to DDoS mitigation in IIoT systems. Comput Secur 85:51–62

    Article  Google Scholar 

  16. An X, Zhou X, Lü X, Lin F, Yang L (2018) Sample selected ex-treme learning machine based intrusion detection in fog computing and MEC. Wirel Commun Mob Comput 2018

  17. Prabavathy S, Sundarakantham K, Shalinie SM (2018) Design of cognitive fog compu-ting for intrusion detection in Internet of Things. J Commun Netw 20(3):291–298

    Article  Google Scholar 

  18. Liu Y, Bi J-W, Fan Z-P (2017) A method for multi-class sentiment classification based on an improved one-vs-one (OVO) strategy and the support vector machine (SVM) algorithm. Inf Sci 394:38–52

    Article  Google Scholar 

  19. Cui J, Shi G, Gong C (2017) A fast classification method of faults in power electronic circuits based on support vector machines. Nephron Clin Pract 24(4):701–720

    Google Scholar 

  20. Li L (2020) Analysis and data mining of intellectual property using GRNN and SVM. Pers Ubiquit Comput 24(1):139–150

    Article  Google Scholar 

  21. Gu J, Wang L, Wang H, Wang S (2019) A novel approach to intrusion detection using SVM ensemble with feature augmentation. Comput Secur 86:53–62

    Article  Google Scholar 

  22. KDD CUP 99 data set. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

Download references

Acknowledgements

This project is supported by Natural Science Foundation of China (No. 61572170, No.61170254), The Key Projects of Natural Science Foundation of Hebei Provience (No. F2019201290). We hereby express our thanks.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ruizhong Du.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Du, R., Li, Y., Liang, X. et al. Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration. Mobile Netw Appl 27, 431–440 (2022). https://doi.org/10.1007/s11036-021-01838-x

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-021-01838-x

Keywords

Navigation