ABSTRACT
The Software Defined Internet of Things-Fog (SDIoT-Fog) has provided a new connectivity paradigm for effective service provisioning. SDIoT-Fog uses network resource virtualization to provide services to heterogeneous IoT devices. However, data privacy, and security are the two major challenges that prevents faster realization of SDIoT-based frameworks. Motivated from the aforementioned challenges, we present a Privacy-Preserving based Intrusion Detection Framework (P2IDF) for protecting confidential data and to detect malicious instances in SDIoT-Fog network traffic. This framework has two key engines. Firstly, a Sparse AutoEncoder (SAE)-based privacy-preservation engine is suggested that transforms original data into a new encoded form that avoids inference attacks. Secondly, an intrusion detection engine is suggested that uses Artificial Neural Network (ANN) to train and evaluate the outcomes of the proposed privacy-preservation engine using an IoT-based dataset named ToN-IoT. Finally, experimental results showed that the proposed P2IDF framework outperforms with some recent state-of-the-art frameworks in terms of detection rate, accuracy and precision score.
- Rasim M Alguliyev, Ramiz M Aliguliyev, and Fargana J Abdullayeva. 2019. Privacy-preserving deep learning algorithm for big personal data analysis. Journal of Industrial Information Integration 15 (2019), 1–14.Google ScholarCross Ref
- A. C. Baktir, A. Ozgovde, and C. Ersoy. 2017. How Can Edge Computing Benefit From Software-Defined Networking: A Survey, Use Cases, and Future Directions. IEEE Communications Surveys Tutorials 19, 4 (2017), 2359–2391.Google ScholarCross Ref
- Uttam Ghosh, Pushpita Chatterjee, Sachin Shetty, and Raja Datta. 2020. An SDN-IoT-based framework for future smart cities: Addressing perspective. In Internet of Things and Secure Smart Environments: Successes and Pitfalls. CRC Press, 441.Google Scholar
- Mahmudul Hasan, Md Milon Islam, Md Ishrak Islam Zarif, and MMA Hashem. 2019. Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet of Things 7(2019), 100059.Google ScholarCross Ref
- ASM Sanwar Hosen, Saurabh Singh, Pradip Kumar Sharma, Uttam Ghosh, Jin Wang, In-Ho Ra, and Gi Hwan Cho. 2020. Blockchain-Based Transaction Validation Protocol for a Secure Distributed IoT Network. IEEE Access 8(2020), 117266–117277.Google ScholarCross Ref
- Marwa Keshk, Nour Moustafa, Elena Sitnikova, and Benjamin Turnbull. 2018. Privacy-preserving big data analytics for cyber-physical systems. Wireless Networks (2018), 1–9.Google Scholar
- Marwa Keshk, Elena Sitnikova, Nour Moustafa, Jiankun Hu, and Ibrahim Khalil. 2019. An integrated framework for privacy-preserving based anomaly detection for cyber-physical systems. IEEE Transactions on Sustainable Computing(2019).Google Scholar
- M. Keshk, B. Turnbull, N. Moustafa, D. Vatsalan, and K. R. Choo. 2020. A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks. IEEE Transactions on Industrial Informatics 16, 8 (2020), 5110–5118.Google ScholarCross Ref
- Prabhat Kumar, Randhir Kumar, Govind P. Gupta, and Rakesh Tripathi. [n.d.]. A Distributed framework for detecting DDoS attacks in smart contract-based Blockchain-IoT Systems by leveraging Fog computing. Transactions on Emerging Telecommunications Technologies n/a, n/a([n. d.]), e4112. https://doi.org/10.1002/ett.4112Google Scholar
- Nour Moustafa. 2019. ToN_IoT datasets. http://dx.doi.org/10.21227/fesz-dm97 Online; accessed 10-Feb-2020.Google Scholar
- M. Shafiq, Z. Tian, A. K. Bashir, X. Du, and M. Guizani. 2020. CorrAUC: a Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine Learning Techniques. IEEE Internet of Things Journal(2020), 1–1.Google Scholar
- Muhammad Shafiq, Zhihong Tian, Ali Kashif Bashir, Xiaojiang Du, and Mohsen Guizani. 2020. IoT malicious traffic identification using wrapper-based feature selection mechanisms. Computers & Security(2020), 101863.Google Scholar
- Muhammad Shafiq, Zhihong Tian, Yanbin Sun, Xiaojiang Du, and Mohsen Guizani. 2020. Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city. Future Generation Computer Systems 107 (2020), 433–442.Google ScholarDigital Library
- Pradip Kumar Sharma, Saurabh Singh, Young-Sik Jeong, and Jong Hyuk Park. 2017. Distblocknet: A distributed blockchains-based secure sdn architecture for iot networks. IEEE Communications Magazine 55, 9 (2017), 78–85.Google ScholarDigital Library
- Saurabh Singh, Pradip Kumar Sharma, Seo Yeon Moon, and Jong Hyuk Park. 2017. Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. Journal of Ambient Intelligence and Humanized Computing (2017), 1–18.Google Scholar
- Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, and Kouichi Sakurai. 2020. Towards a Lightweight Detection System for Cyber Attacks in the IoT Environment Using Corresponding Features. Electronics 9, 1 (2020), 144.Google ScholarCross Ref
- Shiv Shakti Srivastava, Nitin Gupta, Saurabh Chaturvedi, and Saugata Ghosh. 2011. A Survey on Mobile Agent based Intrusion Detection System. IJCA Proceedings on International Symposium on Devices MEMS, Intelligent Systems & Communication6(2011), 19–24.Google Scholar
- Shiv Shakti Srivastava, Nitin Gupta, and Rajaram Jaiswal. 2011. Modified Version of Playfair Cipher by using 8x8 Matrix and Random Number Generation. In IEEE 3rd International Conference on Computer Modeling and Simulatio.Google Scholar
- C. Sun, M. Ma, Z. Zhao, S. Tian, R. Yan, and X. Chen. 2019. Deep Transfer Learning Based on Sparse Autoencoder for Remaining Useful Life Prediction of Tool in Manufacturing. IEEE Transactions on Industrial Informatics 15, 4 (2019), 2416–2425.Google ScholarCross Ref
- Steven Walczak and Narciso Cerpa. 2003. Artificial Neural Networks. In Encyclopedia of Physical Science and Technology (Third Edition) (third edition ed.), Robert A. Meyers (Ed.). Academic Press, New York, 631 – 645.Google Scholar
Index Terms
- P2IDF: A Privacy-Preserving based Intrusion Detection Framework for Software Defined Internet of Things-Fog (SDIoT-Fog)
Recommendations
A Survey on Intrusion Detection and Prevention Systems
AbstractIn the digital world, malicious activities that violate the confidentiality, integrity, or availability of data and devices are known as intrusions. An intrusion detection system (IDS) analyses the activities of a single system or a network to ...
Intelligent approaches toward intrusion detection systems for Industrial Internet of Things: A systematic comprehensive review
AbstractRecently years, we have seen the exponential upgrowth of the Industrial Internet of Things (IIoT), which brings significant benefits to our daily lives, industry, and society. The common idea behind the IIoT is to connect digital ...
A Survey on Privacy Preservation in Fog-Enabled Internet of Things
Despite the rapid growth and advancement in the Internet of Things (IoT), there are critical challenges that need to be addressed before the full adoption of the IoT. Data privacy is one of the hurdles towards the adoption of IoT as there might be ...
Comments