skip to main content
10.1145/3427477.3429989acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicdcnConference Proceedingsconference-collections
research-article

P2IDF: A Privacy-Preserving based Intrusion Detection Framework for Software Defined Internet of Things-Fog (SDIoT-Fog)

Published:05 January 2021Publication History

ABSTRACT

The Software Defined Internet of Things-Fog (SDIoT-Fog) has provided a new connectivity paradigm for effective service provisioning. SDIoT-Fog uses network resource virtualization to provide services to heterogeneous IoT devices. However, data privacy, and security are the two major challenges that prevents faster realization of SDIoT-based frameworks. Motivated from the aforementioned challenges, we present a Privacy-Preserving based Intrusion Detection Framework (P2IDF) for protecting confidential data and to detect malicious instances in SDIoT-Fog network traffic. This framework has two key engines. Firstly, a Sparse AutoEncoder (SAE)-based privacy-preservation engine is suggested that transforms original data into a new encoded form that avoids inference attacks. Secondly, an intrusion detection engine is suggested that uses Artificial Neural Network (ANN) to train and evaluate the outcomes of the proposed privacy-preservation engine using an IoT-based dataset named ToN-IoT. Finally, experimental results showed that the proposed P2IDF framework outperforms with some recent state-of-the-art frameworks in terms of detection rate, accuracy and precision score.

References

  1. Rasim M Alguliyev, Ramiz M Aliguliyev, and Fargana J Abdullayeva. 2019. Privacy-preserving deep learning algorithm for big personal data analysis. Journal of Industrial Information Integration 15 (2019), 1–14.Google ScholarGoogle ScholarCross RefCross Ref
  2. A. C. Baktir, A. Ozgovde, and C. Ersoy. 2017. How Can Edge Computing Benefit From Software-Defined Networking: A Survey, Use Cases, and Future Directions. IEEE Communications Surveys Tutorials 19, 4 (2017), 2359–2391.Google ScholarGoogle ScholarCross RefCross Ref
  3. Uttam Ghosh, Pushpita Chatterjee, Sachin Shetty, and Raja Datta. 2020. An SDN-IoT-based framework for future smart cities: Addressing perspective. In Internet of Things and Secure Smart Environments: Successes and Pitfalls. CRC Press, 441.Google ScholarGoogle Scholar
  4. Mahmudul Hasan, Md Milon Islam, Md Ishrak Islam Zarif, and MMA Hashem. 2019. Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet of Things 7(2019), 100059.Google ScholarGoogle ScholarCross RefCross Ref
  5. ASM Sanwar Hosen, Saurabh Singh, Pradip Kumar Sharma, Uttam Ghosh, Jin Wang, In-Ho Ra, and Gi Hwan Cho. 2020. Blockchain-Based Transaction Validation Protocol for a Secure Distributed IoT Network. IEEE Access 8(2020), 117266–117277.Google ScholarGoogle ScholarCross RefCross Ref
  6. Marwa Keshk, Nour Moustafa, Elena Sitnikova, and Benjamin Turnbull. 2018. Privacy-preserving big data analytics for cyber-physical systems. Wireless Networks (2018), 1–9.Google ScholarGoogle Scholar
  7. Marwa Keshk, Elena Sitnikova, Nour Moustafa, Jiankun Hu, and Ibrahim Khalil. 2019. An integrated framework for privacy-preserving based anomaly detection for cyber-physical systems. IEEE Transactions on Sustainable Computing(2019).Google ScholarGoogle Scholar
  8. M. Keshk, B. Turnbull, N. Moustafa, D. Vatsalan, and K. R. Choo. 2020. A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks. IEEE Transactions on Industrial Informatics 16, 8 (2020), 5110–5118.Google ScholarGoogle ScholarCross RefCross Ref
  9. Prabhat Kumar, Randhir Kumar, Govind P. Gupta, and Rakesh Tripathi. [n.d.]. A Distributed framework for detecting DDoS attacks in smart contract-based Blockchain-IoT Systems by leveraging Fog computing. Transactions on Emerging Telecommunications Technologies n/a, n/a([n. d.]), e4112. https://doi.org/10.1002/ett.4112Google ScholarGoogle Scholar
  10. Nour Moustafa. 2019. ToN_IoT datasets. http://dx.doi.org/10.21227/fesz-dm97 Online; accessed 10-Feb-2020.Google ScholarGoogle Scholar
  11. M. Shafiq, Z. Tian, A. K. Bashir, X. Du, and M. Guizani. 2020. CorrAUC: a Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine Learning Techniques. IEEE Internet of Things Journal(2020), 1–1.Google ScholarGoogle Scholar
  12. Muhammad Shafiq, Zhihong Tian, Ali Kashif Bashir, Xiaojiang Du, and Mohsen Guizani. 2020. IoT malicious traffic identification using wrapper-based feature selection mechanisms. Computers & Security(2020), 101863.Google ScholarGoogle Scholar
  13. Muhammad Shafiq, Zhihong Tian, Yanbin Sun, Xiaojiang Du, and Mohsen Guizani. 2020. Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city. Future Generation Computer Systems 107 (2020), 433–442.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Pradip Kumar Sharma, Saurabh Singh, Young-Sik Jeong, and Jong Hyuk Park. 2017. Distblocknet: A distributed blockchains-based secure sdn architecture for iot networks. IEEE Communications Magazine 55, 9 (2017), 78–85.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Saurabh Singh, Pradip Kumar Sharma, Seo Yeon Moon, and Jong Hyuk Park. 2017. Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. Journal of Ambient Intelligence and Humanized Computing (2017), 1–18.Google ScholarGoogle Scholar
  16. Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, and Kouichi Sakurai. 2020. Towards a Lightweight Detection System for Cyber Attacks in the IoT Environment Using Corresponding Features. Electronics 9, 1 (2020), 144.Google ScholarGoogle ScholarCross RefCross Ref
  17. Shiv Shakti Srivastava, Nitin Gupta, Saurabh Chaturvedi, and Saugata Ghosh. 2011. A Survey on Mobile Agent based Intrusion Detection System. IJCA Proceedings on International Symposium on Devices MEMS, Intelligent Systems & Communication6(2011), 19–24.Google ScholarGoogle Scholar
  18. Shiv Shakti Srivastava, Nitin Gupta, and Rajaram Jaiswal. 2011. Modified Version of Playfair Cipher by using 8x8 Matrix and Random Number Generation. In IEEE 3rd International Conference on Computer Modeling and Simulatio.Google ScholarGoogle Scholar
  19. C. Sun, M. Ma, Z. Zhao, S. Tian, R. Yan, and X. Chen. 2019. Deep Transfer Learning Based on Sparse Autoencoder for Remaining Useful Life Prediction of Tool in Manufacturing. IEEE Transactions on Industrial Informatics 15, 4 (2019), 2416–2425.Google ScholarGoogle ScholarCross RefCross Ref
  20. Steven Walczak and Narciso Cerpa. 2003. Artificial Neural Networks. In Encyclopedia of Physical Science and Technology (Third Edition) (third edition ed.), Robert A. Meyers (Ed.). Academic Press, New York, 631 – 645.Google ScholarGoogle Scholar

Index Terms

  1. P2IDF: A Privacy-Preserving based Intrusion Detection Framework for Software Defined Internet of Things-Fog (SDIoT-Fog)
                Index terms have been assigned to the content through auto-classification.

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Other conferences
                  ICDCN '21: Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking
                  January 2021
                  174 pages
                  ISBN:9781450381840
                  DOI:10.1145/3427477

                  Copyright © 2021 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 5 January 2021

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • research-article
                  • Research
                  • Refereed limited

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader

                HTML Format

                View this article in HTML Format .

                View HTML Format