Abstract
The security concerns surrounding edge computing have been in the forefront as the technology has become increasingly popular. There is a larger need to move computations to edge servers as more and more IoT applications that take advantage of edge computing are developed. Security at the periphery of information transmission in the Internet of Things is essential. In this work we introduce a multi-attack IDS for edge-assisted IoT that combines the back propagation (BP) Neural Network with the Radial basis function (RBF) Neural Network. Specifically, we employ a BP neural network to spot outliers and zero down on the most important characteristics for each attack methodology. A neural network based on radial basis functions (RBF) is used to spot multi-attack intrusions. The findings demonstrate great accuracy in the given multiattack scenario, demonstrating the potential and efficiency of our proposed anomaly detection methodology.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mohammad GB, Shitharth S, Syed SA, Dugyala R et al (2022) Mechanism of Internet of Things (IoT) integrated with radio frequency identification (RFID) technology for healthcare system. Math Prob Eng, Hindawi. https://doi.org/10.1155/2022/4167700
Wu D, Yan J, Wang H, Wang R (2019) Multiattack intrusion detection algorithm for edge-assisted internet of things. In: 2019 IEEE international conference on industrial Internet (ICII), pp 210–218
Shitharth S, Kshirsagar PR, Balachandran PK, Alyoubi KH, Khadidos AO (2022) An innovative perceptual pigeon galvanized optimization (PPGO) based likelihood Naïve Bayes (LNB) classification approach for network intrusion detection system. IEEE Access 10:46424–46441. https://doi.org/10.1109/ACCESS.2022.3171660
Siriwardhana Y, Porambage P, Liyanage M, Ylianttila M (2021) A survey on mobile augmented reality with 5G mobile edge computing: architectures, applications, and technical aspects. IEEE Commun Surv Tutor 23(2):1160–1192
Khan WZ, Ahmed E, Hakak S, Yaqoob I, Ahmed A (2019) Edge computing: a survey. Future Gener Comput Syst 97:219–235
Abbas N, Zhang Y, Taherkordi A, Skeie T (2017) Mobile edge computing: a survey. IEEE Internet Things J 5(1):450–465
Yoosuf MS, Muralidharan C, Shitharth S, Alghamdi M, Maray M, Rabie OB (2022) FogDedupe: a fog-centric deduplication approach using multikey homomorphic encryption technique. J Sens, Hindawi. https://doi.org/10.1155/2022/6759875
Sabella D, Vaillant A, Kuure P, Rauschenbach U, Giust F (2016) Mobile-edge computing architecture: the role of MEC in the Internet of Things. IEEE Consum Electron Mag 5(4):84–91
Mohammad GB, Shitharth S, Kumar PR (2021) Integrated machine learning model for an URL phishing detection. Int J Grid. Distrib Comput 14(1):513–529
Furnell S (2004) Enemies within: the problem of insider attacks. Comput Fraud Secur 2004(7):6–11
Roman R, Lopez J, Mambo M (2018) Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Future Gener Comput Syst 78:680–698
Almogren AS (2020) Intrusion detection in edge-of-things computing. J Parallel Distrib Comput 137:259–265
Khadidos AO, Khadidos AO, Manoharan H, Alyoubi KH, Alshareef AM, Shitharth S (2022) Integrating industrial appliances for security enhancement in data point using SCADA networks with learning algorithm. Int Trans Electr Energy Syst 2022:8457116, 17 pages. https://doi.org/10.1155/2022/8685235
Prasanth SK, Shitharth S, Praveen Kumar B, Subedha V, Sangeetha K (2022) Optimal feature selection based on evolutionary algorithm for intrusion detection. SN Comput Sci. https://doi.org/10.1007/s42979-022-01325-4
Abid Salih A, Mohsin AA (2021) Evaluation of classification algorithms for intrusion detection system: a review. J Soft Comput Data Min 2(1):31–40
Singh BN, Khari M (2021) A survey on hybrid intrusion detection techniques. In: Research in intelligent and computing in engineering. Springer, Berlin, pp 815–825
Selvarajan S, Manoharan H, Hasanin T, Alsini R, Uddin M, Shorfuzzaman M, Alsufyani A (2022) Biomedical signals for healthcare using Hadoop infrastructure with artificial intelligence and fuzzy logic interpretation. Appl Sci, MDPI. https://doi.org/10.3390/app12105097
Roman R, Lopez J, Mambo M (2018) Mobile edge computing, Fog et al.: a survey and analysis of security threats and challenges. Futur Gener Comput Syst 78:680–698
Mohammad GB, Shitharth S (2021) Wireless sensor network and IoT based systems for healthcare application. Mater Today Proc, Elsevier. https://doi.org/10.1016/j.matpr.2020.11.801
Raponi S, Caprolu M, Pietro RD (2019) Intrusion detection at the network edge: solutions, limitations, and future directions. In: Zhang T, Wei J, Zhang LJ (eds) Edge computing – EDGE 2019, pp 59–75
Khadidos AO, Shitharth S, Khadidos AO, Sangeetha K, Alyoubi KH (2022) Healthcare data security using IoT sensors based on random hashing mechanism. J Sens 2022:8457116, 17 pages. https://doi.org/10.1155/2022/8457116
Sharma R, Chan CA, Leckie C (2020) Evaluation of centralised vs distributed collaborative intrusion detection systems in multi-access edge computing. In: IFIP networking 2020
Divakaran JS, Prashanth SK, Mohammad GB, Shitharth D, Mohanty SN, Arvind C, Srihari K, Abdullah RY, Sundramurthy VP (2022) Improved handover authentication in fifth-generation communication networks using fuzzy evolutionary optimisation with nano core elements in mobile healthcare applications. J Healthcare Eng, Hindawi. https://doi.org/10.1155/2022/2500377
Liu L, De Vel O, Han Q-L, Zhang J, Xiang Y (2018) Detecting and preventing cyber insider threats: a survey. IEEE Commun Surv Tutorials 20(2):1397–1417
Panda SK, Mohammad GB, Mohanty SN, Sahoo S (2021) Smart contract-based land registry system to reduce frauds and time delay. Secur Priv 4(5):e172
Mohammad GB, Shitharth S (2021) Wireless sensor network and IoT based systems for healthcare application. Mater Today Proc:1–8
Dugyala R, Reddy NH, Maheswari VU, Mohammad GB, Alenezi F, Polat K (2022) Analysis of malware detection and signature generation using a novel hybrid approach. Math Probl Eng 22(1):1–13
Sudqi Khater B, Abdul Wahab AWB, Idris MYIB, Abdulla Hussain M, Ahmed Ibrahim A (2019) A lightweight perceptron-based intrusion detection system for fog computing. Appl Sci 9(1):178
Tian Z, Luo C, Qiu J, Xiaojiang D, Guizani M (2019) A distributed deep learning system for web attack detection on edge devices. IEEE Trans Industr Inform 16(3):1963–1971
Kohli V, Chougule A, Chamola V, Yu FR (2022) MbRE IDS: an AI and edge computing empowered framework for securing intelligent transportation systems. In: IEEE INFOCOM 2022 – IEEE conference on computer communications workshops (INFOCOM WKSHPS), pp 1–6
Cheng Y, Lu J, Niyato D, Lyu B, Kang J, Zhu S (2022) Federated transfer learning with client selection for intrusion detection in mobile edge computing. IEEE Commun Lett 26(3):552–556
Li B, Wu Y, Song J, Lu R, Li T, Zhao L (2021) DeepFed: federated deep learning for intrusion detection in industrial cyber–physical systems. IEEE Trans Industr Inform 17(8):5615–5624
Geiping J, Bauermeister H, Dröge H, Moeller M (2019) Inverting gradients–how easy is it to break privacy in federated learning? Proc Neural Inf Process Syst (NeurIPS):1–11
Mugunthan V, Polychroniadou A, Byrd D, Balch TH (2019) SMPAI: Secure multi-party computation for federated learning. Proc Neural Inf Process Syst (NeurIPS):1–9
Chen Y, Qin X, Wang J, Yu C, Gao W (2020) Fedhealth: a federated transfer learning framework for wearable healthcare. IEEE Intell Syst 35(4):83–93
Yang H, He H, Zhang W, Cao X (Apr. 2021) FedSteg: a federated transfer learning framework for secure image steganalysis. IEEE Trans Netw Sci Eng 8(2):1084–1094
Xiao L, Lu X, Xu T, Wan X, Ji W, Zhang Y (2020) Reinforcement learning-based mobile offloading for edge computing against jamming and interference. IEEE Trans Commun 68(10):6114–6126
Chen M et al (2021) Distributed learning in wireless networks: recent progress and future challenges. IEEE J Sel Areas Commun 39(12):3579–3605
Mohammed I et al (2021) Budgeted online selection of candidate IoT clients to participate in federated learning. IEEE Internet Things J 8(7):5938–5952
Wang H, Kaplan Z, Niu D, Li B (2020) Optimizing federated learning on non-IID data with reinforcement learning. Proc IEEE Conf Comput Commun (INFOCOM):1698–1707
Chakraborty A, Misra S, Mondal A, Obaidat MS (2020) Sensorch: Qos-aware resource orchestration for provisioning sensors-as-a-service. In: ICC 2020 – 2020 IEEE international conference on communications (ICC), pp 1–6
Loukas G, Vuong T, Heartfield R, Sakellari G, Yoon Y, Gan D (2017) Cloud-based cyber-physical intrusion detection for vehicles using deep learning. IEEE Access 6:3491–3508
Tesei A, Luise M, Pagano P, Ferreira J (2021) Secure multi-access edge computing assisted maneuver control for autonomous vehicles. In: 2021 IEEE 93rd vehicular technology conference (VTC2021-Spring), pp 1–6
Alladi T, Kohli V, Chamola V, Yu FR (2021) Securing the internet of vehicles: a deep learning-based classification framework. IEEE Netw Lett 3(2):94–97
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Shitharth, S., Mohammed, G.B., Ramasamy, J., Srivel, R. (2023). Intelligent Intrusion Detection Algorithm Based on Multi-Attack for Edge-Assisted Internet of Things. In: Srivastava, G., Ghosh, U., Lin, J.CW. (eds) Security and Risk Analysis for Intelligent Edge Computing. Advances in Information Security, vol 103. Springer, Cham. https://doi.org/10.1007/978-3-031-28150-1_6
Download citation
DOI: https://doi.org/10.1007/978-3-031-28150-1_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-28149-5
Online ISBN: 978-3-031-28150-1
eBook Packages: Computer ScienceComputer Science (R0)