Skip to main content

Intelligent Intrusion Detection Algorithm Based on Multi-Attack for Edge-Assisted Internet of Things

  • Chapter
  • First Online:
Security and Risk Analysis for Intelligent Edge Computing

Part of the book series: Advances in Information Security ((ADIS,volume 103))

Abstract

The security concerns surrounding edge computing have been in the forefront as the technology has become increasingly popular. There is a larger need to move computations to edge servers as more and more IoT applications that take advantage of edge computing are developed. Security at the periphery of information transmission in the Internet of Things is essential. In this work we introduce a multi-attack IDS for edge-assisted IoT that combines the back propagation (BP) Neural Network with the Radial basis function (RBF) Neural Network. Specifically, we employ a BP neural network to spot outliers and zero down on the most important characteristics for each attack methodology. A neural network based on radial basis functions (RBF) is used to spot multi-attack intrusions. The findings demonstrate great accuracy in the given multiattack scenario, demonstrating the potential and efficiency of our proposed anomaly detection methodology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mohammad GB, Shitharth S, Syed SA, Dugyala R et al (2022) Mechanism of Internet of Things (IoT) integrated with radio frequency identification (RFID) technology for healthcare system. Math Prob Eng, Hindawi. https://doi.org/10.1155/2022/4167700

  2. Wu D, Yan J, Wang H, Wang R (2019) Multiattack intrusion detection algorithm for edge-assisted internet of things. In: 2019 IEEE international conference on industrial Internet (ICII), pp 210–218

    Chapter  Google Scholar 

  3. Shitharth S, Kshirsagar PR, Balachandran PK, Alyoubi KH, Khadidos AO (2022) An innovative perceptual pigeon galvanized optimization (PPGO) based likelihood Naïve Bayes (LNB) classification approach for network intrusion detection system. IEEE Access 10:46424–46441. https://doi.org/10.1109/ACCESS.2022.3171660

    Article  Google Scholar 

  4. Siriwardhana Y, Porambage P, Liyanage M, Ylianttila M (2021) A survey on mobile augmented reality with 5G mobile edge computing: architectures, applications, and technical aspects. IEEE Commun Surv Tutor 23(2):1160–1192

    Article  Google Scholar 

  5. Khan WZ, Ahmed E, Hakak S, Yaqoob I, Ahmed A (2019) Edge computing: a survey. Future Gener Comput Syst 97:219–235

    Article  Google Scholar 

  6. Abbas N, Zhang Y, Taherkordi A, Skeie T (2017) Mobile edge computing: a survey. IEEE Internet Things J 5(1):450–465

    Article  Google Scholar 

  7. Yoosuf MS, Muralidharan C, Shitharth S, Alghamdi M, Maray M, Rabie OB (2022) FogDedupe: a fog-centric deduplication approach using multikey homomorphic encryption technique. J Sens, Hindawi. https://doi.org/10.1155/2022/6759875

  8. Sabella D, Vaillant A, Kuure P, Rauschenbach U, Giust F (2016) Mobile-edge computing architecture: the role of MEC in the Internet of Things. IEEE Consum Electron Mag 5(4):84–91

    Article  Google Scholar 

  9. Mohammad GB, Shitharth S, Kumar PR (2021) Integrated machine learning model for an URL phishing detection. Int J Grid. Distrib Comput 14(1):513–529

    Google Scholar 

  10. Furnell S (2004) Enemies within: the problem of insider attacks. Comput Fraud Secur 2004(7):6–11

    Article  Google Scholar 

  11. Roman R, Lopez J, Mambo M (2018) Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Future Gener Comput Syst 78:680–698

    Article  Google Scholar 

  12. Almogren AS (2020) Intrusion detection in edge-of-things computing. J Parallel Distrib Comput 137:259–265

    Article  Google Scholar 

  13. Khadidos AO, Khadidos AO, Manoharan H, Alyoubi KH, Alshareef AM, Shitharth S (2022) Integrating industrial appliances for security enhancement in data point using SCADA networks with learning algorithm. Int Trans Electr Energy Syst 2022:8457116, 17 pages. https://doi.org/10.1155/2022/8685235

    Article  Google Scholar 

  14. Prasanth SK, Shitharth S, Praveen Kumar B, Subedha V, Sangeetha K (2022) Optimal feature selection based on evolutionary algorithm for intrusion detection. SN Comput Sci. https://doi.org/10.1007/s42979-022-01325-4

  15. Abid Salih A, Mohsin AA (2021) Evaluation of classification algorithms for intrusion detection system: a review. J Soft Comput Data Min 2(1):31–40

    Google Scholar 

  16. Singh BN, Khari M (2021) A survey on hybrid intrusion detection techniques. In: Research in intelligent and computing in engineering. Springer, Berlin, pp 815–825

    Google Scholar 

  17. Selvarajan S, Manoharan H, Hasanin T, Alsini R, Uddin M, Shorfuzzaman M, Alsufyani A (2022) Biomedical signals for healthcare using Hadoop infrastructure with artificial intelligence and fuzzy logic interpretation. Appl Sci, MDPI. https://doi.org/10.3390/app12105097

  18. Roman R, Lopez J, Mambo M (2018) Mobile edge computing, Fog et al.: a survey and analysis of security threats and challenges. Futur Gener Comput Syst 78:680–698

    Article  Google Scholar 

  19. Mohammad GB, Shitharth S (2021) Wireless sensor network and IoT based systems for healthcare application. Mater Today Proc, Elsevier. https://doi.org/10.1016/j.matpr.2020.11.801

  20. Raponi S, Caprolu M, Pietro RD (2019) Intrusion detection at the network edge: solutions, limitations, and future directions. In: Zhang T, Wei J, Zhang LJ (eds) Edge computing – EDGE 2019, pp 59–75

    Chapter  Google Scholar 

  21. Khadidos AO, Shitharth S, Khadidos AO, Sangeetha K, Alyoubi KH (2022) Healthcare data security using IoT sensors based on random hashing mechanism. J Sens 2022:8457116, 17 pages. https://doi.org/10.1155/2022/8457116

    Article  Google Scholar 

  22. Sharma R, Chan CA, Leckie C (2020) Evaluation of centralised vs distributed collaborative intrusion detection systems in multi-access edge computing. In: IFIP networking 2020

    Google Scholar 

  23. Divakaran JS, Prashanth SK, Mohammad GB, Shitharth D, Mohanty SN, Arvind C, Srihari K, Abdullah RY, Sundramurthy VP (2022) Improved handover authentication in fifth-generation communication networks using fuzzy evolutionary optimisation with nano core elements in mobile healthcare applications. J Healthcare Eng, Hindawi. https://doi.org/10.1155/2022/2500377

  24. Liu L, De Vel O, Han Q-L, Zhang J, Xiang Y (2018) Detecting and preventing cyber insider threats: a survey. IEEE Commun Surv Tutorials 20(2):1397–1417

    Article  Google Scholar 

  25. Panda SK, Mohammad GB, Mohanty SN, Sahoo S (2021) Smart contract-based land registry system to reduce frauds and time delay. Secur Priv 4(5):e172

    Article  Google Scholar 

  26. Mohammad GB, Shitharth S (2021) Wireless sensor network and IoT based systems for healthcare application. Mater Today Proc:1–8

    Google Scholar 

  27. Dugyala R, Reddy NH, Maheswari VU, Mohammad GB, Alenezi F, Polat K (2022) Analysis of malware detection and signature generation using a novel hybrid approach. Math Probl Eng 22(1):1–13

    Article  Google Scholar 

  28. Sudqi Khater B, Abdul Wahab AWB, Idris MYIB, Abdulla Hussain M, Ahmed Ibrahim A (2019) A lightweight perceptron-based intrusion detection system for fog computing. Appl Sci 9(1):178

    Article  Google Scholar 

  29. Tian Z, Luo C, Qiu J, Xiaojiang D, Guizani M (2019) A distributed deep learning system for web attack detection on edge devices. IEEE Trans Industr Inform 16(3):1963–1971

    Article  Google Scholar 

  30. Kohli V, Chougule A, Chamola V, Yu FR (2022) MbRE IDS: an AI and edge computing empowered framework for securing intelligent transportation systems. In: IEEE INFOCOM 2022 – IEEE conference on computer communications workshops (INFOCOM WKSHPS), pp 1–6

    Google Scholar 

  31. Cheng Y, Lu J, Niyato D, Lyu B, Kang J, Zhu S (2022) Federated transfer learning with client selection for intrusion detection in mobile edge computing. IEEE Commun Lett 26(3):552–556

    Article  Google Scholar 

  32. Li B, Wu Y, Song J, Lu R, Li T, Zhao L (2021) DeepFed: federated deep learning for intrusion detection in industrial cyber–physical systems. IEEE Trans Industr Inform 17(8):5615–5624

    Article  Google Scholar 

  33. Geiping J, Bauermeister H, Dröge H, Moeller M (2019) Inverting gradients–how easy is it to break privacy in federated learning? Proc Neural Inf Process Syst (NeurIPS):1–11

    Google Scholar 

  34. Mugunthan V, Polychroniadou A, Byrd D, Balch TH (2019) SMPAI: Secure multi-party computation for federated learning. Proc Neural Inf Process Syst (NeurIPS):1–9

    Google Scholar 

  35. Chen Y, Qin X, Wang J, Yu C, Gao W (2020) Fedhealth: a federated transfer learning framework for wearable healthcare. IEEE Intell Syst 35(4):83–93

    Article  Google Scholar 

  36. Yang H, He H, Zhang W, Cao X (Apr. 2021) FedSteg: a federated transfer learning framework for secure image steganalysis. IEEE Trans Netw Sci Eng 8(2):1084–1094

    Article  Google Scholar 

  37. Xiao L, Lu X, Xu T, Wan X, Ji W, Zhang Y (2020) Reinforcement learning-based mobile offloading for edge computing against jamming and interference. IEEE Trans Commun 68(10):6114–6126

    Article  Google Scholar 

  38. Chen M et al (2021) Distributed learning in wireless networks: recent progress and future challenges. IEEE J Sel Areas Commun 39(12):3579–3605

    Article  Google Scholar 

  39. Mohammed I et al (2021) Budgeted online selection of candidate IoT clients to participate in federated learning. IEEE Internet Things J 8(7):5938–5952

    Article  Google Scholar 

  40. Wang H, Kaplan Z, Niu D, Li B (2020) Optimizing federated learning on non-IID data with reinforcement learning. Proc IEEE Conf Comput Commun (INFOCOM):1698–1707

    Google Scholar 

  41. Chakraborty A, Misra S, Mondal A, Obaidat MS (2020) Sensorch: Qos-aware resource orchestration for provisioning sensors-as-a-service. In: ICC 2020 – 2020 IEEE international conference on communications (ICC), pp 1–6

    Google Scholar 

  42. Loukas G, Vuong T, Heartfield R, Sakellari G, Yoon Y, Gan D (2017) Cloud-based cyber-physical intrusion detection for vehicles using deep learning. IEEE Access 6:3491–3508

    Article  Google Scholar 

  43. Tesei A, Luise M, Pagano P, Ferreira J (2021) Secure multi-access edge computing assisted maneuver control for autonomous vehicles. In: 2021 IEEE 93rd vehicular technology conference (VTC2021-Spring), pp 1–6

    Google Scholar 

  44. Alladi T, Kohli V, Chamola V, Yu FR (2021) Securing the internet of vehicles: a deep learning-based classification framework. IEEE Netw Lett 3(2):94–97

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Shitharth .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Shitharth, S., Mohammed, G.B., Ramasamy, J., Srivel, R. (2023). Intelligent Intrusion Detection Algorithm Based on Multi-Attack for Edge-Assisted Internet of Things. In: Srivastava, G., Ghosh, U., Lin, J.CW. (eds) Security and Risk Analysis for Intelligent Edge Computing. Advances in Information Security, vol 103. Springer, Cham. https://doi.org/10.1007/978-3-031-28150-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-28150-1_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-28149-5

  • Online ISBN: 978-3-031-28150-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics