Artificial Neural Networks-Based Intrusion Detection System for Internet of Things Fog Nodes
Affiliation
Univ Arizona, Dept Elect & Comp EngnIssue Date
2020-04-15Keywords
Edge computingInternet of Things
Intrusion detection
Cloud computing
Computer security
Artificial neural networks
Anomaly behavior
cyber security
fog computing
IoT
neural networks
Metadata
Show full item recordCitation
Pacheco, J., Benitez, V. H., Félix-Herrán, L. C., & Satam, P. (2020). Artificial Neural Networks-Based Intrusion Detection System for Internet of Things Fog Nodes. IEEE Access, 8, 73907-73918.Journal
IEEE ACCESSRights
Copyright © The Author(s). This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.Collection Information
This item from the UA Faculty Publications collection is made available by the University of Arizona with support from the University of Arizona Libraries. If you have questions, please contact us at repository@u.library.arizona.edu.Abstract
The Internet of Things (IoT) represents a mean to share resources (memory, storage computational power, data, etc.) between computers and mobile devices, as well as buildings, wearable devices, electrical grids, and automobiles, just to name few. The IoT is leading to the development of advanced information services that will require large storage and computational power, as well as real-time processing capabilities. The integration of IoT with emerging technologies such as Fog Computing can complement these requirements with pervasive and cost-effective services capable of processing large-scale geo-distributed information. In any IoT application, communication availability is essential to deliver accurate and useful information, for instance, to take actions during dangerous situations, or to manage critical infrastructures. IoT components like gateways, also called Fog Nodes, face outstanding security challenges as the attack surface grows with the number of connected devices requesting communication services. These Fog nodes can be targeted by an attacker, preventing the nodes from delivering important information to the final users or to perform accurate automated actions. This paper introduces an Anomaly Behavior Analysis Methodology based on Artificial Neural Networks, to implement an adaptive Intrusion Detection System (IDS) capable of detecting when a Fog node has been compromised, and then take the required actions to ensure communication availability. The experimental results reveal that the proposed approach has the capability for characterizing the normal behavior of Fog Nodes despite its complexity due to the adaptive scheme, and also has the capability of detecting anomalies due to any kind of sources such as misuses, cyber-attacks or system glitches, with high detection rate and low false alarms.Note
Open access journalISSN
2169-3536Version
Final published versionSponsors
Instituto Tecnológico y de Estudios Superiores de Monterreyae974a485f413a2113503eed53cd6c53
10.1109/access.2020.2988055
Scopus Count
Collections
Except where otherwise noted, this item's license is described as Copyright © The Author(s). This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.