Show simple item record

dc.contributor.authorPacheco, Jesus
dc.contributor.authorBenitez, Victor H.
dc.contributor.authorFélix-Herrán, Luis C.
dc.contributor.authorSatam, Pratik
dc.date.accessioned2020-10-28T22:43:45Z
dc.date.available2020-10-28T22:43:45Z
dc.date.issued2020-04-15
dc.identifier.citationPacheco, J., Benitez, V. H., Félix-Herrán, L. C., & Satam, P. (2020). Artificial Neural Networks-Based Intrusion Detection System for Internet of Things Fog Nodes. IEEE Access, 8, 73907-73918.en_US
dc.identifier.issn2169-3536
dc.identifier.doi10.1109/access.2020.2988055
dc.identifier.urihttp://hdl.handle.net/10150/648046
dc.description.abstractThe Internet of Things (IoT) represents a mean to share resources (memory, storage computational power, data, etc.) between computers and mobile devices, as well as buildings, wearable devices, electrical grids, and automobiles, just to name few. The IoT is leading to the development of advanced information services that will require large storage and computational power, as well as real-time processing capabilities. The integration of IoT with emerging technologies such as Fog Computing can complement these requirements with pervasive and cost-effective services capable of processing large-scale geo-distributed information. In any IoT application, communication availability is essential to deliver accurate and useful information, for instance, to take actions during dangerous situations, or to manage critical infrastructures. IoT components like gateways, also called Fog Nodes, face outstanding security challenges as the attack surface grows with the number of connected devices requesting communication services. These Fog nodes can be targeted by an attacker, preventing the nodes from delivering important information to the final users or to perform accurate automated actions. This paper introduces an Anomaly Behavior Analysis Methodology based on Artificial Neural Networks, to implement an adaptive Intrusion Detection System (IDS) capable of detecting when a Fog node has been compromised, and then take the required actions to ensure communication availability. The experimental results reveal that the proposed approach has the capability for characterizing the normal behavior of Fog Nodes despite its complexity due to the adaptive scheme, and also has the capability of detecting anomalies due to any kind of sources such as misuses, cyber-attacks or system glitches, with high detection rate and low false alarms.en_US
dc.description.sponsorshipInstituto Tecnológico y de Estudios Superiores de Monterreyen_US
dc.language.isoenen_US
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INCen_US
dc.rightsCopyright © The Author(s). This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.en_US
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/en_US
dc.subjectEdge computingen_US
dc.subjectInternet of Thingsen_US
dc.subjectIntrusion detectionen_US
dc.subjectCloud computingen_US
dc.subjectComputer securityen_US
dc.subjectArtificial neural networksen_US
dc.subjectAnomaly behavioren_US
dc.subjectcyber securityen_US
dc.subjectfog computingen_US
dc.subjectIoTen_US
dc.subjectneural networksen_US
dc.titleArtificial Neural Networks-Based Intrusion Detection System for Internet of Things Fog Nodesen_US
dc.typeArticleen_US
dc.contributor.departmentUniv Arizona, Dept Elect & Comp Engnen_US
dc.identifier.journalIEEE ACCESSen_US
dc.description.noteOpen access journalen_US
dc.description.collectioninformationThis item from the UA Faculty Publications collection is made available by the University of Arizona with support from the University of Arizona Libraries. If you have questions, please contact us at repository@u.library.arizona.edu.en_US
dc.eprint.versionFinal published versionen_US
dc.source.journaltitleIEEE Access
dc.source.volume8
dc.source.beginpage73907
dc.source.endpage73918
refterms.dateFOA2020-10-28T22:43:45Z


Files in this item

Thumbnail
Name:
09068218.pdf
Size:
1.791Mb
Format:
PDF
Description:
Final Published Version

This item appears in the following Collection(s)

Show simple item record

Copyright © The Author(s). This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
Except where otherwise noted, this item's license is described as Copyright © The Author(s). This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.