Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Advertisement

Springer Nature Link
Log in

NADA: new architecture for detecting DoS and DDoS attacks in fog computing

  • Original Paper
  • Published:
Journal of Computer Virology and Hacking Techniques Aims and scope Submit manuscript

Abstract

Nowadays, fog computing as a new part of the Internet of Things plays a vital and significant role in the development of technology in cities and smart homes, various industries, medical care, security and etc. This technology, like other emerging technologies, has security challenges. One of the most important attacks on fog nodes is the DoS and DDoS attacks. This article proposes new method for DoS and DDoS attack detection by combining machine learning techniques, DT and KNN with CNN algorithm. We have improved the performance of the intrusion detection systems in the Fog computing infrastructure by voting mechanism for DoS and DDoS detection. NADA is capable of detecting DoS and DDoS attacks with highest correct rate (about 99%). NADA can be applied in both edge and fog nodes. The proposed approach uses deep learning techniques and biological genetic algorithm for detecting suspicious traffic. Then the suspicious traffic applies to CNN, DT, and KNN as an input and based on the available samples, maximum vote-based attack detection validation is performed. Finally, we evaluated our method (NADA) and calculate criteria such as Precision, Accuracy, Recall, and Error. By simulating NADA, we observed that metrics cited improved on average by about 7% in comparison with other methods.

This is a preview of subscription content,log in via an institution to check access.

Access this article

Log in via an institution

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Notes

  1. Denial of Service.

  2. Distributed Denial of Service.

  3. Transmission Control Protocol.

  4. Internet of Things.

  5. Virtual Private Network.

  6. Artificial Neural Network.

  7. K-Nearest-Neighbor.

  8. Support vector machine.

  9. Convolutional neural network.

  10. Radial basis function.

References

  1. Delfin, S., Raj, S.N., Anand, A.: Fog computing: a new era of cloud computing. In: 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC), Erode, India (2019)

  2. Abdulkareem, K.H., Mohammed, M.A., Gunasekaran, S.S., Al-Mhiqani, M.N.: A review of fog computing and machine learning: concepts, applications, challenges, and open issues. IEEE Access7, 153123–153140 (2019)

    Article  Google Scholar 

  3. Zheng, X., Wu, W., Rong, C., Zhang T.: Fog computing: concept, applications and future. In: International Conference on Cloud Computing, Big Data and Blockchain (ICCBB), Fuzhou, China (2018)

  4. Jianbing, N., Kuan, Z., Xiaodong, L., Xuemin, S.: Securing fog computing for internet of things applications: challenges and solutions. IEEE Commun. Surv. Tutor.20(1), 601–628 (2018)

    Article  Google Scholar 

  5. Parikh, S., Dave, D., Patel, R., Doshi, N.: Security and privacy issues in cloud, fog and edge computing. Procedia Comput. Sci.160, 734–739 (2019)

    Article  Google Scholar 

  6. Alrashdi, I., Alqazzaz, A., Alharthi, R., Aloufi, E., Zohdy, M.A., Ming, H.: FBAD: fog-based attack detection for IoT healthcare in smart cities. In: 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York City, NY, USA (2019)

  7. Mukherjee, M., Ferrag, M.A., Leandros, M., Abdelouahid, D., Aazam, M.: Security and privacy issues and solutions for fog, Y. Yang , J. Huang, T. Zhang and J. Weinman, Eds., Wiley Telecom, pp. 353–374 (2020)

  8. Paharia, B., Bhushan, K.: Fog computing as a defensive approach against distributed denial of service (DDoS): a proposed architecture. In: International Conference on Computing, Communication and Networking Technologies (ICCCNT), Bangalore, India (2018)

  9. Alharbi, S., Rodriguez, P., Maharaja, R., Iyer, P., Subaschandrabose, N.: Secure the internet of things with challenge response authentication in fog computing. In: IEEE 36th International Performance Computing and Communications Conference (IPCCC), San Diego, CA, USA (2017)

  10. Huang, B., Cheng, X., Cao, Y., Zhang, L.: Lightweight hardware based secure authentication scheme for fog computing. In: 2018 IEEE/ACM Symposium on Edge Computing (SEC), Seattle, WA, USA (2018)

  11. National Institute of Technology Kurakshetra, D., Bhushan, K.: DDoS attack mitigation and resource provisioning in cloud using fog computing. In: International Conference On Smart Technologies For Smart Nation (SmartTechCon), Bangalore, India (2017)

  12. Deepali, Bhushan, K.: DDoS attack defense framework for cloud using fog computing. In: 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), Bangalore, India (2017)

  13. Potluri, S., Mangla, M., Satpathy, S., Mohanty, S.N.: Detection and prevention mechanisms for DDoS attack in cloud computing environment. In: 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kharagpur, India (2020)

  14. Singh, J., Bello, Y., Hussein, A.R.: Hierarchical security paradigm for IoT multiaccess edge computing. IEEE Internet Things J.8(7), 5794–5805 (2020)

    Article  Google Scholar 

  15. Gaurav, A., Hsu, C.-H., Gupta, B.B., Yamaguchi, S.: Fog layer-based DDoS attack detection approach for internet-of-things (IoTs) devices. In: IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA (2021)

  16. Sicari, S., Rizzardi, A., Miorandi, D., Porisini, A.: REATO: reacting to denial of service attacks in the internet of things. Comput. Netw.137, 37–48 (2018)

    Article  Google Scholar 

  17. Singh, S., Kumari, K., Gupta, S., Dua, A., Kumar, N.: Detecting different attack instances of DDoS vulnerabilities on edge network of fog computing using Gaussian Naive Bayesian classifier. In: 2020 IEEE International Conference on Communications Workshops (ICC Workshops), Dublin, Ireland (2020)

  18. Aamir, M., Ali Zaidi, S.M.: DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation. Int. J. Inf. Secur.18, 761–785 (2019)

    Article  Google Scholar 

  19. Samy, A., Yu, H., Zhang, H.: Fog-based attack detection framework for internet of things using deep learning. Data Min. Internet Things8, 74571–74585 (2020)

    Google Scholar 

  20. He, Z., Lee, R.B., Zhang, T.: Machine learning based DDoS attack detection from source side in cloud. In: IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), New York, NY, USA (2017)

  21. Raman, G.M.R., Somu, N., Kirthivasan, K., Liscano, R., Sriram, S.V.: An efficient intrusion detection system based on hypergraph—genetic algorithm for parameter optimization and feature selection in support vector machine. Knowl. Based Syst.134, 1–12 (2017)

    Article  Google Scholar 

  22. Abeshu, A., Chilamkurti, N.: Deep learning: the frontier for distributed attack detection in fog-to-things computing. IEEE Commun. Mag.56(2), 169–175 (2018)

    Article  Google Scholar 

  23. Singha, R., Kumar, H., Singla, R.: An intrusion detection system using network traffic profiling and online sequential extreme learning machine. Expert Syst. Appl.42(22), 8609–8624 (2015)

    Article  Google Scholar 

  24. Kuang, F., Xu, W., Zhang, S.: A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl. Soft Comput.18, 178–184 (2014)

    Article  Google Scholar 

  25. de la Hoz, E., Ortiz, A., Ortega, J., de la Hoz, E.: Network anomaly classification by support vector classifiers ensemble and non-linear projection techniques. In: International Conference on Hybrid Artificial Intelligence Systems HAIS 2013: Hybrid Artificial Intelligent Systems (2013)

  26. Gauthama Raman, M., Somu, N., Kirthivasan, K., Shankar Sriram, V.: A hypergraph and arithmetic residue-based probabilistic neural network for classification in intrusion detection systems. Neural Netw.92, 89–97 (2017)

    Article  Google Scholar 

  27. Tsang, C.-H., Kwong, S., Wang, H.: Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection. Pattern Recogn.40(9), 2373–2391 (2007)

    Article MATH  Google Scholar 

  28. Hosseini Bamakan, S.M., Wang, H., Yingjie, T., Shi, Y.: An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization. Neurocomputing199, 90–102 (2016)

    Article  Google Scholar 

  29. Ullah, A., Ullah , S.I., Salam, A.: Internal DoS attack detection and prevention in fog computing. In:International Conference on Information Technology (ICIT), Amman, Jordan (2021)

  30. Singh, J., Bello, Y., Hussein, A.R.: Hierarchical security paradigm for IoT multiaccess edge computing. IEEE Internet Things J.8(7), 5794–5805 (2021)

    Article  Google Scholar 

  31. Abdali, T.-A.N., Hassan, R., Mohd Aman, A.H.: Fog computing advancement: concept, architecture, applications, advantages, and open issues. IEEE Access9, 75961–75980 (2021)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Department of Computer Engineering, Pardis Branch, Islamic Azad University, Pardis, Iran

    Saeed Azizpour & MohammadReza Majma

Authors
  1. Saeed Azizpour

    You can also search for this author inPubMed Google Scholar

  2. MohammadReza Majma

    You can also search for this author inPubMed Google Scholar

Corresponding author

Correspondence toMohammadReza Majma.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Azizpour, S., Majma, M. NADA: new architecture for detecting DoS and DDoS attacks in fog computing.J Comput Virol Hack Tech19, 51–64 (2023). https://doi.org/10.1007/s11416-022-00431-4

Download citation

Keywords

Associated Content

Part of a collection:

ForSE

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Advertisement


[8]ページ先頭

©2009-2025 Movatter.jp