373Accesses
Abstract
Nowadays, fog computing as a new part of the Internet of Things plays a vital and significant role in the development of technology in cities and smart homes, various industries, medical care, security and etc. This technology, like other emerging technologies, has security challenges. One of the most important attacks on fog nodes is the DoS and DDoS attacks. This article proposes new method for DoS and DDoS attack detection by combining machine learning techniques, DT and KNN with CNN algorithm. We have improved the performance of the intrusion detection systems in the Fog computing infrastructure by voting mechanism for DoS and DDoS detection. NADA is capable of detecting DoS and DDoS attacks with highest correct rate (about 99%). NADA can be applied in both edge and fog nodes. The proposed approach uses deep learning techniques and biological genetic algorithm for detecting suspicious traffic. Then the suspicious traffic applies to CNN, DT, and KNN as an input and based on the available samples, maximum vote-based attack detection validation is performed. Finally, we evaluated our method (NADA) and calculate criteria such as Precision, Accuracy, Recall, and Error. By simulating NADA, we observed that metrics cited improved on average by about 7% in comparison with other methods.
This is a preview of subscription content,log in via an institution to check access.
Access this article
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
Price includes VAT (Japan)
Instant access to the full article PDF.















Similar content being viewed by others
Notes
Denial of Service.
Distributed Denial of Service.
Transmission Control Protocol.
Internet of Things.
Virtual Private Network.
Artificial Neural Network.
K-Nearest-Neighbor.
Support vector machine.
Convolutional neural network.
Radial basis function.
References
Delfin, S., Raj, S.N., Anand, A.: Fog computing: a new era of cloud computing. In: 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC), Erode, India (2019)
Abdulkareem, K.H., Mohammed, M.A., Gunasekaran, S.S., Al-Mhiqani, M.N.: A review of fog computing and machine learning: concepts, applications, challenges, and open issues. IEEE Access7, 153123–153140 (2019)
Zheng, X., Wu, W., Rong, C., Zhang T.: Fog computing: concept, applications and future. In: International Conference on Cloud Computing, Big Data and Blockchain (ICCBB), Fuzhou, China (2018)
Jianbing, N., Kuan, Z., Xiaodong, L., Xuemin, S.: Securing fog computing for internet of things applications: challenges and solutions. IEEE Commun. Surv. Tutor.20(1), 601–628 (2018)
Parikh, S., Dave, D., Patel, R., Doshi, N.: Security and privacy issues in cloud, fog and edge computing. Procedia Comput. Sci.160, 734–739 (2019)
Alrashdi, I., Alqazzaz, A., Alharthi, R., Aloufi, E., Zohdy, M.A., Ming, H.: FBAD: fog-based attack detection for IoT healthcare in smart cities. In: 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York City, NY, USA (2019)
Mukherjee, M., Ferrag, M.A., Leandros, M., Abdelouahid, D., Aazam, M.: Security and privacy issues and solutions for fog, Y. Yang , J. Huang, T. Zhang and J. Weinman, Eds., Wiley Telecom, pp. 353–374 (2020)
Paharia, B., Bhushan, K.: Fog computing as a defensive approach against distributed denial of service (DDoS): a proposed architecture. In: International Conference on Computing, Communication and Networking Technologies (ICCCNT), Bangalore, India (2018)
Alharbi, S., Rodriguez, P., Maharaja, R., Iyer, P., Subaschandrabose, N.: Secure the internet of things with challenge response authentication in fog computing. In: IEEE 36th International Performance Computing and Communications Conference (IPCCC), San Diego, CA, USA (2017)
Huang, B., Cheng, X., Cao, Y., Zhang, L.: Lightweight hardware based secure authentication scheme for fog computing. In: 2018 IEEE/ACM Symposium on Edge Computing (SEC), Seattle, WA, USA (2018)
National Institute of Technology Kurakshetra, D., Bhushan, K.: DDoS attack mitigation and resource provisioning in cloud using fog computing. In: International Conference On Smart Technologies For Smart Nation (SmartTechCon), Bangalore, India (2017)
Deepali, Bhushan, K.: DDoS attack defense framework for cloud using fog computing. In: 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), Bangalore, India (2017)
Potluri, S., Mangla, M., Satpathy, S., Mohanty, S.N.: Detection and prevention mechanisms for DDoS attack in cloud computing environment. In: 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kharagpur, India (2020)
Singh, J., Bello, Y., Hussein, A.R.: Hierarchical security paradigm for IoT multiaccess edge computing. IEEE Internet Things J.8(7), 5794–5805 (2020)
Gaurav, A., Hsu, C.-H., Gupta, B.B., Yamaguchi, S.: Fog layer-based DDoS attack detection approach for internet-of-things (IoTs) devices. In: IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA (2021)
Sicari, S., Rizzardi, A., Miorandi, D., Porisini, A.: REATO: reacting to denial of service attacks in the internet of things. Comput. Netw.137, 37–48 (2018)
Singh, S., Kumari, K., Gupta, S., Dua, A., Kumar, N.: Detecting different attack instances of DDoS vulnerabilities on edge network of fog computing using Gaussian Naive Bayesian classifier. In: 2020 IEEE International Conference on Communications Workshops (ICC Workshops), Dublin, Ireland (2020)
Aamir, M., Ali Zaidi, S.M.: DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation. Int. J. Inf. Secur.18, 761–785 (2019)
Samy, A., Yu, H., Zhang, H.: Fog-based attack detection framework for internet of things using deep learning. Data Min. Internet Things8, 74571–74585 (2020)
He, Z., Lee, R.B., Zhang, T.: Machine learning based DDoS attack detection from source side in cloud. In: IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), New York, NY, USA (2017)
Raman, G.M.R., Somu, N., Kirthivasan, K., Liscano, R., Sriram, S.V.: An efficient intrusion detection system based on hypergraph—genetic algorithm for parameter optimization and feature selection in support vector machine. Knowl. Based Syst.134, 1–12 (2017)
Abeshu, A., Chilamkurti, N.: Deep learning: the frontier for distributed attack detection in fog-to-things computing. IEEE Commun. Mag.56(2), 169–175 (2018)
Singha, R., Kumar, H., Singla, R.: An intrusion detection system using network traffic profiling and online sequential extreme learning machine. Expert Syst. Appl.42(22), 8609–8624 (2015)
Kuang, F., Xu, W., Zhang, S.: A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl. Soft Comput.18, 178–184 (2014)
de la Hoz, E., Ortiz, A., Ortega, J., de la Hoz, E.: Network anomaly classification by support vector classifiers ensemble and non-linear projection techniques. In: International Conference on Hybrid Artificial Intelligence Systems HAIS 2013: Hybrid Artificial Intelligent Systems (2013)
Gauthama Raman, M., Somu, N., Kirthivasan, K., Shankar Sriram, V.: A hypergraph and arithmetic residue-based probabilistic neural network for classification in intrusion detection systems. Neural Netw.92, 89–97 (2017)
Tsang, C.-H., Kwong, S., Wang, H.: Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection. Pattern Recogn.40(9), 2373–2391 (2007)
Hosseini Bamakan, S.M., Wang, H., Yingjie, T., Shi, Y.: An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization. Neurocomputing199, 90–102 (2016)
Ullah, A., Ullah , S.I., Salam, A.: Internal DoS attack detection and prevention in fog computing. In:International Conference on Information Technology (ICIT), Amman, Jordan (2021)
Singh, J., Bello, Y., Hussein, A.R.: Hierarchical security paradigm for IoT multiaccess edge computing. IEEE Internet Things J.8(7), 5794–5805 (2021)
Abdali, T.-A.N., Hassan, R., Mohd Aman, A.H.: Fog computing advancement: concept, architecture, applications, advantages, and open issues. IEEE Access9, 75961–75980 (2021)
Author information
Authors and Affiliations
Department of Computer Engineering, Pardis Branch, Islamic Azad University, Pardis, Iran
Saeed Azizpour & MohammadReza Majma
- Saeed Azizpour
You can also search for this author inPubMed Google Scholar
- MohammadReza Majma
You can also search for this author inPubMed Google Scholar
Corresponding author
Correspondence toMohammadReza Majma.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Azizpour, S., Majma, M. NADA: new architecture for detecting DoS and DDoS attacks in fog computing.J Comput Virol Hack Tech19, 51–64 (2023). https://doi.org/10.1007/s11416-022-00431-4
Received:
Accepted:
Published:
Issue Date:
Share this article
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative