Abstract

The Internet of Things (IoT) represents a mean to share resources (memory, storage computational power, data, etc.) between computers and mobile devices, as well as buildings, wearable devices, electrical grids, and automobiles, just to name few. The IoT is leading to the development of advanced information services that will require large storage and computational power, as well as real-time processing capabilities. The integration of IoT with emerging technologies such as Fog Computing can complement these requirements with pervasive and cost-effective services capable of processing large-scale geo-distributed information. In any IoT application, communication availability is essential to deliver accurate and useful information, for instance, to take actions during dangerous situations, or to manage critical infrastructures. IoT components like gateways, also called Fog Nodes, face outstanding security challenges as the attack surface grows with the number of connected devices requesting communication services. These Fog nodes can be targeted by an attacker, preventing the nodes from delivering important information to the final users or to perform accurate automated actions. This paper introduces an Anomaly Behavior Analysis Methodology based on Artificial Neural Networks, to implement an adaptive Intrusion Detection System (IDS) capable of detecting when a Fog node has been compromised, and then take the required actions to ensure communication availability. The experimental results reveal that the proposed approach has the capability for characterizing the normal behavior of Fog Nodes despite its complexity due to the adaptive scheme, and also has the capability of detecting anomalies due to any kind of sources such as misuses, cyber-attacks or system glitches, with high detection rate and low false alarms.

Highlights

  • The growth in the use of mobile computing, social media technologies, cloud and pervasive computing, and the explosive growth and acceptance of Software as a Service (SaaS) has derived into the development of next-generation of Internet services that are pervasive and touch every aspect of modern life, as it is the case of the Internet of things

  • This use of Fog computing and Internet of Things (IoT) application has led to the growth of Smart Infrastructures, Smart Buildings and Smart Cities [3]–[5], it has led to an increase in attack surfaces that attackers can target to exploit vulnerabilities

  • The system is based on the Anomaly Behavior Analysis Methodology (ABA-Intrusion Detection System (IDS)) which is in turn powered by a cluster of Artificial Neural Networks

Read more

Summary

Introduction

The growth in the use of mobile computing, social media technologies, cloud and pervasive computing, and the explosive growth and acceptance of Software as a Service (SaaS) has derived into the development of next-generation of Internet services that are pervasive and touch every aspect of modern life, as it is the case of the Internet of things. INDEX TERMS Anomaly behavior, cyber security, fog computing, IoT, neural networks. J. Pacheco et al.: ANNs-Based IDS for IoT Fog Nodes attackers at a scale like never before.

Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call