Next Article in Journal
Modeling and Simulation of Magnetic Balance Current Sensor Based on Magnetic Scalar Potential Volume Integral
Previous Article in Journal
Adversarial Image Colorization Method Based on Semantic Optimization and Edge Preservation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Optimized Machine Learning-Based Intrusion Detection System for Fog and Edge Computing Environment

1
Prince Abdullah bin Ghazi Faculty of Information and Communication Technology, Al-Balqa Applied University, Al-Salt 19117, Jordan
2
Faculty of Engineering, Al-Balqa Applied University, Al-Salt 19117, Jordan
3
Faculty of Artificial Intelligence, Al-Balqa Applied University, Al-Salt 19117, Jordan
*
Authors to whom correspondence should be addressed.
Electronics 2022, 11(19), 3007; https://doi.org/10.3390/electronics11193007
Submission received: 25 August 2022 / Revised: 15 September 2022 / Accepted: 16 September 2022 / Published: 22 September 2022
(This article belongs to the Section Computer Science & Engineering)

Abstract

:
As a new paradigm, fog computing (FC) has several characteristics that set it apart from the cloud computing (CC) environment. Fog nodes and edge computing (EC) hosts have limited resources, exposing them to cyberattacks while processing large streams and sending them directly to the cloud. Intrusion detection systems (IDS) can be used to protect against cyberattacks in FC and EC environments, while the large-dimensional features in networking data make processing the massive amount of data difficult, causing lower intrusion detection efficiency. Feature selection is typically used to alleviate the curse of dimensionality and has no discernible effect on classification outcomes. This is the first study to present an Effective Seeker Optimization model in conjunction with a Machine Learning-Enabled Intrusion Detection System (ESOML-IDS) model for the FC and EC environments. The ESOML-IDS model primarily designs a new ESO-based feature selection (FS) approach to choose an optimal subset of features to identify the occurrence of intrusions in the FC and EC environment. We also applied a comprehensive learning particle swarm optimization (CLPSO) with Denoising Autoencoder (DAE) for the detection of intrusions. The development of the ESO algorithm for feature subset selection and the DAE algorithm for parameter optimization results in improved detection efficiency and effectiveness. The experimental results demonstrated the improved outcomes of the ESOML-IDS model over recent approaches.

1. Introduction

Due to the tremendous growth of smart devices, we are approaching the era of the Internet of Things (IoT) [1]. The IoT application requires geo-distribution, mobility support, low latency, and location awareness, all of which are difficult to implement in cloud computing (CC). Edge paradigms such as mobile edge computing (MEC) and fog computing (FC) are presented to overcome IoT implementation challenges [2,3,4]. The nodes, which can implement computing tasks, are named MEC hosts or fog nodes in MEC and FC hosts in MEC, which could offer lower-latency services.
MEC and FC are slightly different; MEC hosts are typically installed by mobile service providers, whereas FC is composed of an edge server or device with computing and communication power [5], and FC is composed of an edge server or device with computing and communication power. Researchers extended CC to the edge by analogizing the network system and various characteristics [6]. A new network model, such as MEC or FC, provokes several concerns regarding network performance and stability. Figure 1 depicts the structure of fog edge computing that is employed in MEC and FC.
The majority of terminal devices in MEC or FC are resource-constrained; the terminal connected to the MEC or FC hosts could be an unmanned aerial vehicle (UAV), a smart home appliance, a VR device, or a smartphone [7]. Man in the middle (MIM), denial of service (DoS), privacy leakage, service manipulation, and rogue gateway are all possible attacks on the FC system [8,9]. We focused on privacy protection as an effective method for detecting the presence of intruders, assisting in the combatting of security threats in FC structures, and reducing the resulting cybersecurity damages.
The intrusion detection system for fog and edge computing environments detects intruders in two ways: anomaly-based detection and signature-based detection, The normal behavior of the scheme is taken into account as a model in anomaly-based detection, which then examines the behavior of incoming traffic and categorizes it as either normal or abnormal based on the model that was built [10,11,12]. In contrast, signature-based detection compares incoming traffic to pre-established rules to determine whether to allow or reject it. In the past few years, there have been a variety of study articles developed in the area of intrusion detection systems for fog and edge computing environments [13,14]. Early research concentrated on supervised machine learning and unsupervised machine learning. There have also been attempts to implement advanced applications [15,16,17], such as a conventional detection method that allows the incorporation of the results of various classifications to effectively improve IDS performance.
This study introduces an Effective Seeker Optimization with Machine Learning-Enabled Intrusion Detection System (ESOML-IDS) model for FC and EC environments. The ESOML-IDS model intends to appropriately determine the existence of intrusions in the FC and EC environment. The ESOML-IDS model derives a novel ESO-based feature selection (FS) approach to choose an optimal subset of features. Moreover, comprehensive learning particle swarm optimization (CLPSO) with Denoising Autoencoder (DAE) is applied for the detection and classification of intrusions. In order to demonstrate the enhanced outcomes of the ESOML-IDS model, a wide range of simulations was carried out.

Contributions of This Study

The main contributions of this study are as follows:
  • We develop a new Effective Seeker Optimization with Machine Learning-Enabled Intrusion Detection System (ESOML-IDS) technique for intrusion detection and classification in FC and EC environments;
  • To detect and classify intrusions, a group of sub-processes are incorporated with the proposed technique, including pre-processing, ESO-based feature subset selection, a DAE classifier, and CLPSO-based parameter optimization;
  • To demonstrate the comparative advantages of the proposed technique over recent approaches, a wide variety of exhaustive simulations are carried out.
The rest of the paper is organized as follows. Section 2 surveys relevant research in this area of intrusion detection. Section 3 introduces the proposed model. Section 4 provides performance validation, showing the comparative advantages of applying the proposed techniques in terms of cost, accuracy, and comparative analysis. Finally, Section 5 concludes the paper.

2. Related Works

Lin et al. [18] presented a resource allocation and IDS architecture in edge computing. In particular, the presented method is developed to aid heterogeneous resource-demanding allocation and resource sharing. An edge computing IDS is introduced, and utilizing this approach is the foundation for resource allocation. Next, a single-layer dominant and max-min fair (SDMMF) allocation was employed. Li et al. [19] employed the game concept in the field of edge computing systems and recommended a data-driven mimicry ID game theory-based named GLIDE. The game income of participants and the utility computation method under distinct positioning approaches were analyzed. Wang et al. [20] presented an architecture for optimizing the smart false alarm reduction for DIDS-based edge computing devices. The proposed method could offer energy efficacy as the data could be treated at the edge for a short response time. The assessment result demonstrated that the architecture could assist in reducing the task for the central server and the delay in comparison with the comparative study.
Sudqi Khater et al. [21] presented a lightweight IDS-based vector space depiction with an MLP method. Next, they estimated the proposed method against the Australian Defense Force Academy Windows Dataset (ADFA-WD) and ADFA with Linux Dataset (ADFA-LD), which is a novel generation system dataset that comprises exploits and attacks on different applications. An et al. [22] presented a hypergraph clustering method based on the Apriori approach. Our study could efficiently determine the relationship among FC that is suffering from the threats of DDoS. Next, they verified that the resource consumption rate of the model could be efficiently promoted via DDoS analysis.
Mourad et al. [23] developed a vehicular edge computing (VEC) fog-assisted system that allows the offloading of IDS tasks to federated vehicle nodes situated within the Adhoc vehicular fog that is implemented with minimum latency. Abdel-Basset et al. [24] introduced a forensics-based DL (Deep-IFS) for identifying intrusions in IIoT traffic. The presented approach learns local representations with LocalGRU and presents an MHA to learn and capture global representations (with longer-range dependency). A residual connection among layers is developed for preventing data loss. Pacheco et al. [25] proposed an Anomaly Behavior Analysis Method based on ANN, to obtain an adaptive IDS that could be able to detect whether a fog node was compromised and also take proper action for ensuring transmission accessibility.

3. The Proposed Model

In this study, a novel ESOML-IDS approach was developed for intrusion detection and classification in FC and EC environments. The presented ESOML-IDS technique aimed to identify the occurrence of intrusions in the FC and EC environment. The ESOML-IDS technique encompasses a series of sub-processes such as pre-processing, ESO-based feature subset selection, a DAE classifier, and CLPSO-based parameter optimization.

3.1. Data Normalization

The z-score is a conventional standardized and normalized approach that signifies the number of standard deviations (SD). It normalizes the data set to the above-mentioned scale for converting every datum with a distinct scale to the default scale.
For normalizing the data utilizing the z-score, it can be subtracted the mean of populations in a rare data point and separated by the SD that offers a score ideally different amongst −3 and +3, thus reflecting that a point is several SDs above/below the mean, as calculated by Equation (1), where x signifies the value of the specific sample, μ stands for the mean and σ denotes the SD.
z _ s c o r e = x μ σ

3.2. Design of ESO-Based Feature Selection Technique

The elastic collision seeker optimization algorithm (ESOA) involved in [26] has been employed in our system for feature selection. The seeker optimization algorithm (SOA) implements an in-depth search simulating human search performance. The SOA is optimized as a search for the most optimal solution with a team of explorers in exploring space, using the search team as the population and the seeker as the task approach. Three significant upgrading stages are called ESOs.

3.2.1. Search Direction

The forward orientation of searching is determined as the experience gradient attained in the individual effort and the estimation of another individual searching a past place. The egoistic path f i . e ( t ) , altruistic path f i . a ( t ) , and preemptive path f i . p ( t ) of ith individual from some dimension are achieved.
f i . e ( t ) = p i , b e s t x i ( t ) f i . a ( t ) = g i , b e s t x i ( t ) f i . p ( t ) = x t 1 x t 2
The seeker utilizes the technique of an arbitrary weighted average for obtaining the search orientation.
f i ( t ) = s i g n ( ω f i . p ( t ) + ϕ 1 f i . e ( t ) + ϕ 2 f i . a ( t ) )
where t 1 , t 2 { t , t 1 , t 2 } ; x i ( t 1 ) and x i ( t 2 ) are the optimum benefits of x i ( t 2 ) , x i ( t 1 ) , x i ( t ) individually; g i , b e s t refers to the historical optimum place from the neighborhood, where the ith searching factor was placed; p i , b e s t represents the optimum locality in the ith searching factor to present locality; ψ 1 is an arbitrary number from zero to one, and ω implies the weight of inertia.

3.2.2. Search Step Size

The ESO represents the capability of fuzzy approximation reasoning. The technique adjusts to the best estimate of the objectively optimized problem when it expresses a simple fuzzy rule. Greater significance is associated with longer searching stages, whereas lower fitness corresponds to shorter searching stages. The Gaussian distribution function was adapted for describing the search step measurements.
μ ( a ) = e α 2 2 δ 2
where α and δ represent the parameters of membership functions. Based on Equation (4), the probability of a resultant variable above [ 3 δ , 3 δ ] is less than 0.0111. Thus, μ m i n = 0.0111 . However, for accelerating the convergence speed and attaining an optimum individual to take an undefined step size, μ m a x is fixed as 0.9.
μ ( i ) = μ m a x s I i s I ( μ m a x μ m i n ) , i = 1 , 2 , , s
μ i j = r a n d ( μ i ) , j = 1 , 2 , , D
where μ i j has been defined in Equations (5) and (6), I i refers to the number of sequences X ( t ) of the current individuals set in higher to lower function values, and the function refers to the real number from some partition [ μ i , 1 ] . It is realized that Equation (5) reflects the arbitrary search performance of human beings. The step measurement of j dimension searching the interspace is defined in the subsequent formula:
α i j = δ i j ln ( μ i j )
where δ i j refers to the parameter of the Gaussian distribution function that is demonstrated in Equations (8) and (9):
ω = i t e r m a x t i t e r m a x
δ i j = ω a b s ( x m i n x m a x )
where ω refers to the weight of inertia. While the evolutionary algebra improves, ω reduces linearly from 0.9 to 0.1. x m i n and x m a x , correspondingly, denote the variates of the minimal and maximal values of the function. Figure 2 depicts the flowchart of SOA.

3.2.3. Individual Location Updates

After obtaining the scout path and scout step measurement of individuals, the place upgrade is expressed as in Equation (10):
x i j ( t + 1 ) = x i j ( t ) + α i j ( t ) f i j ( t ) , i = 1 , 2 , s ; j = 1 , 2 , , D
i refers to the ith searching individual; j signifies the individual dimensional; f i j ( t ) and α i j ( t ) , correspondingly, represent the seekers’ path and searching step size at time t; and x i j ( t ) and x i j ( t + 1 ) , correspondingly, define the seekers’ site at time t and ( t + 1 ) .
The mathematical model of the ESO-FS approach was established. Usually, the classification (for instance, supervised learning) requires some datasets that are of size N S × N F , whereas N S signifies the count of samples and N F defines the count of features. The main function of the F S problem is selecting a subset of features S in the entire amount of features ( N F ), whereas the size of S is less than N F . It is attained by minimizing the subsequent main function:
F i t = λ × γ s + ( 1 λ ) × ( | S | N F )
where γ s implies the classifier error utilizing S and | S | as the count of chosen features. λ is utilized for balancing amongst ( | S | N F ) and γ s .

3.3. Process Involved in DAE-Based Classification

During the intrusion detection process, the chosen features are fed into the DAE model to classify intrusions [27]. DAE is dependent upon the AE. Noise (Gaussian noise usually, or setting the data to zero arbitrarily) is present in trained data, and AE is required to be learned for removing noise so as to obtain uncontaminated input data. In the case of corrupted input, the AE is defined further as a stable and suitable feature that establishes a further advanced description of the input data and improves the robustness of the total method. At this point, x is the primary input data, x 1 is the corrupted input data, y is the novel feature attained by the encoded x 1 , and z represents the outcome attained by the decoded y. The reconstructing error is calculated by Equation (12):
L D = | | x g ( f ( x 1 ) ) | | 2
The cost function is computed as:
J D ( W , b ) = 1 m i = 1 N ( 1 2 | | x i g ( f ( x 1 i ) ) | | 2 + λ 2 l = 1 2 i = 1 s l j = 1 s l + 1 ( W j i l ) 2 )
Generally, it is only required to arbitrarily fix the unit from x to zero based on the noise figure k ( k [ 0 , 1 ] ) ; afterward, x 1 is attained. This technique of resolving the parameters is similar to that of AE. Figure 3 displays the infrastructure of DAE.

3.4. Parameter Tuning Using CLPSO Algorithm

We used the CLPSO algorithm, developed by [28], to achieve optimal tuning of the parameters involved in the DAE model. PSO is a typical evolutionary computing approach stimulated in the analysis of the predation performance of birds; the basic concept of the PSO technique is sharing cooperation and data amongst individuals for finding the optimum solutions. The velocity signifies the speed and direction in which the particle moves. The position signifies the particle’s position. In order to process all the particles, only the individual optimum experience and the global optimum experience of the total swarm are learned. Assume x i = ( x i 1 , x i 2 , , x i D ) T and v i = ( v i 1 , v i 2 , , v i D ) T , which refer to the position and velocity of particle i i = { 1 , 2 , , N } , correspondingly, whereas D refers to the dimensions of the primary space and N represents the population size. Assume that p b e s t i = ( p b e s t i 1 , p b e s t i 2 , , p b e s t i D ) T and g b e s t = ( g b e s t 1 , g b e s t 2 , , g b e s t D ) T exist as the individual optimum place of particles i and the global optimum position of the entire swarm. The upgrade of velocity, as well as the position of particles, is computed by Equations (14) and (15):
v i d = w v i d + c 1 r a n d 1 ( 0 , 1 ) ( p b e s t i d x i d ) + c 2 r a n d 2 ( 0 , 1 ) ( g b e s t i d x i d )
x i d = x i d + v i d
where i = 1 , 2 , , N and d = 1 , 2 , , D . However, w refers to the inertia weight, c 1 and c 2 stand for the acceleration co-efficient, and r a n d 1 ( 0 , 1 ) and r a n d 2 ( 0 , 1 ) are uniform arbitrary numbers.
The CLPSO algorithm adapts the approach of comprehensive learning for selecting an object for learning, rather than learning by themselves, and the global optimum individual [28]. The velocity upgrading formula in CLPSO is determined as:
v i d = w v i d + c 1 r a n d 1 ( 0 , 1 ) ( p b e s t f i d x i d )
where f i determines that particle p b e s t s is the particle that i must follow, and r a n d ( 0 , 1 ) [ 0 , 1 ] refers to a uniform arbitrary number. The CLPSO allocates the learning probability P c i to all the particles i utilizing the subsequent formula:
P c i = 0.05 + 0.45 e x p ( 10 ( i 1 ) / N 1 ) 1 e x p ( 10 ) 1
In order to obtain all the solutions x i , it is learned from several particles rather than only two particles. All the components of particles i learn by themselves or by another particle depending upon learning probability P c i . Arbitrary components of particles i will learn from another particle when all their elements learn by themselves. The superior fitness value of a solution is the superior possibility in which a particle is learned.
The CPSO technique is used for determining F F with the objective of minimizing the classifier error rate, as provided below. The solution with the minimum classifier error rate is assumed as a better solution.
f i t n e s s ( x i ) = C l a s s i f i e r E r r o r R a t e ( x i ) = N u m b e r o f m i s c l a s s i f i e d i n s t a n c e s T o t a l n u m b e r o f i n s t a n c e s 100

4. Empirical Results and Validation

This section discusses the effectiveness of applying the ECSOML-IDS technique to detect and classify intrusions under several varieties of FS methods and class labels. It demonstrates and validates the enhanced outcomes of employing the ECSOML-IDS technique in terms of a wide set of accuracy metrics. Thus, the experimental work of this manuscript, together with the cost and performance analysis, is described below.

4.1. Cost Analysis

The UNSW-NB15 datasets are used for experimental validation because they have significant potential for attack pattern recognition and analysis, as well as being effective in enhancing the effectiveness of intrusion classifiers. In contrast to NSL-KDD and KDD-CUP’99, Zhang et al. [28] claim that the UNSW-NB15 dataset better simulates the current network traffic environment; the dataset holds a set of 42 features, including 3 categorical and 39 numeric features. Table 1 and Figure 4 report the FS outcomes of the ESO-FS and other FS techniques in terms of the number of features chosen and best cost (BC).
The results indicated that the GWO-FS model showcased worse FS outcomes with a BC of 0.947, whereas the ACO-FS technique obtained a slightly enhanced BC of 0.268. At the same time, the GSO-FS technique has resulted in a reasonable BC of 0.2194. However, the ESO-FS technique has displayed enhanced FS outcomes with the choice of 12 features and a BC of 0.1468.

4.2. Performance Measures and Analysis

In this subsection, the impact of accuracy derived from utilizing the ECSOML-IDS technique, for different numbers of epochs, and label classes, is examined. Several performance metrics have been discussed in [*] for evaluating the effectiveness and quantifying errors resulting from using certain class types with a distinct number of epochs. In this paper, for performance validation purposes, several accuracy metrics have been used, such as training accuracy, validation accuracy, testing accuracy, precision, recall, and F1 score, which are denoted by t r a c c u , v a l a c c u , t e s t a c c u , p r e c n , r e c a l , and F s c o r e , respectively. Generally, classification accuracy is the ratio of the number of correct predictions to the total number of input samples.
A c c u r a c y = N u m b e r o f c o r r e c t p r e d i c t i o n s T o t a l n u m b e r o f p r e d i c t i o n s m a d e
Moreover, the precision metric reflects the proportion of positive identifications that was actually correct. Therefore, precision is computed as follows:
P r e c i s i o n = T P T P + F P
Meanwhile, the recall is the fraction of relevant instances that were retrieved. The recall can be mathematically defined as:
R e c a l l = T P T P + F N
where TP, FP, and FN are True Positive, False Positive, and False Negative outcomes, respectively. Moreover, the F1-score is the traditional F-measure or balanced F score F1-score) and is defined as the harmonic mean of precision and obtained as:
F 1 S c o r e = 2 P r e c i s i o n R e c a l l P r e c i s i o n + R e c a l l = T P T P + 1 / 2 ( F P + F N )
Table 2 and Figure 5 portray the classification outcomes of the ESOML-IDS model under 1000 epochs and distinct classes. The results indicated that the ESOML-IDS model resulted in effective outcomes under every class. For instance, with a normal class, the ESOML-IDS model has obtained t r a c c u , v a l a c c u , t e s t a c c u , p r e c n , r e c a l , and F s c o r e of 83.38%, 83.56%, 78.22%, 82.72%, 81.50%, and 80.59% respectively. At the same time, with the DoS class, the ESOML-IDS model has obtained t r a c c u , v a l a c c u , t e s t a c c u , p r e c n , r e c a l , and F s c o r e of 83.14%, 83.50%, 80.18%, 82.10%, 83.47%, and 81.99%, correspondingly. Moreover, with the generic class, the ESOML-IDS system has obtained t r a c c u , v a l a c c u , t e s t a c c u , p r e c n , r e c a l , and F s c o r e of 82.46%, 82.88%, 80.43%, 82.08%, 81.21%, and 80.87%, correspondingly.
Furthermore, with the shellcode class, the ESOML-IDS method has obtained t r a c c u , v a l a c c u , t e s t a c c u , p r e c n , r e c a l , and F s c o r e of 83.52%, 81.65%, 77.33%, 82.88%, 82.82%, and 80.34%, respectively. Eventually, with the worms class, the ESOML-IDS approach has obtained t r a c c u , v a l a c c u , t e s t a c c u , p r e c n , r e c a l , and F s c o r e of 81.17%, 82.49%, 78.24%, 81.51%, 81.74%, and 81.26%, correspondingly.
The accuracy outcome analysis of the ESOML-IDS approach on test data is exhibited in Figure 6. The results demonstrated that the ESOML-IDS technique achieved improved validation accuracy related to training accuracy. It is also observable that the accuracy values become saturated with the epoch count of 1000.
The loss outcome analysis of the ESOML-IDS system on test data is demonstrated in Figure 7. The figure shows that the ESOML-IDS technique offers reduced validation loss in terms of training loss. It is additionally noticed that the loss values become saturated with an epoch count of 1000.
Table 3 and Figure 8 portray the classification outcomes of the ESOML-IDS algorithm under 2000 epochs and distinct classes. The results indicated that the ESOML-IDS model resulted in effective outcomes under every class. For example, with the normal class, the ESOML-IDS technique has obtained t r a c c u , v a l a c c u , t e s t a c c u , p r e c n , r e c a l , and F s c o r e of 81.54%, 82.64%, 83.02%, 81.92%, 83.49%, and 82.18%, correspondingly. Simultaneously, with the DoS class, the ESOML-IDS approach has obtained t r a c c u , v a l a c c u , t e s t a c c u , p r e c n , r e c a l , and F s c o r e of 82.72%, 83.10%, 84.78%, 83.08%, 81.46%, and 83.82%, respectively. Moreover, with the generic class, the ESOML-IDS methodology has obtained t r a c c u , v a l a c c u , t e s t a c c u , p r e c n , r e c a l , and F s c o r e of 83.80%, 81.09%, 83.92%, 82.29%, 83.19%, and 83.97%, respectively. Moreover, with the shellcode class, the ESOML-IDS model has obtained t r a c c u , v a l a c c u , t e s t a c c u , p r e c n , r e c a l , and F s c o r e of 83.42%, 81.37%, 83.29%, 83.35%, 82.15%, and 82.55%, correspondingly. At last, with the worms class, the ESOML-IDS model has obtained t r a c c u , v a l a c c u , t e s t a c c u , p r e c n , r e c a l , and F s c o r e of 82.64%, 83.59%, 82.82%, 82.74%, 82.68%, and 83.75%, correspondingly.
The accuracy outcome analysis of the ESOML-IDS approach on test data is showcased in Figure 9. The results demonstrated that the ESOML-IDS technique achieved improved validation accuracy related to training accuracy. It can be also observed that the accuracy values become saturated with the epoch count of 2000. The loss outcome analysis of the ESOML-IDS technique on test data is displayed in Figure 10. The figure reveals that the ESOML-IDS system resulted in reduced validation loss in terms of the training loss. It is additionally noticed that the loss values become saturated with an epoch count of 2000.
Table 4 and Figure 11 provide a comparative study of the DAE-IDS technique with existing techniques in terms of distinct measures. The results indicated that the SVM technique gained ineffective results, with a c c u y of 0.6109, p r e c n of 0.4747, r e c a l of 0.6200, and F 1 s c o r e of 0.5377. In line with, the LR technique offered somewhat increased outcomes, with a c c u y of 0.6553, p r e c n of 0.7691, r e c a l of 0.6554, and F 1 s c o r e of 0.6662. Then, the DT technique yielded moderate results, with a c c u y of 0.6603, p r e c n of 0.7982, r e c a l of 0.6604, and F 1 s c o r e of 0.5112. Although the ANN and KNN techniques achieved reasonable classification results, the DAE-IDS technique showed enhanced performance, with a c c u y of 0.7834, p r e c n of 0.8010, r e c a l of 0.7786, and F 1 s c o r e of 0.7946.
Table 5 and Figure 12 provide a comparative study of the ESOML-IDS model with existing models in terms of distinct measures. The results indicated that the SVM approach yielded ineffectual results, with a c c u y of 0.6153, p r e c n of 0.5395, r e c a l of 0.6152, and F 1 s c o r e of 0.5131. Likewise, the LR system offered slightly increased outcomes, with a c c u y of 0.6529, p r e c n of 0.7088, r e c a l of 0.6529, and F 1 s c o r e of 0.6569.
Then, the DT approach yielded moderate results, with a c c u y of 0.6757, p r e c n of 0.7966, r e c a l of 0.6756, and F 1 s c o r e of 0.6926. Afterward, the ANN and KNN models reached reasonable classification results, and the ESOML-IDS method accomplished enhanced performance, with a c c u y of 0.8309, p r e c n of 0.8248, r e c a l of 0.8250, and F 1 s c o r e of 0.8308. After examining the above-mentioned tables and figures, it is apparent that the presented model achieved superior intrusion detection outcomes over the other techniques.

5. Conclusions

For intrusion detection and classification in FC and EC environments, a new ESOML-IDS technique has been developed in this manuscript, aiming to identify the occurrence of intrusions. The ESOML-IDS technique consists of a series of sub-processes including pre-processing, ESO-based feature subset selection, a DAE classifier, and CLPSO-based parameter optimization. For improving the detection efficiency in the aforementioned environments, the ESO algorithm for feature subset selection and DAE for parameter optimization have been utilized. Additionally, to demonstrate the enhanced outcomes of the ESOML-IDS model, a wide variety of empirical experiments with exhaustive simulations were carried out. The experimental results reported the enhanced outcomes of the ESOML-IDS model over the recent approaches, showing the superiority of the proposed technique in terms of accuracy, precision, recall, and F1 score. We believe that the proposed technique can be used to extract manifold benefits with a minimal loss in accuracy for detecting intrusions in FC and EC environments.

Author Contributions

All the authors contributed to the study’s conception and design. Material preparation, data collection, and analysis were performed by O.A.A., J.A.A., and M.A. The first draft of the manuscript was written by A.A. (Adnan Alrabea), A.A. (Albara Awajan), and I.Q. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Deanship of Scientific Research and Innovation at Al-Balqa Applied University, Al-Salt, Jordan. Grant Number: DSR-2021#380.

Data Availability Statement

The datasets analyzed during this study are available from the corresponding author upon reasonable request.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Khater, B.S.; Wahab, A.W.A.; Idris, M.Y.I.; Hussain, M.A.; Ibrahim, A.A.; Amin, M.A.; Shehadeh, H.A. Classifier performance evaluation for lightweight ids using fog computing in iot security. Electronics 2021, 10, 1633. [Google Scholar] [CrossRef]
  2. Onah, J.O.; Abdulhamid, S.M.; Abdullahi, M.; Hassan, I.H.; Al-Ghusham, A. Genetic algorithm based feature selection and naïve bayes for anomaly detection in fog computing environment. Mach. Learn. Appl. 2021, 6, 100156. [Google Scholar] [CrossRef]
  3. Kumar, P.; Kumar, R.; Gupta, G.P.; Tripathi, R. A distributed framework for detecting ddos attacks in smart contract-based blockchain-iot systems by leveraging fog computing. Trans. Emerg. Telecommun. Technol. 2021, 32, e4112. [Google Scholar] [CrossRef]
  4. Alzubi, O.A.; Qiqieh, I.; Alzubi, J.A. Fusion of deep learning based cyberattack detection and classification model for intelligent systems. Clust. Comput. 2022, 1–12, in press. [Google Scholar] [CrossRef]
  5. Zwayed, F.A.; Anbar, M.; Sanjalawe, Y.; Manickam, S. Intrusion detection systems in fog computing- a review. In Advances in Cyber Security; Abdullah, N., Manickam, S., Anbar, M., Eds.; Springer: Singapore, 2021; pp. 481–504. [Google Scholar]
  6. Aliyu, F.; Sheltami, T.; Shakshuki, E.M. A detection and prevention technique for man in the middle attack in fog computing. Procedia Comput. Sci. 2018, 141, 24–31. [Google Scholar] [CrossRef]
  7. Alrawais, A.; Alhothaily, A.; Hu, C.; Cheng, X. Fog computing for the internet of things: Security and privacy issues. IEEE Internet Comput. 2017, 21, 34–42. [Google Scholar] [CrossRef]
  8. Gao, J.; Chai, S.; Zhang, B.; Xia, Y. Research on network intrusion detection based on incremental extreme learning machine and adaptive principal component analysis. Energies 2019, 12, 1223. [Google Scholar] [CrossRef]
  9. Alzubi, O.A.; Alzubi, J.A.; Al-Zoubi, A.M.; Hassonah, M.A.; Kose, U. An efficient malware detection approach with feature weighting based on harris hawks optimization. Clust. Comput. 2022, 25, 2369–2387. [Google Scholar] [CrossRef]
  10. Zong, W.; Chow, Y.-W.; Susilo, W. A two-stage classifier approach for network intrusion detection. In Information Security Practice and Experience; Su, C., Kikuchi, H., Eds.; Springer International Publishing: Cham, Switzerland, 2018; pp. 329–340. [Google Scholar]
  11. Alzubi, O.A.; Alzubi, J.A.; Shankar, K.; Gupta, D. Blockchain and artificial intelligence enabled privacy-preserving medical data transmission in internet of things. Trans. Emerg. Telecommun. Technol. 2021, 32, e4360. [Google Scholar] [CrossRef]
  12. Alazab, M.; Khurma, R.A.; Awajan, A.; Camacho, D. A new intrusion detection system based on moth–flame optimizer algorithm. Expert Syst. Appl. 2022, 210, 118439. [Google Scholar] [CrossRef]
  13. Alzubi, O.A. Quantum readout and gradient deep learning model for secure and sustainable data access in iwsn. PeerJ Comput. Sci. 2022, 8, e983–e1007. [Google Scholar] [CrossRef]
  14. Alazab, M.; Layton, R.; Broadhurst, R.; Bouhours, B. Malicious spam emails developments and authorship attribution. In Proceedings of the 2013 Fourth Cybercrime and Trustworthy Computing Workshop, Sydney, Australia, 21–22 November 2013; IEEE: Minneapolis, MN, USA, 2013; pp. 58–68. [Google Scholar]
  15. Kumar, V.; Sinha, D.; Das, A.K.; Pandey, S.C.; Goswami, R.T. An integrated rule based intrusion detection system: Analysis on unsw-nb15 data set and the real time online dataset. Clust. Comput. 2019, 23, 1397–1418. [Google Scholar] [CrossRef]
  16. Alzubi, O.A. A deep learning- based frechet and dirichlet model for intrusion detection in iwsn. J. Intell. Fuzzy Syst. 2022, 42, 873–883. [Google Scholar] [CrossRef]
  17. Chen, T.M.; Blasco, J.; Alzubi, J.; Alzubi, O. Intrusion detection. Eng. Technol. Ref. 2014, 1, 1–9. [Google Scholar] [CrossRef]
  18. Lin, F.; Zhou, Y.; An, X.; You, I.; Choo, K.-K.R. Fair resource allocation in an intrusion-detection system for edge computing: Ensuring the security of internet of things devices. IEEE Consum. Electron. Mag. 2018, 7, 45–50. [Google Scholar] [CrossRef]
  19. Li, Q.; Hou, J.; Meng, S.; Long, H. Glide: A game theory and data-driven mimicking linkage intrusion detection for edge computing networks. Complex 2020, 2020, 7136160:1–7136160:18. [Google Scholar] [CrossRef]
  20. Wang, Y.; Meng, W.; Li, W.; Liu, Z.; Liu, Y.; Xue, H. Adaptive machine learning-based alarm reduction via edge computing for distributed intrusion detection systems. Concurr. Comput. Pract. Exp. 2019, 31, e5101. [Google Scholar] [CrossRef]
  21. Khater, B.S.; Wahab, A.W.B.A.; Idris, M.Y.I.B.; Hussain, M.A.; Ibrahim, A.A. A lightweight perceptron-based intrusion detection system for fog computing. Appl. Sci. 2019, 9, 178. [Google Scholar] [CrossRef]
  22. An, X.; Su, J.; Lü, X.; Lin, F. Hypergraph clustering model-based association analysis of ddos attacks in fog computing intrusion detection system. EURASIP J. Wirel. Commun. Netw. 2018, 2018, 249–259. [Google Scholar] [CrossRef]
  23. Mourad, A.; Tout, H.; Wahab, O.A.; Otrok, H.; Dbouk, T. Ad hoc vehicular fog enabling cooperative low-latency intrusion detection. IEEE Internet Things J. 2021, 8, 829–843. [Google Scholar] [CrossRef]
  24. Abdel-Basset, M.; Chang, V.; Hawash, H.; Chakrabortty, R.K.; Ryan, M. Deep-ifs: Intrusion detection approach for industrial internet of things traffic in fog environment. IEEE Trans. Ind. Inform. 2021, 17, 7704–7715. [Google Scholar] [CrossRef]
  25. Pacheco, J.; Benitez, V.H.; Félix-Herrán, L.C.; Satam, P. Artificial neural networks-based intrusion detection system for internet of things fog nodes. IEEE Access 2020, 8, 73907–73918. [Google Scholar] [CrossRef]
  26. Duan, S.; Luo, H.; Liu, H. An elastic collision seeker optimization algorithm for optimization constrained engineering problems. Math. Probl. Eng. 2022, 2022, 1344667. [Google Scholar] [CrossRef]
  27. Liang, P.; Shi, W.; Zhang, X. Remote sensing image classification based on stacked denoising autoencoder. Remote. Sens. 2017, 10, 16. [Google Scholar] [CrossRef]
  28. Ji, Y.; Zhao, X.; Hao, J. A novel uav path planning algorithm based on double-dynamic biogeography-based learning particle swarm optimization. Mob. Inf. Syst. 2022, 2022, 8519708. [Google Scholar] [CrossRef]
Figure 1. Fog edge computing.
Figure 1. Fog edge computing.
Electronics 11 03007 g001
Figure 2. Flowchart of SOA.
Figure 2. Flowchart of SOA.
Electronics 11 03007 g002
Figure 3. DAE structure.
Figure 3. DAE structure.
Electronics 11 03007 g003
Figure 4. Best cost analysis of ESO-FS technique.
Figure 4. Best cost analysis of ESO-FS technique.
Electronics 11 03007 g004
Figure 5. Result analysis of ESOML-IDS technique under 1000 epochs and distinct classes.
Figure 5. Result analysis of ESOML-IDS technique under 1000 epochs and distinct classes.
Electronics 11 03007 g005
Figure 6. Accuracy analysis of ESOML-IDS technique under 1000 epochs.
Figure 6. Accuracy analysis of ESOML-IDS technique under 1000 epochs.
Electronics 11 03007 g006
Figure 7. Loss analysis of ESOML-IDS technique under 1000 epochs.
Figure 7. Loss analysis of ESOML-IDS technique under 1000 epochs.
Electronics 11 03007 g007
Figure 8. Result analysis of ESOML-IDS technique under 2000 epochs and distinct classes.
Figure 8. Result analysis of ESOML-IDS technique under 2000 epochs and distinct classes.
Electronics 11 03007 g008
Figure 9. Accuracy analysis of ESOML-IDS technique under 2000 epochs.
Figure 9. Accuracy analysis of ESOML-IDS technique under 2000 epochs.
Electronics 11 03007 g009
Figure 10. Loss analysis of ESOML-IDS technique under 2000 epochs.
Figure 10. Loss analysis of ESOML-IDS technique under 2000 epochs.
Electronics 11 03007 g010
Figure 11. Comparative analysis of DAE-IDS technique without feature selection.
Figure 11. Comparative analysis of DAE-IDS technique without feature selection.
Electronics 11 03007 g011
Figure 12. Comparative analysis of DAE-IDS technique with feature selection.
Figure 12. Comparative analysis of DAE-IDS technique with feature selection.
Electronics 11 03007 g012
Table 1. FS analysis of ESO-FS technique.
Table 1. FS analysis of ESO-FS technique.
MethodsNo. of Features SelectedBest Cost
ESO-FS120.1468
GSO-FS160.2194
ACO-FS180.2681
GWO-FS240.2947
Table 2. Result analysis of ESOML-IDS technique under 1000 epochs and distinct classes.
Table 2. Result analysis of ESOML-IDS technique under 1000 epochs and distinct classes.
Epoch-1000
Class LabelsTraining AccuracyValidation AccuracyTest AccuracyPrecisionRecallF1-Score
Normal83.3883.5678.2282.7281.5080.59
DoS83.1483.5080.1882.1083.4781.99
Backdoor83.8681.7580.3282.4582.0282.89
Exploits83.0383.5678.3283.2181.2883.98
Analysis83.0782.2477.9281.5981.9980.63
Generic282.4682.8880.4382.0881.2180.87
Fuzzers81.3281.9077.4181.6881.4280.40
Shellcode83.5281.6577.3382.8882.8280.34
Reconnaissance83.2583.4177.3882.9782.4480.34
Worms81.1782.4978.2481.5181.7481.26
Average82.8282.6978.5882.3281.9981.33
Table 3. Result analysis of ESOML-IDS technique under 2000 epochs and distinct classes.
Table 3. Result analysis of ESOML-IDS technique under 2000 epochs and distinct classes.
Epoch-2000
Class LabelsTraining AccuracyValidation AccuracyTest AccuracyPrecisionRecallF1-Score
Normal81.5482.6483.0281.9283.4982.18
DoS82.7283.1084.7883.0881.4683.82
Backdoor81.6382.7382.1181.4783.0581.69
Exploits82.8683.7083.2483.1082.8282.39
Analysis83.1583.0184.9382.9581.6583.46
Generic 83.8081.0983.9282.2983.1983.97
Fuzzers 82.1282.8581.2981.6481.5383.92
Shellcode83.4281.3783.2983.3582.1582.55
Reconnaissance83.3782.1781.5182.2982.9583.04
Worms82.6483.5982.8282.7482.6883.75
Average82.7382.6383.0982.4882.5083.08
Table 4. Comparative analysis of DAE-IDS technique without feature selection.
Table 4. Comparative analysis of DAE-IDS technique without feature selection.
MethodsAccuracyPrecisionRecallF1 Score
ANN Model0.75620.79920.75610.7658
LR Model0.65530.76910.65540.6662
kNN Model0.70090.75790.70210.7203
SVM Model0.61090.47470.62000.5377
Decision Tree Algorithm0.66030.79820.66040.5112
DAE-IDS0.78340.80100.77860.7946
Table 5. Comparative analysis of DAE-IDS technique with feature selection.
Table 5. Comparative analysis of DAE-IDS technique with feature selection.
MethodsAccuracyPrecisionRecallF1 Score
ANN Model0.77510.79500.77530.7728
LR Model0.65290.70880.65290.6596
kNN Model0.72300.77240.72300.7381
SVM Model0.61530.53950.61520.5131
Decision Tree Algorithm0.67570.79660.67560.6926
ESOML-IDS0.83090.82480.82500.8308
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Alzubi, O.A.; Alzubi, J.A.; Alazab, M.; Alrabea, A.; Awajan, A.; Qiqieh, I. Optimized Machine Learning-Based Intrusion Detection System for Fog and Edge Computing Environment. Electronics 2022, 11, 3007. https://doi.org/10.3390/electronics11193007

AMA Style

Alzubi OA, Alzubi JA, Alazab M, Alrabea A, Awajan A, Qiqieh I. Optimized Machine Learning-Based Intrusion Detection System for Fog and Edge Computing Environment. Electronics. 2022; 11(19):3007. https://doi.org/10.3390/electronics11193007

Chicago/Turabian Style

Alzubi, Omar A., Jafar A. Alzubi, Moutaz Alazab, Adnan Alrabea, Albara Awajan, and Issa Qiqieh. 2022. "Optimized Machine Learning-Based Intrusion Detection System for Fog and Edge Computing Environment" Electronics 11, no. 19: 3007. https://doi.org/10.3390/electronics11193007

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop