Anomaly Detection for IOT/Cloud-Based Model in Fog Computing Using Machine Learning
Keywords:Fog Computing, Cloud Computing, Internet Of Things, Intrusion Detection, Anomaly Detection
We know that the key technologies that are involved in the Internet of Things are wireless sensor networks and cloud computing, big data, embedded systems, and the internet. It is a giant network with connected devices. These devices gather and share data. But many IoT devices have poor security and cybercriminals are taking benefit of this. The two techniques cloud and fog computing both combined can be used to transfer secure data in IoT devices as cloud computing provides storage of data on cloud servers and fog computing offers us various services to access data and provides support for cloud servers. This research work presents various techniques to detect an intruder and anomaly detection in IoT-based cloud systems. Also, a comparison of all the techniques used to detect intruders and anomalies are compared on various parameters like accuracy, performance, efficiency, precision, recall, the detection rate.
J. P. Anderson, “Computer security threat monitoring and surveillance,” Tech. Rep. James P Anderson Co Fort Washingt. Pa, p. 56, 1980, doi: citeulike-article-id:592588.
R. Heady, G. Luger, A. Maccabe, and M. Servilla, “The architecture of a network level intrusion detection system,” 1990, doi: 10.2172/425295.
G. Sai Nikhil, A. S. Rajasekaran, M. Parimala, and S. Velliangiri, “Applications of Machine Learning in Anomaly Detection,” Lect. Notes Electr. Eng., vol. 834, pp. 491–499, 2022, doi: 10.1007/978-981-16-8484-5_48.
M. Hasan, M. Islam, I. Islam, and M. M. A. Hashem, “Attack and Anomaly Detection in IoT Sensors in IoT Sites Using Machine Learning Approaches,” p. 100059, 2019, doi: 10.1016/j.iot.2019.100059.
E. Biermann, E. Cloete, and L. M. Venter, “A comparison of Intrusion Detection systems,” Comput. Secur., vol. 20, no. 8, pp. 676–683, 2001, doi: https://doi.org/10.1016/S0167-4048(01)00806-9.
Z. Yang, N. Chen, Y. Chen, and N. Zhou, “A Novel PMU Fog Based Early Anomaly Detection for an Efficient Wide Area PMU Network,” in 2018 IEEE 2nd International Conference on Fog and Edge Computing (ICFEC), 2018, pp. 1–10. doi: 10.1109/CFEC.2018.8358730.
R. Jaiswal, A. Chakravorty, and C. Rong, “Distributed Fog Computing Architecture for Real-Time Anomaly Detection in Smart Meter Data,” in 2020 IEEE Sixth International Conference on Big Data Computing Service and Applications (BigDataService), 2020, pp. 1–8. doi: 10.1109/BigDataService49289.2020.00009.
R. El-Awadi, A. Fernández-Vilas, and R. P. Díaz Redondo, “Fog Computing Solution for Distributed Anomaly Detection in Smart Grids,” in 2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2019, pp. 348–353. doi: 10.1109/WiMOB.2019.8923222.
Q. Shafi, A. Basit, S. Qaisar, A. Koay, and I. Welch, “Fog-Assisted SDN Controlled Framework for Enduring Anomaly Detection in an IoT Network,” IEEE Access, vol. 6, pp. 73713–73723, 2018, doi: 10.1109/ACCESS.2018.2884293.
N. Moustafa, K.-K. R. Choo, I. Radwan, and S. Camtepe, “Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog,” IEEE Trans. Inf. Forensics Secur., vol. 14, no. 8, pp. 1975–1987, 2019, doi: 10.1109/TIFS.2018.2890808.
M. Savic et al., “Deep Learning Anomaly Detection for Cellular IoT with Applications in Smart Logistics,” IEEE Access, vol. 9, no. 833828, pp. 59406–59419, 2021, doi: 10.1109/ACCESS.2021.3072916.
L. Lyu, J. Jin, S. Rajasegarar, X. He, and M. Palaniswami, “Fog-Empowered Anomaly Detection in IoT Using Hyperellipsoidal Clustering,” IEEE Internet Things J., vol. 4, no. 5, pp. 1174–1184, 2017, doi: 10.1109/JIOT.2017.2709942.
K. Chatterjee and N. R. Chaudhuri, “Distributed Anomaly Detection and PMU Data Recovery in a Fog-computing-WAMS Paradigm,” in 2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), 2020, pp. 1–6. doi: 10.1109/SmartGridComm47815.2020.9302971.
A. Yahyaoui, T. Abdellatif, S. Yangui, and R. Attia, “READ-IoT: Reliable Event and Anomaly Detection Framework for the Internet of Things,” IEEE Access, vol. 9, pp. 24168–24186, 2021, doi: 10.1109/ACCESS.2021.3056149.
S. Manimurugan, “IoT-Fog-Cloud model for anomaly detection using improved Naïve Bayes and principal component analysis,” J. Ambient Intell. Humaniz. Comput., 2021, doi: 10.1007/s12652-020-02723-3.
D. A. B. Moreira, H. P. Marques, W. L. Costa, J. Celestino, R. L. Gomes, and M. Nogueira, “Anomaly Detection in Smart Environments using AI over Fog and Cloud Computing,” in 2021 IEEE 18th Annual Consumer Communications Networking Conference (CCNC), 2021, pp. 1–2. doi: 10.1109/CCNC49032.2021.9369449.
How to Cite
Copyright (c) 2022 Suraj Nayak, Shadab Pasha Khan
This work is licensed under a Creative Commons Attribution 4.0 International License.
IJOSCIENCE follows an Open Journal Access policy. Authors retain the copyright of the original work and grant the rights of publication to the publisher with the work simultaneously licensed under a Creative Commons CC BY License that allows others to distribute, remix, adapt, and build upon your work, even commercially, as long as they credit you for the original creation. Authors are permitted to post their work in institutional repositories, social media or other platforms.
Under the following terms:
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.