Abstract
Typical intrusion detection and prevention systems (IDPS) require a lot of computing resources such as; CPU time, memory, and energy. However, some resources are not in abundance in fog computing (FC). FC is a computer networking paradigm where computing devices provide services to the user in place of the server. In our previous research, we proposed an IDPS that mimics the human immune behavior by using layers of defense that interact with one another to detect attacks aimed at the fog layer. This paper investigates how the proposed system adapts to denial of service (DoS) and distributed denial of service (DDoS) attacks. The results show that the system has an accuracy of 91.46%. More importantly, the system can recover from both with the help of its intrusion prevention mechanism.
Similar content being viewed by others
References
Aliyu, F., Sheltami, T., Mahmoud, A., Al-Awami, L., Yasar, A.: Detecting man-in-the-middle attack in fog computing for social media. CMC-Comput. Mater. Continua 69(1), 1159–1181 (2021)
Gomes, E., Costa, F., De Rolt, C., Plentz, P., Dantas, M.: A survey from real-time to near real-time applications in fog computing environments. Telecom 2(4), 489–517 (2021)
Aliyu, F., Sheltami, T., Shakshuki, E.M.: A detection and prevention technique for man in the middle attack in fog computing. Procedia Comput. Sci. 141, 24–31 (2018). The 9th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2018)/The 8th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2018)/Affiliated Workshops
Aliyu, F., Sheltami, T., Deriche, M., Nasser, N.: Human immune-based intrusion detection and prevention system for fog computing. J. Netw. Syst. Manage. 30(1), 1–27 (2022)
NIST: intrusion detection system (IDS) - Glossary \(\vert \) CSRC (2021). Accessed 21 Dec 2021
Karen, S., Peter, M.: Guide to intrusion detection and prevention systems (IDPS) (2007). Accessed 21 Dec 2021
Snoke, T.: Common network security tools and capabilities. Technical report, Carnegie-Mellon University Pittsburgh PA (2019)
Ometov, A., Molua, O.L., Komarov, M., Nurmi, J.: A survey of security in cloud, edge, and fog computing. Sensors 22(3), 927 (2022)
Roesch, M., et al.: Snort, network intrusion detection/prevention system (2011)
Krishnan, P., Duttagupta, S., Achuthan, K.: SDNFV based threat monitoring and security framework for multi-access edge computing infrastructure. Mob. Netw. Appl. 24, 1896–1923 (2019)
Krishnan, P., Duttagupta, S., Achuthan, K.: SDN/NFV security framework for fog-to-things computing infrastructure. Softw. Pract. Exp. 50(5), 757–800 (2020)
Antonakakis, M., et al.: Understanding the mirai botnet. In: 26th USENIX Security Symposium (USENIX Security 2017), Vancouver, BC, pp. 1093–1110. USENIX Association (2017)
Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. SE–13(2), 222–232 (1987)
Moustafa, N., Creech, G., Slay, J.: Anomaly detection system using beta mixture models and outlier detection. In: Pattnaik, P.K., Rautaray, S.S., Das, H., Nayak, J. (eds.) Progress in Computing, Analytics and Networking. AISC, vol. 710, pp. 125–135. Springer, Singapore (2018). https://doi.org/10.1007/978-981-10-7871-2_13
Zahra, S.R., Chishti, M.A.: Fuzzy logic and fog based secure architecture for internet of things (FLFSIoT). J. Ambient Intell. Humaniz. Comput., 1–25 (2020). https://doi.org/10.1007/s12652-020-02128-2
Ali, A., Yousaf, M.M.: Novel three-tier intrusion detection and prevention system in software defined network. IEEE Access 8, 109662–109676 (2020)
Castillo, O., Melin, P.: 3 type-2 fuzzy logic. In: Castillo, O., Melin, P. (eds.) Type-2 Fuzzy Logic: Theory and Applications. Studies in Fuzziness and Soft Computing, vol. 223, pp. 29–43. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-76284-3_3
Ferrag, M.A., Shu, L., Djallel, H., Choo, K.-K.R.: Deep learning-based intrusion detection for distributed denial of service attack in agriculture 4.0. Electronics 10(11), 1257 (2021)
Sharma, R., Chan, C.A., Leckie, C.: Evaluation of centralised vs distributed collaborative intrusion detection systems in multi-access edge computing. In: 2020 IFIP Networking Conference (Networking), pp. 343–351 (2020)
Diro, A., Chilamkurti, N.: Leveraging LSTM networks for attack detection in fog-to-things communications. IEEE Commun. Mag. 56(9), 124–130 (2018)
Samy, A., Yu, H., Zhang, H.: Fog-based attack detection framework for internet of things using deep learning. IEEE Access 8, 74571–74585 (2020)
Ye, N., Chen, Q.: An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems. Qual. Reliab. Eng. Int. 17(2), 105–112 (2001)
Krügel, C., Toth, T., Kirda, E.: Service specific anomaly detection for network intrusion detection. In: Proceedings of the 2002 ACM Symposium on Applied Computing, SAC 2002, New York, NY, USA, pp. 201–208. Association for Computing Machinery (2002)
Vinayakumar, R., Alazab, M., Soman, K.P., Poornachandran, P., Al-Nemrat, A., Venkatraman, S.: Deep learning approach for intelligent intrusion detection system. IEEE Access 7, 41525–41550 (2019)
Wang, W., Ren, L., Chen, L., Ding, Y.: Intrusion detection and security calculation in industrial cloud storage based on an improved dynamic immune algorithm. Inf. Sci. 501, 543–557 (2019)
Nath, O.: Review on raspberry pi 3B+ and its scope. Int. J. Eng. Appl. Sci. Technol. 4(9), 157–159 (2020)
Acknowledgements
The authors acknowledge the support project number INML2104 under the Interdisciplinary Center of Smart Mobility and Logistics and the Computer Engineering Department at King Fahd University of Petroleum and Minerals for this work.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Aliyu, F., Sheltami, T., Abu-Amara, M., Deriche, M., Mahmoud, A. (2023). Evaluation of Human Immune-Based IDPS Under DoS/DDoS Attacks. In: Daimi, K., Al Sadoon, A. (eds) Proceedings of the 2023 International Conference on Advances in Computing Research (ACR’23). ACR 2023. Lecture Notes in Networks and Systems, vol 700. Springer, Cham. https://doi.org/10.1007/978-3-031-33743-7_41
Download citation
DOI: https://doi.org/10.1007/978-3-031-33743-7_41
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-33742-0
Online ISBN: 978-3-031-33743-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)