Nothing Special   »   [go: up one dir, main page]

Skip to main content

Evaluation of Human Immune-Based IDPS Under DoS/DDoS Attacks

  • Conference paper
  • First Online:
Proceedings of the 2023 International Conference on Advances in Computing Research (ACR’23) (ACR 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 700))

Included in the following conference series:

  • 522 Accesses

Abstract

Typical intrusion detection and prevention systems (IDPS) require a lot of computing resources such as; CPU time, memory, and energy. However, some resources are not in abundance in fog computing (FC). FC is a computer networking paradigm where computing devices provide services to the user in place of the server. In our previous research, we proposed an IDPS that mimics the human immune behavior by using layers of defense that interact with one another to detect attacks aimed at the fog layer. This paper investigates how the proposed system adapts to denial of service (DoS) and distributed denial of service (DDoS) attacks. The results show that the system has an accuracy of 91.46%. More importantly, the system can recover from both with the help of its intrusion prevention mechanism.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Similar content being viewed by others

References

  1. Aliyu, F., Sheltami, T., Mahmoud, A., Al-Awami, L., Yasar, A.: Detecting man-in-the-middle attack in fog computing for social media. CMC-Comput. Mater. Continua 69(1), 1159–1181 (2021)

    Article  Google Scholar 

  2. Gomes, E., Costa, F., De Rolt, C., Plentz, P., Dantas, M.: A survey from real-time to near real-time applications in fog computing environments. Telecom 2(4), 489–517 (2021)

    Article  Google Scholar 

  3. Aliyu, F., Sheltami, T., Shakshuki, E.M.: A detection and prevention technique for man in the middle attack in fog computing. Procedia Comput. Sci. 141, 24–31 (2018). The 9th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2018)/The 8th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2018)/Affiliated Workshops

    Google Scholar 

  4. Aliyu, F., Sheltami, T., Deriche, M., Nasser, N.: Human immune-based intrusion detection and prevention system for fog computing. J. Netw. Syst. Manage. 30(1), 1–27 (2022)

    Article  Google Scholar 

  5. NIST: intrusion detection system (IDS) - Glossary \(\vert \) CSRC (2021). Accessed 21 Dec 2021

    Google Scholar 

  6. Karen, S., Peter, M.: Guide to intrusion detection and prevention systems (IDPS) (2007). Accessed 21 Dec 2021

    Google Scholar 

  7. Snoke, T.: Common network security tools and capabilities. Technical report, Carnegie-Mellon University Pittsburgh PA (2019)

    Google Scholar 

  8. Ometov, A., Molua, O.L., Komarov, M., Nurmi, J.: A survey of security in cloud, edge, and fog computing. Sensors 22(3), 927 (2022)

    Article  Google Scholar 

  9. Roesch, M., et al.: Snort, network intrusion detection/prevention system (2011)

    Google Scholar 

  10. Krishnan, P., Duttagupta, S., Achuthan, K.: SDNFV based threat monitoring and security framework for multi-access edge computing infrastructure. Mob. Netw. Appl. 24, 1896–1923 (2019)

    Article  Google Scholar 

  11. Krishnan, P., Duttagupta, S., Achuthan, K.: SDN/NFV security framework for fog-to-things computing infrastructure. Softw. Pract. Exp. 50(5), 757–800 (2020)

    Article  Google Scholar 

  12. Antonakakis, M., et al.: Understanding the mirai botnet. In: 26th USENIX Security Symposium (USENIX Security 2017), Vancouver, BC, pp. 1093–1110. USENIX Association (2017)

    Google Scholar 

  13. Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. SE–13(2), 222–232 (1987)

    Article  Google Scholar 

  14. Moustafa, N., Creech, G., Slay, J.: Anomaly detection system using beta mixture models and outlier detection. In: Pattnaik, P.K., Rautaray, S.S., Das, H., Nayak, J. (eds.) Progress in Computing, Analytics and Networking. AISC, vol. 710, pp. 125–135. Springer, Singapore (2018). https://doi.org/10.1007/978-981-10-7871-2_13

    Chapter  Google Scholar 

  15. Zahra, S.R., Chishti, M.A.: Fuzzy logic and fog based secure architecture for internet of things (FLFSIoT). J. Ambient Intell. Humaniz. Comput., 1–25 (2020). https://doi.org/10.1007/s12652-020-02128-2

  16. Ali, A., Yousaf, M.M.: Novel three-tier intrusion detection and prevention system in software defined network. IEEE Access 8, 109662–109676 (2020)

    Article  Google Scholar 

  17. Castillo, O., Melin, P.: 3 type-2 fuzzy logic. In: Castillo, O., Melin, P. (eds.) Type-2 Fuzzy Logic: Theory and Applications. Studies in Fuzziness and Soft Computing, vol. 223, pp. 29–43. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-76284-3_3

    Chapter  MATH  Google Scholar 

  18. Ferrag, M.A., Shu, L., Djallel, H., Choo, K.-K.R.: Deep learning-based intrusion detection for distributed denial of service attack in agriculture 4.0. Electronics 10(11), 1257 (2021)

    Article  Google Scholar 

  19. Sharma, R., Chan, C.A., Leckie, C.: Evaluation of centralised vs distributed collaborative intrusion detection systems in multi-access edge computing. In: 2020 IFIP Networking Conference (Networking), pp. 343–351 (2020)

    Google Scholar 

  20. Diro, A., Chilamkurti, N.: Leveraging LSTM networks for attack detection in fog-to-things communications. IEEE Commun. Mag. 56(9), 124–130 (2018)

    Article  Google Scholar 

  21. Samy, A., Yu, H., Zhang, H.: Fog-based attack detection framework for internet of things using deep learning. IEEE Access 8, 74571–74585 (2020)

    Article  Google Scholar 

  22. Ye, N., Chen, Q.: An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems. Qual. Reliab. Eng. Int. 17(2), 105–112 (2001)

    Article  Google Scholar 

  23. Krügel, C., Toth, T., Kirda, E.: Service specific anomaly detection for network intrusion detection. In: Proceedings of the 2002 ACM Symposium on Applied Computing, SAC 2002, New York, NY, USA, pp. 201–208. Association for Computing Machinery (2002)

    Google Scholar 

  24. Vinayakumar, R., Alazab, M., Soman, K.P., Poornachandran, P., Al-Nemrat, A., Venkatraman, S.: Deep learning approach for intelligent intrusion detection system. IEEE Access 7, 41525–41550 (2019)

    Article  Google Scholar 

  25. Wang, W., Ren, L., Chen, L., Ding, Y.: Intrusion detection and security calculation in industrial cloud storage based on an improved dynamic immune algorithm. Inf. Sci. 501, 543–557 (2019)

    Article  Google Scholar 

  26. Nath, O.: Review on raspberry pi 3B+ and its scope. Int. J. Eng. Appl. Sci. Technol. 4(9), 157–159 (2020)

    Google Scholar 

Download references

Acknowledgements

The authors acknowledge the support project number INML2104 under the Interdisciplinary Center of Smart Mobility and Logistics and the Computer Engineering Department at King Fahd University of Petroleum and Minerals for this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Farouq Aliyu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Aliyu, F., Sheltami, T., Abu-Amara, M., Deriche, M., Mahmoud, A. (2023). Evaluation of Human Immune-Based IDPS Under DoS/DDoS Attacks. In: Daimi, K., Al Sadoon, A. (eds) Proceedings of the 2023 International Conference on Advances in Computing Research (ACR’23). ACR 2023. Lecture Notes in Networks and Systems, vol 700. Springer, Cham. https://doi.org/10.1007/978-3-031-33743-7_41

Download citation

Publish with us

Policies and ethics