Abstract
Edge computing is an emerging network system under which the data source and data process are brought to the end node (edge device) for computation and which is used to speed up response time, save bandwidth, and increase the efficiency of the application. Edge of Things (EoT) is the group of entirely Edge node that has the power to connect to the network/internet to gather and share data in a computing environment. Protecting EoT environments with traditional Intrusion Detection Systems (IDSs) is a severe problem because of the large number of EoT devices and various types of EoT devices being used due to large amounts of data being collected and data processed on the network. Edge architecture consists of several layers. Due to architectural changes, privacy and security concerns in the EoT are moving to different layers of edge architecture. As a result, it can be difficult to detect intrusion threats in decentralized systems. Therefore, intrusion detection systems are needed. Several approaches to IDS have been proposed and developed to reduce and avoid cyber-attacks, but new techniques still need to be enhanced. This study aims to offer an improved IDS model for classifying attacks on EoT networks. To protect EoT network, an improved EoT-IDS is proposed by applying multiple machine learning (ML) models. This research work uses the combination-based grouping method for optimal class feature selection. Afterward, the filter-based feature selection technique was performed for optimal reduced features. We focus on the optimal features selection framework, because for better accuracy and anomaly detection of ML models, the effectiveness of feature selection is imperative. The research was executed on the UNSW-NB15 dataset. The performance results show an accuracy of 98.72%, a detection rate (DR) of 98.47%, and a false alarm rate (FAR) of 0.87% for optimal reduced features using the Random Forest classifier.





Similar content being viewed by others
References
Shi W, Cao J, Zhang Q, Li Y, Xu L. Edge computing: vision and challenges. IEEE Internet Things J. 2016;3:637–46. https://doi.org/10.1109/JIOT.2016.2579198.
Zhou Y, Zhang D, Xiong N. Post-cloud computing paradigms: a survey and comparison. Tsinghua Sci Technol. 2017;22(6):714-32 https://doi.org/10.23919/TST.2017.8195353.
Prabadevi B, Deepa N, Pham QV, Nguyen DC, Reddy T, Pathirana PN, Dobre O. Toward blockchain for edge-of-things: a new paradigm, opportunities, and future directions. IEEE Internet Things Magazine. 2021;4(2):102–8. https://doi.org/10.1109/IOTM.0001.2000191.
Xiao Y, Jia Y, Liu C, Cheng X, Yu J, Lv W. Edge computing security: state of the art and challenges. Proc IEEE. 2019. https://doi.org/10.1109/JPROC.2019.2918437.
Yang R, Yu FR, Si P, Yang Z, Zhang Y. Integrated blockchain and edge computing systems: a survey, some research issues and challenges. IEEE Commun Surveys Tutorials. 2019. https://doi.org/10.1109/COMST.2019.2894727.
Li Y, Liu Q. A comprehensive review study of cyber-attacks and cyber security; emerging trends and recent developments. Energy Rep. 2021;7:8176–86. https://doi.org/10.1016/j.egyr.2021.08.126.
Ometov A, Molua OL, Komarov M, Nurmi J. A survey of security in cloud, edge, and fog computing. Sensors. 2022. https://doi.org/10.3390/s22030927.
Ahmed M, Naser Mahmood A, Hu J. A survey of network anomaly detection techniques. J Netwk Comput Appl. 2016. https://doi.org/10.1016/j.jnca.2015.11.016.
Alwarafy A, Al-Thelaya KA, Abdallah M, Schneider J, Hamdi M. A survey on security and privacy issues in edge-computing-assisted internet of things. EEE Internet Things J. 2021. https://doi.org/10.1109/JIOT.2020.3015432.
Ahmad Z, Shahid Khan A, Wai Shiang C, Abdullah J, Ahmad F. Network intrusion detection system: a systematic study of machine learning and deep learning approaches. Tran Emerg Telecommun Technol. 2021. https://doi.org/10.1002/ett.4150.
Khraisat A, Gondal I, Vamplew P, Kamruzzaman J. Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity. 2019. https://doi.org/10.1186/s42400-019-0038-7.
Haque S, Eberhart Z, Bansal A, McMillan C. Semantic similarity metrics for evaluating source code summarization. In IEEE International Conference on Program Comprehension 2022; pp. 36-47 https://doi.org/10.1145/nnnnnnn.nnnnnnn.
Almogren AS. Intrusion detection in edge-of-things computing. J Parallel Distrib Comput. 2020;137:259–65. https://doi.org/10.1016/j.jpdc.2019.12.008.
Bagui S, Kalaimannan E, Bagui S, Nandi D, Pinto A. Using machine learning techniques to identify rare cyber-attacks on the UNSW-NB15 dataset. Secur Priv. 2019. https://doi.org/10.1002/spy2.91.
Dickson A, Thomas C. Analysis of UNSW-NB15 dataset using machine learning classifiers. In: communications in computer and information science. Springer Science and Business Media Deutschland GmbH. 2021. p. 198–207. https://doi.org/10.1007/978-981-16-0419-5_16.
Ring M, Wunderlich S, Scheuring D, Landes D, Hotho A. A survey of network-based intrusion detection data sets. Comput Secur. 2019. https://doi.org/10.1016/j.cose.2019.06.005.
Al-Daweri MS, Ariffin KAZ, Abdullah S, Senan MFEM. An analysis of the KDD99 and UNSW-NB15 datasets for the intrusion detection system. Symmetry (Basel). 2020;12:1–32. https://doi.org/10.3390/sym12101666.
Meftah S, Rachidi T, Assem N. Network based intrusion detection using the UNSW-NB15 dataset. Int J Comput Digit Syst. 2019;8(5):478–87. https://doi.org/10.12785/ijcds/080505.
Janarthanan T, Zargari S. Feature selection in UNSW-NB15 and KDDCUPâ€TM99 datasets. 2017.
Singh AP, Singh M. A comparative review of malware analysis and detection in HTTPs traffic. Int J Comput Digit Syst. 2021;10(1):111-23 https://doi.org/10.12785/ijcds/100111
Aggarwal P, Sharma SK. Analysis of KDD dataset attributes - class wise for intrusion detection. In: Procedia Computer Science. Elsevier 2015. p. 842–851. https://doi.org/10.1016/j.procs.2015.07.490.
Disha RA, Waheed S. Performance analysis of machine learning models for intrusion detection system using Gini Impurity-based Weighted Random Forest (GIWRF) feature selection technique. Cybersecurity. 2022. https://doi.org/10.1186/s42400-021-00103-8.
Ahmed HA, Hameed A, Bawany NZ. Network intrusion detection using oversampling technique and machine learning algorithms. PeerJ Comput Sci. 2022. https://doi.org/10.7717/PEERJ-CS.820.
Kumar V, Das AK, Sinha D. UIDS: a unified intrusion detection system for IoT environment. Evol Intell. 2021;14:47–59. https://doi.org/10.1007/s12065-019-00291-w.
Disha RA, Waheed S. A Comparative study of machine learning models for Network Intrusion Detection System using UNSW-NB 15 dataset. In: Proceedings of International Conference on Electronics, Communications and Information Technology, ICECIT 2021. Institute of Electrical and Electronics Engineers Inc. 2021. https://doi.org/10.1109/ICECIT54077.2021.964147.
Hammad M, El-Medany W, Ismail Y. Intrusion detection system using feature selection with clustering and classification machine learning algorithms on the UNSW-NB15 dataset. In: 2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies, 3ICT 2020. Institute of Electrical and Electronics Engineers Inc. 2020. https://doi.org/10.1109/3ICT51146.2020.9312002.
Kasongo SM, Sun Y. Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset. J Big Data. 2020. https://doi.org/10.1186/s40537-020-00379-6.
Sarhan M, Layeghy S, Portmann M. Towards a standard feature set for network intrusion detection system datasets. Mobile Netwks Appl. 2022;27:357–70. https://doi.org/10.1007/s11036-021-01843-0.
Moualla S, Khorzom K, Jafar A. Improving the performance of machine learning-based network intrusion detection systems on the UNSW-NB15 dataset. Comput Intell Neurosci. 2021. https://doi.org/10.1155/2021/5557577.
Sarker IH. Machine learning: algorithms, real-world applications and research directions. SN Comput Sci. 2021. https://doi.org/10.1007/s42979-021-00592-x.
Singh AP, Kumar S, Kumar A, Usama M. Machine learning based intrusion detection system for minority attacks classification. In 2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES), Greater Noida, India. 2022. pp. 256-261 https://doi.org/10.1109/CISES54857.2022.9844381
Saheed YK. Performance improvement of intrusion detection system for detecting attacks on internet of things and edge of things. In artificial intelligence for cloud and edge computing. Internet of things 2022. Springer, Cham
UNSW-NB15 Dataset, UNSW Canberra Cyber 2015, Available online at https://www.unsw.adfa.edu.au/unswcanberra-cyber/cybersecurity/ADFA-NB15-Datasets, Accessed on 10 January 2020.
Singh S, Kumar K, Kumar B. Sentiment analysis of twitter data using TF-IDF and machine learning techniques. In: International conference on machine learning, big data, cloud and parallel computing (COM-IT-CON), Faridabad, India. 2022. p. 252–255. https://doi.org/10.1109/COM-IT-CON54601.2022.9850477.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
On behalf of all the authors, the corresponding author states that there is no conflict of interest.
Ethics Approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the topical collection “Industrial IoT and Cyber-Physical Systems” guest edited by Arun K Somani, Seeram Ramakrishnan, Anil Chaudhary and Mehul Mahrishi.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Kumar, V., Kumar, V., Singh, N. et al. Enhancing Intrusion Detection System Performance to Detect Attacks on Edge of Things. SN COMPUT. SCI. 4, 802 (2023). https://doi.org/10.1007/s42979-023-02242-w
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-023-02242-w