Decision Tree Based Interference Recognition for Fog Enabled IOT Architecture
PDF

Keywords

Internet of Things
Network Security
Attacks Distinguishing System
Decision Tree and Rule Centered Conceptions
Fog Architecture

How to Cite

Mugunthan, S. R. 2020. “Decision Tree Based Interference Recognition for Fog Enabled IOT Architecture”. Journal of Trends in Computer Science and Smart Technology 2 (1): 15-25. https://doi.org/10.36548/jtcsst.2020.1.002.

Abstract

The cyber-attacks nowadays are becoming more and more erudite causing challenges in distinguishing them and confining. These attacks affect the sensitized information's of the network by penetrating into the network and behaving normally. The paper devises a system for such interference recognition in the internet of things architecture that is aided by the FOG. The proposed system is a combination of variety of classifiers that are founded on the decision tree as well as the rule centered conceptions. The system put forth involves the JRip and the REP tree algorithm to utilize the features of the data set as input and distinguishes between the benign and the malicious traffic in the network and includes an decision forest that is improved with the penalizing attributes of the previous trees in the final stage to classify the traffic in the network utilizing the initial data set as well as the outputs of the classifiers that were engaged in the former stages. The proffered system was examined using the dataset such BOT-Internet of things and the CICIDS2017 to evince its competence in terms of rate of false alarm, detection, and accuracy. The attained results proved that the performance of the proposed system was better compared to the exiting methodologies to recognize the interference.

PDF

References

Maglaras, Leandros A., Ki-Hyung Kim, Helge Janicke, Mohamed Amine Ferrag, Stylianos Rallis, Pavlina Fragkou, Athanasios Maglaras, and Tiago J. Cruz. "Cyber security of critical infrastructures." Ict Express 4, no. 1 (2018): 42-45.

Smys, S. (2019). DDOS Attack Detection In Telecommunication Network Using Machine Learning. Journal of Ubiquitous Computing and Communication Technologies (UCCT), 1(01), 33-44.

Ferrag, Mohamed Amine, Mehdi Nafa, and Salim Ghanemi. "EPSA: an efficient and privacy-preserving scheme against wormhole attack on reactive routing for mobile ad hoc social networks." International Journal of Security and Networks 11, no. 3 (2016): 107-125.

Suma, V. (2019). Security and Privacy Mechanism Using Blockchain. Journal of Ubiquitous Computing and Communication Technologies (UCCT), 1(01), 45-54.

Maglaras, Leandros, Tiago Cruz, Mohamed A. Ferrag, and Helge Janicke. "Teaching the process of building an Intrusion Detection System using data from a small‐scale SCADA testbed." Internet Technology Letters 3, no. 1 (2020): e132.

Anand, J. V. "Design and Development of Secure and Sustainable Software Defined Networks." Journal of Ubiquitous Computing and Communication Technologies (UCCT) 1, no. 02 (2019): 110-120

Ahmim, Ahmed, Leandros Maglaras, Mohamed Amine Ferrag, Makhlouf Derdour, and Helge Janicke. "A novel hierarchical intrusion detection system based on decision tree and rules-based models." In 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), pp. 228-233. IEEE, 2019.

Raj, Jennifer S., S. Smys, G. Josemin Bala, B. Praba, R. Sujath, V. Hilda Christy Gnanam, M. Abdul Rahiman et al. "Editorial Board v-vi A Novel Classification via Clustering Method for Anomaly Based Network Intrusion Detection System 1-6 Mrutyunjaya Panda and Manas Ranjan Patra Performance Improvement in MANETs: A Cross Layer Approach via TCP 7-11."

Wang, Gang, Jinxing Hao, Jian Ma, and Lihua Huang. "A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering." Expert systems with applications 37, no. 9 (2010): 6225-6232.

Govindarajan, Muthukumarasamy, and R. M. Chandrasekaran. "Intrusion detection using neural based hybrid classification methods." Computer networks 55, no. 8 (2011): 1662-1671.

Chung, Yuk Ying, and Noorhaniza Wahid. "A hybrid network intrusion detection system using simplified swarm optimization (SSO)." Applied soft computing 12, no. 9 (2012): 3014-3022.

Kim, Gisung, Seungmin Lee, and Sehun Kim. "A novel hybrid intrusion detection method integrating anomaly detection with misuse detection." Expert Systems with Applications 41, no. 4 (2014): 1690-1700.

Kevric, Jasmin, Samed Jukic, and Abdulhamit Subasi. "An effective combining classifier approach using tree algorithms for network intrusion detection." Neural Computing and Applications 28, no. 1 (2017): 1051-1058.

Adnan, Md Nasim, and Md Zahidul Islam. "Forest PA: Constructing a decision forest by penalizing attributes used in previous trees." Expert Systems with Applications 89 (2017): 389-403.

Frank, Eibe, and Ian H. Witten. "Reduced-error pruning with significance tests." (1999).

Cohen, William W. "Fast effective rule induction." In Machine learning proceedings 1995, pp. 115-123. Morgan Kaufmann, 1995.

Koroniotis, Nickolaos, Nour Moustafa, Elena Sitnikova, and Benjamin Turnbull. "Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset." Future Generation Computer Systems 100 (2019): 779-796.

Folino, Gianluigi, and Francesco Sergio Pisani. "Evolving meta-ensemble of classifiers for handling incomplete and unbalanced datasets in the cyber security domain." Applied Soft Computing 47 (2016): 179-190.