Please use this identifier to cite or link to this item: http://hdl.handle.net/1942/44695
Title: A Lightweight Intrusion Detection System Using Convolutional Neural Network and Long Short-Term Memory in Fog Computing
Authors: Alzahrani, Hawazen
Sheltami, Tarek
Barnawi, Abdulaziz
Imam, Muhammad
YASAR, Ansar 
Issue Date: 2024
Publisher: TECH SCIENCE PRESS
Source: Cmc-computers Materials & Continua, 80 (3) , p. 4703 -4728
Abstract: The Internet of Things (IoT) links various devices to digital services and significantly improves the quality of our lives. However, as IoT connectivity is growing rapidly, so do the risks of network vulnerabilities and threats. Many interesting Intrusion Detection Systems (IDSs) are presented based on machine learning (ML) techniques to overcome this problem. Given the resource limitations of fog computing environments, a lightweight IDS is essential. This paper introduces a hybrid deep learning (DL) method that combines convolutional neural networks (CNN) and long short-term memory (LSTM) to build an energy-aware, anomaly-based IDS. We test this system on a recent dataset, focusing on reducing overhead while maintaining high accuracy and a low false alarm rate. We compare CICIoT2023, KDD-99 and NSL-KDD datasets to evaluate the performance of the proposed IDS model based on key metrics, including latency, energy consumption, false alarm rate and detection rate metrics. Our findings show an accuracy rate over 92% and a false alarm rate below 0.38%. These results demonstrate that our system provides strong security without excessive resource use. The practicality of deploying IDS with limited resources is demonstrated by the successful implementation of IDS functionality on a Raspberry Pi acting as a Fog node. The proposed lightweight model, with a maximum power consumption of 6.12 W, demonstrates its potential to operate effectively on energy-limited devices such as low-power fog nodes or edge devices. We prioritize energy efficiency while maintaining high accuracy, distinguishing our scheme from existing approaches. Extensive experiments demonstrate a significant reduction in false positives, ensuring accurate identification of genuine security threats while minimizing unnecessary alerts.
Notes: Imam, M (corresponding author), King Fahd Univ Petr & Minerals, Interdisciplinary Res Ctr Intelligent Secure Syst, Comp Engn Dept, Dhahran 31261, Saudi Arabia.
mimam@kfupm.edu.sa
Keywords: Intrusion detection;fog computing;CNN;LSTM;energy consumption
Document URI: http://hdl.handle.net/1942/44695
ISSN: 1546-2218
e-ISSN: 1546-2226
DOI: 10.32604/cmc.2024.054203
ISI #: 001342275600012
Rights: 2024 The Authors. Published by Tech Science Press. This work is licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Category: A1
Type: Journal Contribution
Appears in Collections:Research publications

Files in This Item:
File Description SizeFormat 
TSP_CMC_54203.pdfPublished version1.16 MBAdobe PDFView/Open
Show full item record

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.