Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing

被引:210
作者
Diro, Abebe Abeshu [1 ]
Chilamkurti, Naveen [2 ]
机构
[1] La Trobe Univ, Dept IT Comp Sci & IT, Bundoora, Vic, Australia
[2] La Trobe Univ, Comp Sci & Informat Technol, Bundoora, Vic, Australia
关键词
D O I
10.1109/MCOM.2018.1700332
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The increase in the number and diversity of smart objects has raised substantial cybersecurity challenges due to the recent exponential rise in the occurrence and sophistication of attacks. Although cloud computing has transformed the world of business in a dramatic way, its centralization hammers the application of distributed services such as security mechanisms for IoT applications. The new and emerging IoT applications require novel cybersecurity controls, models, and decisions distributed at the edge of the network. Despite the success of the existing cryptographic solutions in the traditional Internet, factors such as system development flaws, increased attack surfaces, and hacking skills have proven the inevitability of detection mechanisms. The traditional approaches such as classical machine-learning-based attack detection mechanisms have been successful in the last decades, but it has already been proven that they have low accuracy and less scalability for cyber-attack detection in massively distributed nodes such as IoT. The proliferation of deep learning and hardware technology advancement could pave a way to detecting the current level of sophistication of cyber-attacks in edge networks. The application of deep networks has already been successful in big data areas, and this indicates that fog-to-things computing can be the ultimate beneficiary of the approach for attack detection because a massive amount of data produced by IoT devices enable deep models to learn better than shallow algorithms. In this article, we propose a novel distributed deep learning scheme of cyber-attack detection in fog-to-things computing. Our experiments show that deep models are superior to shallow models in detection accuracy, false alarm rate, and scalability.
引用
收藏
页码:169 / 175
页数:7
相关论文
共 14 条
[1]  
[Anonymous], 2017, 2017 IEEE Wireless Communications and Networking Conference WCNC, DOI 10.1109/WCNC.2017.7925567.205
[2]  
[Anonymous], P 9 EAI INT C BIOINS
[3]  
[Anonymous], 2016, P KOR ADV I SCI TECH
[4]  
Caspi Guy, INTRO DEEP LEARNING
[5]  
Chao W., 2015, COGNITIVE 2015 7 INT
[6]  
Costa G., 2016, METHODOLOGICAL APPRO, V16
[7]  
Diro A. A., 2017, MOBILE NETW APPL, P1
[8]   A Hybrid Malicious Code Detection Method based on Deep Learning [J].
Li, Yuancheng ;
Ma, Rong ;
Jiao, Runhai .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (05) :205-215
[9]  
Mayu S., 2014, P MLSDA 2014 2 WORKS
[10]  
Stojmenovic I., CONCURRENCY COMPUTIN, V28, P2991