Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC
Fog computing, as a new paradigm, has many characteristics that are different from cloud computing. Due to the resources being limited, fog nodes/MEC hosts are vulnerable to cyberattacks. Lightweight intrusion detection system (IDS) is a key technique to solve the problem. Because extreme learning m...
Gespeichert in:
Veröffentlicht in: | Wireless communications and mobile computing 2018-01, Vol.2018 (2018), p.1-10 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 10 |
---|---|
container_issue | 2018 |
container_start_page | 1 |
container_title | Wireless communications and mobile computing |
container_volume | 2018 |
creator | Lin, Fuhong Lü, Xing Zhou, Xianwei An, Xingshuo Yang, Lei |
description | Fog computing, as a new paradigm, has many characteristics that are different from cloud computing. Due to the resources being limited, fog nodes/MEC hosts are vulnerable to cyberattacks. Lightweight intrusion detection system (IDS) is a key technique to solve the problem. Because extreme learning machine (ELM) has the characteristics of fast training speed and good generalization ability, we present a new lightweight IDS called sample selected extreme learning machine (SS-ELM). The reason why we propose “sample selected extreme learning machine” is that fog nodes/MEC hosts do not have the ability to store extremely large amounts of training data sets. Accordingly, they are stored, computed, and sampled by the cloud servers. Then, the selected sample is given to the fog nodes/MEC hosts for training. This design can bring down the training time and increase the detection accuracy. Experimental simulation verifies that SS-ELM performs well in intrusion detection in terms of accuracy, training time, and the receiver operating characteristic (ROC) value. |
doi_str_mv | 10.1155/2018/7472095 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2407627886</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2407627886</sourcerecordid><originalsourceid>FETCH-LOGICAL-c360t-9577203007e2cc0031418fbd3dafb065cbb4ea3e197673664a254cb26a5bdadd3</originalsourceid><addsrcrecordid>eNqFkDtPwzAUhSMEEqWwMSNLjBDwI7aTEUILlVoxFCaGyLFvSqrGCU4i4N_jKBWMTPdI9zv3cYLgnOAbQji_pZjEtzKSFCf8IJgQznAYCykPf7VIjoOTtt1ijBmmZBK8rVXV7ACtYQe6A4NmX52DCtASlLOl3aCV0u-lBXSvWt9e2M71bVlb9ACddwyqtGheb1BaV03fDRZlDVrN0tPgqFC7Fs72dRq8zmcv6VO4fH5cpHfLUDOBuzDh0l_MMJZAtfaHkYjERW6YUUWOBdd5HoFiQBIpJBMiUpRHOqdC8dwoY9g0uBznNq7-6KHtsm3dO-tXZjTCUlAZx8JT1yOlXd22DoqscWWl3HdGcDbElw3xZfv4PH414v55oz7L_-iLkQbPQKH-aEoEZYT9APIqd-I</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2407627886</pqid></control><display><type>article</type><title>Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC</title><source>Wiley-Blackwell Open Access Titles</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>Alma/SFX Local Collection</source><creator>Lin, Fuhong ; Lü, Xing ; Zhou, Xianwei ; An, Xingshuo ; Yang, Lei</creator><contributor>Wang, Shangguang ; Shangguang Wang</contributor><creatorcontrib>Lin, Fuhong ; Lü, Xing ; Zhou, Xianwei ; An, Xingshuo ; Yang, Lei ; Wang, Shangguang ; Shangguang Wang</creatorcontrib><description>Fog computing, as a new paradigm, has many characteristics that are different from cloud computing. Due to the resources being limited, fog nodes/MEC hosts are vulnerable to cyberattacks. Lightweight intrusion detection system (IDS) is a key technique to solve the problem. Because extreme learning machine (ELM) has the characteristics of fast training speed and good generalization ability, we present a new lightweight IDS called sample selected extreme learning machine (SS-ELM). The reason why we propose “sample selected extreme learning machine” is that fog nodes/MEC hosts do not have the ability to store extremely large amounts of training data sets. Accordingly, they are stored, computed, and sampled by the cloud servers. Then, the selected sample is given to the fog nodes/MEC hosts for training. This design can bring down the training time and increase the detection accuracy. Experimental simulation verifies that SS-ELM performs well in intrusion detection in terms of accuracy, training time, and the receiver operating characteristic (ROC) value.</description><identifier>ISSN: 1530-8669</identifier><identifier>EISSN: 1530-8677</identifier><identifier>DOI: 10.1155/2018/7472095</identifier><language>eng</language><publisher>Cairo, Egypt: Hindawi Publishing Corporation</publisher><subject>Access control ; Algorithms ; Alliances ; Artificial neural networks ; Cloud computing ; Computer simulation ; Forensic sciences ; Internet of Things ; Intrusion detection systems ; Lightweight ; Machine learning ; Neural networks ; Nodes ; Privacy ; Security management ; Smartphones ; Support vector machines ; Training ; Unmanned aerial vehicles</subject><ispartof>Wireless communications and mobile computing, 2018-01, Vol.2018 (2018), p.1-10</ispartof><rights>Copyright © 2018 Xingshuo An et al.</rights><rights>Copyright © 2018 Xingshuo An et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c360t-9577203007e2cc0031418fbd3dafb065cbb4ea3e197673664a254cb26a5bdadd3</citedby><cites>FETCH-LOGICAL-c360t-9577203007e2cc0031418fbd3dafb065cbb4ea3e197673664a254cb26a5bdadd3</cites><orcidid>0000-0002-5287-5226</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27903,27904</link.rule.ids></links><search><contributor>Wang, Shangguang</contributor><contributor>Shangguang Wang</contributor><creatorcontrib>Lin, Fuhong</creatorcontrib><creatorcontrib>Lü, Xing</creatorcontrib><creatorcontrib>Zhou, Xianwei</creatorcontrib><creatorcontrib>An, Xingshuo</creatorcontrib><creatorcontrib>Yang, Lei</creatorcontrib><title>Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC</title><title>Wireless communications and mobile computing</title><description>Fog computing, as a new paradigm, has many characteristics that are different from cloud computing. Due to the resources being limited, fog nodes/MEC hosts are vulnerable to cyberattacks. Lightweight intrusion detection system (IDS) is a key technique to solve the problem. Because extreme learning machine (ELM) has the characteristics of fast training speed and good generalization ability, we present a new lightweight IDS called sample selected extreme learning machine (SS-ELM). The reason why we propose “sample selected extreme learning machine” is that fog nodes/MEC hosts do not have the ability to store extremely large amounts of training data sets. Accordingly, they are stored, computed, and sampled by the cloud servers. Then, the selected sample is given to the fog nodes/MEC hosts for training. This design can bring down the training time and increase the detection accuracy. Experimental simulation verifies that SS-ELM performs well in intrusion detection in terms of accuracy, training time, and the receiver operating characteristic (ROC) value.</description><subject>Access control</subject><subject>Algorithms</subject><subject>Alliances</subject><subject>Artificial neural networks</subject><subject>Cloud computing</subject><subject>Computer simulation</subject><subject>Forensic sciences</subject><subject>Internet of Things</subject><subject>Intrusion detection systems</subject><subject>Lightweight</subject><subject>Machine learning</subject><subject>Neural networks</subject><subject>Nodes</subject><subject>Privacy</subject><subject>Security management</subject><subject>Smartphones</subject><subject>Support vector machines</subject><subject>Training</subject><subject>Unmanned aerial vehicles</subject><issn>1530-8669</issn><issn>1530-8677</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>BENPR</sourceid><recordid>eNqFkDtPwzAUhSMEEqWwMSNLjBDwI7aTEUILlVoxFCaGyLFvSqrGCU4i4N_jKBWMTPdI9zv3cYLgnOAbQji_pZjEtzKSFCf8IJgQznAYCykPf7VIjoOTtt1ijBmmZBK8rVXV7ACtYQe6A4NmX52DCtASlLOl3aCV0u-lBXSvWt9e2M71bVlb9ACddwyqtGheb1BaV03fDRZlDVrN0tPgqFC7Fs72dRq8zmcv6VO4fH5cpHfLUDOBuzDh0l_MMJZAtfaHkYjERW6YUUWOBdd5HoFiQBIpJBMiUpRHOqdC8dwoY9g0uBznNq7-6KHtsm3dO-tXZjTCUlAZx8JT1yOlXd22DoqscWWl3HdGcDbElw3xZfv4PH414v55oz7L_-iLkQbPQKH-aEoEZYT9APIqd-I</recordid><startdate>20180101</startdate><enddate>20180101</enddate><creator>Lin, Fuhong</creator><creator>Lü, Xing</creator><creator>Zhou, Xianwei</creator><creator>An, Xingshuo</creator><creator>Yang, Lei</creator><general>Hindawi Publishing Corporation</general><general>Hindawi</general><general>Hindawi Limited</general><scope>ADJCN</scope><scope>AHFXO</scope><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7XB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-5287-5226</orcidid></search><sort><creationdate>20180101</creationdate><title>Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC</title><author>Lin, Fuhong ; Lü, Xing ; Zhou, Xianwei ; An, Xingshuo ; Yang, Lei</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c360t-9577203007e2cc0031418fbd3dafb065cbb4ea3e197673664a254cb26a5bdadd3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Access control</topic><topic>Algorithms</topic><topic>Alliances</topic><topic>Artificial neural networks</topic><topic>Cloud computing</topic><topic>Computer simulation</topic><topic>Forensic sciences</topic><topic>Internet of Things</topic><topic>Intrusion detection systems</topic><topic>Lightweight</topic><topic>Machine learning</topic><topic>Neural networks</topic><topic>Nodes</topic><topic>Privacy</topic><topic>Security management</topic><topic>Smartphones</topic><topic>Support vector machines</topic><topic>Training</topic><topic>Unmanned aerial vehicles</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Lin, Fuhong</creatorcontrib><creatorcontrib>Lü, Xing</creatorcontrib><creatorcontrib>Zhou, Xianwei</creatorcontrib><creatorcontrib>An, Xingshuo</creatorcontrib><creatorcontrib>Yang, Lei</creatorcontrib><collection>الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals</collection><collection>معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete</collection><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless communications and mobile computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Lin, Fuhong</au><au>Lü, Xing</au><au>Zhou, Xianwei</au><au>An, Xingshuo</au><au>Yang, Lei</au><au>Wang, Shangguang</au><au>Shangguang Wang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC</atitle><jtitle>Wireless communications and mobile computing</jtitle><date>2018-01-01</date><risdate>2018</risdate><volume>2018</volume><issue>2018</issue><spage>1</spage><epage>10</epage><pages>1-10</pages><issn>1530-8669</issn><eissn>1530-8677</eissn><abstract>Fog computing, as a new paradigm, has many characteristics that are different from cloud computing. Due to the resources being limited, fog nodes/MEC hosts are vulnerable to cyberattacks. Lightweight intrusion detection system (IDS) is a key technique to solve the problem. Because extreme learning machine (ELM) has the characteristics of fast training speed and good generalization ability, we present a new lightweight IDS called sample selected extreme learning machine (SS-ELM). The reason why we propose “sample selected extreme learning machine” is that fog nodes/MEC hosts do not have the ability to store extremely large amounts of training data sets. Accordingly, they are stored, computed, and sampled by the cloud servers. Then, the selected sample is given to the fog nodes/MEC hosts for training. This design can bring down the training time and increase the detection accuracy. Experimental simulation verifies that SS-ELM performs well in intrusion detection in terms of accuracy, training time, and the receiver operating characteristic (ROC) value.</abstract><cop>Cairo, Egypt</cop><pub>Hindawi Publishing Corporation</pub><doi>10.1155/2018/7472095</doi><tpages>10</tpages><orcidid>https://orcid.org/0000-0002-5287-5226</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1530-8669 |
ispartof | Wireless communications and mobile computing, 2018-01, Vol.2018 (2018), p.1-10 |
issn | 1530-8669 1530-8677 |
language | eng |
recordid | cdi_proquest_journals_2407627886 |
source | Wiley-Blackwell Open Access Titles; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; Alma/SFX Local Collection |
subjects | Access control Algorithms Alliances Artificial neural networks Cloud computing Computer simulation Forensic sciences Internet of Things Intrusion detection systems Lightweight Machine learning Neural networks Nodes Privacy Security management Smartphones Support vector machines Training Unmanned aerial vehicles |
title | Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-27T17%3A46%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Sample%20Selected%20Extreme%20Learning%20Machine%20Based%20Intrusion%20Detection%20in%20Fog%20Computing%20and%20MEC&rft.jtitle=Wireless%20communications%20and%20mobile%20computing&rft.au=Lin,%20Fuhong&rft.date=2018-01-01&rft.volume=2018&rft.issue=2018&rft.spage=1&rft.epage=10&rft.pages=1-10&rft.issn=1530-8669&rft.eissn=1530-8677&rft_id=info:doi/10.1155/2018/7472095&rft_dat=%3Cproquest_cross%3E2407627886%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2407627886&rft_id=info:pmid/&rfr_iscdi=true |