Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC

Fog computing, as a new paradigm, has many characteristics that are different from cloud computing. Due to the resources being limited, fog nodes/MEC hosts are vulnerable to cyberattacks. Lightweight intrusion detection system (IDS) is a key technique to solve the problem. Because extreme learning m...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Wireless communications and mobile computing 2018-01, Vol.2018 (2018), p.1-10
Hauptverfasser: Lin, Fuhong, Lü, Xing, Zhou, Xianwei, An, Xingshuo, Yang, Lei
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 10
container_issue 2018
container_start_page 1
container_title Wireless communications and mobile computing
container_volume 2018
creator Lin, Fuhong
Lü, Xing
Zhou, Xianwei
An, Xingshuo
Yang, Lei
description Fog computing, as a new paradigm, has many characteristics that are different from cloud computing. Due to the resources being limited, fog nodes/MEC hosts are vulnerable to cyberattacks. Lightweight intrusion detection system (IDS) is a key technique to solve the problem. Because extreme learning machine (ELM) has the characteristics of fast training speed and good generalization ability, we present a new lightweight IDS called sample selected extreme learning machine (SS-ELM). The reason why we propose “sample selected extreme learning machine” is that fog nodes/MEC hosts do not have the ability to store extremely large amounts of training data sets. Accordingly, they are stored, computed, and sampled by the cloud servers. Then, the selected sample is given to the fog nodes/MEC hosts for training. This design can bring down the training time and increase the detection accuracy. Experimental simulation verifies that SS-ELM performs well in intrusion detection in terms of accuracy, training time, and the receiver operating characteristic (ROC) value.
doi_str_mv 10.1155/2018/7472095
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2407627886</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2407627886</sourcerecordid><originalsourceid>FETCH-LOGICAL-c360t-9577203007e2cc0031418fbd3dafb065cbb4ea3e197673664a254cb26a5bdadd3</originalsourceid><addsrcrecordid>eNqFkDtPwzAUhSMEEqWwMSNLjBDwI7aTEUILlVoxFCaGyLFvSqrGCU4i4N_jKBWMTPdI9zv3cYLgnOAbQji_pZjEtzKSFCf8IJgQznAYCykPf7VIjoOTtt1ijBmmZBK8rVXV7ACtYQe6A4NmX52DCtASlLOl3aCV0u-lBXSvWt9e2M71bVlb9ACddwyqtGheb1BaV03fDRZlDVrN0tPgqFC7Fs72dRq8zmcv6VO4fH5cpHfLUDOBuzDh0l_MMJZAtfaHkYjERW6YUUWOBdd5HoFiQBIpJBMiUpRHOqdC8dwoY9g0uBznNq7-6KHtsm3dO-tXZjTCUlAZx8JT1yOlXd22DoqscWWl3HdGcDbElw3xZfv4PH414v55oz7L_-iLkQbPQKH-aEoEZYT9APIqd-I</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2407627886</pqid></control><display><type>article</type><title>Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC</title><source>Wiley-Blackwell Open Access Titles</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>Alma/SFX Local Collection</source><creator>Lin, Fuhong ; Lü, Xing ; Zhou, Xianwei ; An, Xingshuo ; Yang, Lei</creator><contributor>Wang, Shangguang ; Shangguang Wang</contributor><creatorcontrib>Lin, Fuhong ; Lü, Xing ; Zhou, Xianwei ; An, Xingshuo ; Yang, Lei ; Wang, Shangguang ; Shangguang Wang</creatorcontrib><description>Fog computing, as a new paradigm, has many characteristics that are different from cloud computing. Due to the resources being limited, fog nodes/MEC hosts are vulnerable to cyberattacks. Lightweight intrusion detection system (IDS) is a key technique to solve the problem. Because extreme learning machine (ELM) has the characteristics of fast training speed and good generalization ability, we present a new lightweight IDS called sample selected extreme learning machine (SS-ELM). The reason why we propose “sample selected extreme learning machine” is that fog nodes/MEC hosts do not have the ability to store extremely large amounts of training data sets. Accordingly, they are stored, computed, and sampled by the cloud servers. Then, the selected sample is given to the fog nodes/MEC hosts for training. This design can bring down the training time and increase the detection accuracy. Experimental simulation verifies that SS-ELM performs well in intrusion detection in terms of accuracy, training time, and the receiver operating characteristic (ROC) value.</description><identifier>ISSN: 1530-8669</identifier><identifier>EISSN: 1530-8677</identifier><identifier>DOI: 10.1155/2018/7472095</identifier><language>eng</language><publisher>Cairo, Egypt: Hindawi Publishing Corporation</publisher><subject>Access control ; Algorithms ; Alliances ; Artificial neural networks ; Cloud computing ; Computer simulation ; Forensic sciences ; Internet of Things ; Intrusion detection systems ; Lightweight ; Machine learning ; Neural networks ; Nodes ; Privacy ; Security management ; Smartphones ; Support vector machines ; Training ; Unmanned aerial vehicles</subject><ispartof>Wireless communications and mobile computing, 2018-01, Vol.2018 (2018), p.1-10</ispartof><rights>Copyright © 2018 Xingshuo An et al.</rights><rights>Copyright © 2018 Xingshuo An et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c360t-9577203007e2cc0031418fbd3dafb065cbb4ea3e197673664a254cb26a5bdadd3</citedby><cites>FETCH-LOGICAL-c360t-9577203007e2cc0031418fbd3dafb065cbb4ea3e197673664a254cb26a5bdadd3</cites><orcidid>0000-0002-5287-5226</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27903,27904</link.rule.ids></links><search><contributor>Wang, Shangguang</contributor><contributor>Shangguang Wang</contributor><creatorcontrib>Lin, Fuhong</creatorcontrib><creatorcontrib>Lü, Xing</creatorcontrib><creatorcontrib>Zhou, Xianwei</creatorcontrib><creatorcontrib>An, Xingshuo</creatorcontrib><creatorcontrib>Yang, Lei</creatorcontrib><title>Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC</title><title>Wireless communications and mobile computing</title><description>Fog computing, as a new paradigm, has many characteristics that are different from cloud computing. Due to the resources being limited, fog nodes/MEC hosts are vulnerable to cyberattacks. Lightweight intrusion detection system (IDS) is a key technique to solve the problem. Because extreme learning machine (ELM) has the characteristics of fast training speed and good generalization ability, we present a new lightweight IDS called sample selected extreme learning machine (SS-ELM). The reason why we propose “sample selected extreme learning machine” is that fog nodes/MEC hosts do not have the ability to store extremely large amounts of training data sets. Accordingly, they are stored, computed, and sampled by the cloud servers. Then, the selected sample is given to the fog nodes/MEC hosts for training. This design can bring down the training time and increase the detection accuracy. Experimental simulation verifies that SS-ELM performs well in intrusion detection in terms of accuracy, training time, and the receiver operating characteristic (ROC) value.</description><subject>Access control</subject><subject>Algorithms</subject><subject>Alliances</subject><subject>Artificial neural networks</subject><subject>Cloud computing</subject><subject>Computer simulation</subject><subject>Forensic sciences</subject><subject>Internet of Things</subject><subject>Intrusion detection systems</subject><subject>Lightweight</subject><subject>Machine learning</subject><subject>Neural networks</subject><subject>Nodes</subject><subject>Privacy</subject><subject>Security management</subject><subject>Smartphones</subject><subject>Support vector machines</subject><subject>Training</subject><subject>Unmanned aerial vehicles</subject><issn>1530-8669</issn><issn>1530-8677</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>BENPR</sourceid><recordid>eNqFkDtPwzAUhSMEEqWwMSNLjBDwI7aTEUILlVoxFCaGyLFvSqrGCU4i4N_jKBWMTPdI9zv3cYLgnOAbQji_pZjEtzKSFCf8IJgQznAYCykPf7VIjoOTtt1ijBmmZBK8rVXV7ACtYQe6A4NmX52DCtASlLOl3aCV0u-lBXSvWt9e2M71bVlb9ACddwyqtGheb1BaV03fDRZlDVrN0tPgqFC7Fs72dRq8zmcv6VO4fH5cpHfLUDOBuzDh0l_MMJZAtfaHkYjERW6YUUWOBdd5HoFiQBIpJBMiUpRHOqdC8dwoY9g0uBznNq7-6KHtsm3dO-tXZjTCUlAZx8JT1yOlXd22DoqscWWl3HdGcDbElw3xZfv4PH414v55oz7L_-iLkQbPQKH-aEoEZYT9APIqd-I</recordid><startdate>20180101</startdate><enddate>20180101</enddate><creator>Lin, Fuhong</creator><creator>Lü, Xing</creator><creator>Zhou, Xianwei</creator><creator>An, Xingshuo</creator><creator>Yang, Lei</creator><general>Hindawi Publishing Corporation</general><general>Hindawi</general><general>Hindawi Limited</general><scope>ADJCN</scope><scope>AHFXO</scope><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7XB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-5287-5226</orcidid></search><sort><creationdate>20180101</creationdate><title>Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC</title><author>Lin, Fuhong ; Lü, Xing ; Zhou, Xianwei ; An, Xingshuo ; Yang, Lei</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c360t-9577203007e2cc0031418fbd3dafb065cbb4ea3e197673664a254cb26a5bdadd3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Access control</topic><topic>Algorithms</topic><topic>Alliances</topic><topic>Artificial neural networks</topic><topic>Cloud computing</topic><topic>Computer simulation</topic><topic>Forensic sciences</topic><topic>Internet of Things</topic><topic>Intrusion detection systems</topic><topic>Lightweight</topic><topic>Machine learning</topic><topic>Neural networks</topic><topic>Nodes</topic><topic>Privacy</topic><topic>Security management</topic><topic>Smartphones</topic><topic>Support vector machines</topic><topic>Training</topic><topic>Unmanned aerial vehicles</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Lin, Fuhong</creatorcontrib><creatorcontrib>Lü, Xing</creatorcontrib><creatorcontrib>Zhou, Xianwei</creatorcontrib><creatorcontrib>An, Xingshuo</creatorcontrib><creatorcontrib>Yang, Lei</creatorcontrib><collection>الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals</collection><collection>معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete</collection><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless communications and mobile computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Lin, Fuhong</au><au>Lü, Xing</au><au>Zhou, Xianwei</au><au>An, Xingshuo</au><au>Yang, Lei</au><au>Wang, Shangguang</au><au>Shangguang Wang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC</atitle><jtitle>Wireless communications and mobile computing</jtitle><date>2018-01-01</date><risdate>2018</risdate><volume>2018</volume><issue>2018</issue><spage>1</spage><epage>10</epage><pages>1-10</pages><issn>1530-8669</issn><eissn>1530-8677</eissn><abstract>Fog computing, as a new paradigm, has many characteristics that are different from cloud computing. Due to the resources being limited, fog nodes/MEC hosts are vulnerable to cyberattacks. Lightweight intrusion detection system (IDS) is a key technique to solve the problem. Because extreme learning machine (ELM) has the characteristics of fast training speed and good generalization ability, we present a new lightweight IDS called sample selected extreme learning machine (SS-ELM). The reason why we propose “sample selected extreme learning machine” is that fog nodes/MEC hosts do not have the ability to store extremely large amounts of training data sets. Accordingly, they are stored, computed, and sampled by the cloud servers. Then, the selected sample is given to the fog nodes/MEC hosts for training. This design can bring down the training time and increase the detection accuracy. Experimental simulation verifies that SS-ELM performs well in intrusion detection in terms of accuracy, training time, and the receiver operating characteristic (ROC) value.</abstract><cop>Cairo, Egypt</cop><pub>Hindawi Publishing Corporation</pub><doi>10.1155/2018/7472095</doi><tpages>10</tpages><orcidid>https://orcid.org/0000-0002-5287-5226</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1530-8669
ispartof Wireless communications and mobile computing, 2018-01, Vol.2018 (2018), p.1-10
issn 1530-8669
1530-8677
language eng
recordid cdi_proquest_journals_2407627886
source Wiley-Blackwell Open Access Titles; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; Alma/SFX Local Collection
subjects Access control
Algorithms
Alliances
Artificial neural networks
Cloud computing
Computer simulation
Forensic sciences
Internet of Things
Intrusion detection systems
Lightweight
Machine learning
Neural networks
Nodes
Privacy
Security management
Smartphones
Support vector machines
Training
Unmanned aerial vehicles
title Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-27T17%3A46%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Sample%20Selected%20Extreme%20Learning%20Machine%20Based%20Intrusion%20Detection%20in%20Fog%20Computing%20and%20MEC&rft.jtitle=Wireless%20communications%20and%20mobile%20computing&rft.au=Lin,%20Fuhong&rft.date=2018-01-01&rft.volume=2018&rft.issue=2018&rft.spage=1&rft.epage=10&rft.pages=1-10&rft.issn=1530-8669&rft.eissn=1530-8677&rft_id=info:doi/10.1155/2018/7472095&rft_dat=%3Cproquest_cross%3E2407627886%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2407627886&rft_id=info:pmid/&rfr_iscdi=true