Skip to main content
Log in

IoT-Fog-Cloud model for anomaly detection using improved Naïve Bayes and principal component analysis

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Internet of Things (IoT) is one of the significant emerging domains in computing. IoT structures the base of future infrastructures, developing the advancement of future smart cities that are naturally moderate. However, IoT is vulnerable to different cyber-attacks. The most critical issues of the IoT are security and privacy. In this research, the integration of IoT with cloud and fog computing can present an improved platform to support IoT smart city applications. Cloud computing can provide data storage at top-level management and fog computing can offer various services for supporting smart city applications based on IoT. The integrated architecture of the IoT-Fog-Cloud computing model is presented in this research. For the analysis based on Network-based Intrusion Detection System (NIDS) anomaly detection, the Improved Naïve Bayes (INB) classifier based on Principal Component Analysis (PCA) technique is proposed in this work. The UNSW-NB15 dataset is used for the evaluation of the attack detection model. The PCA technique is used to extract features of the dataset, and the INB classifier is used for the classification of attacks. This technique is proposed to enhance the efficiency of the anomaly detection and to improve the performance analysis in terms of accuracy, precision, recall, and detection rate. The INB-PCA achieved 92.48% accuracy and 95.35% detection rate.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  • Afag SEB (2020) Classification of lung nodules using improved residual convolutional neural network. J Comput Sci Intell Technol 1(1):15–21

    Google Scholar 

  • Anuroop G, Tim W, Maia A, Jyotheesh G (2020) Detecting sensor faults, anomalies, and outliers in the internet of things: a survey on the challenges and solutions. Electron 9(511):1–15

    Google Scholar 

  • Eltigani AMY, Hassan IB (2020) Classification of diabetic retinopathy using stacked autoencoder-based deep neural network. J Comput Sci Intell Technol 1(1):09–14

    Google Scholar 

  • Husam R, Tibor C (2018) IoT based Smart Cities. In: International Symposium on Networks, Computers, and Communications (ISNCC), pp 1–4

  • Ibrahim A, Ali A, Esam A, Raed A, Mohamed Z, Hua M (2019) AD-IoT: anomaly detection of IoT cyberattacks smart city using machine learning. In: IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), pp 305–310

  • Ioannis S, Panayiotis K, Mihalis P, Cristina A, Javier L (2018) A Survey of IoT-enabled cyberattacks: assessing attack paths to critical infrastructures and services. IEEE Commun Surv Tutor 20(4):3453–3495

    Article  Google Scholar 

  • Iqbal HS, Yoosef BA, Fawaz A, Asif IK (2020) IntruDTree: a machine learning-based cyber security intrusion detection model. Symmetry 12(754):1–15

    Google Scholar 

  • Jadel A, Khalid A (2019) Internet of Things cyber attacks detection using machine learning. Int J Adv Comput Sci Appli 10(12):627–634

    Google Scholar 

  • Joy D, Sarbani R (2017) IoT-Fog-Cloud based architecture for smart city: prototype of a smart building. In: 2017 7th International Conference on Cloud Computing, Data Science and Engineering–Confluence, pp 237–242

  • Junaid A, Muhammad AA, Roohi A, Khaled S, Mamoun A, Razi I (2020) A review of performance, energy, and privacy of intrusion detection systems for IoT. Electron 9(629):1–24

    Google Scholar 

  • Kejun C, Shuai Z, Zhikun L, Yi Z, Qingxu D, Sandip R, Yier J (2018) Internet-of-things security and vulnerabilities: taxonomy, challenges, and practice. J Hardw Syst Sec 2:97–110

    Article  Google Scholar 

  • Mahmudul H, Md. Milon I, Md. Ishrak IZ, Hashem MMA (2019) Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet Things 7:1–14

    Google Scholar 

  • Mao VN, Hakima C, Tie L, Tony QSQ (2019) Adaptive anomaly detection for IoT data in hierarchical edge computing. AAAI Workshop Artif Intell Things (AIoT)

  • Moustafa N, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, pp 1–6. https://www.unsw.adfa.edu.au/unsw-canberra-cyber/cybersecurity/ADFA-NB15-Datasets/. Accessed 16 Oct 2020

  • Muhammad B, Rana AR, Bilal K, Byung-Seo K (2018) IoT elements, layered architectures, and security issues: a comprehensive survey. Sensors 8(2796):1–37

    Google Scholar 

  • Muneeshwari P, Kishanthini M (2020) A new framework for anomaly detection in NSL-KDD dataset using hybrid neuro-weighted genetic algorithm. J Comput Sci Intell Technol 1(1):29–36

    Google Scholar 

  • Mustafa M, Eltayeb AR, Mustafa ES (2020) Hybrid convolutional neural network with PSO based severe dengue prognosis method in human genome data. J Comput Sci Intell Technol 1(1):22–28

    Google Scholar 

  • Nader M, Jameela A J, Imad J (2019) Towards fault-Tolerant Fog computing for IoT-based smart city applications. In: IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), pp 752–757

  • Nadia C, Mohamed M, Akka Z, Cyrille S, Parvez F (2019) Network intrusion detection for IoT security based on learning techniques. IEEE Commun Surv Tutorials 21(3):2671–2701

    Article  Google Scholar 

  • Narmatha C, Eljack SM, Tuka AARM, Manimurgan S, Mustafa M (2020) A hybrid fuzzy brain-storm optimization algorithm for the classification of brain tumor MRI images. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-020-02470-5

    Article  Google Scholar 

  • Prajoona V, Sriramakrishnan P, Sridhar S, Charlyn Pushpa Latha G, Priya A, Ramkumar S, Robert Singh A, Rajendran T (2020) Knowledge based fuzzy c-means method for rapid brain tissues segmentation of magnetic resonance imaging scans with CUDA enabled GPU machine. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-020-02132-6

    Article  Google Scholar 

  • Pu L, Chen X, Xu J, Fu X (2016) D2D fogging: an energy-efficient and incentive-aware task offloading framework via network-assisted D2D collaboration. IEEE J Sel Areas Commun 34(12):3887–3901

    Article  Google Scholar 

  • Salaheldin LS, Lutfi AM (2020) A novel intrusion detection system in WSN using Hybrid Neuro-Fuzzy filter with ant colony algorithm. J Comput Sci Intell Technol 1(1):01–08

    Google Scholar 

  • Shyara TR, Saroj H (2013) Enhanced Naïve Bayes algorithm for intrusion detection in data mining. Int J Comput Sci Inform Technol 4(6):960–962

    Google Scholar 

  • Thavasimuthu R, Sridhar KP, Manimurugan S, Deepa S (2019) Recent innovations in soft computing applications. Curr Signal Transduct Ther 14(2):129–130

    Article  Google Scholar 

  • Tran V K, Yuris M S, Dinh T H, Nguyen L T, Diep N, Nguyen V H, Eryk D (2020) Collaborative Learning Model for Cyberattack Detection Systems in IoT Industry 4.0. IEEE Wireless Communications and Networking Conference (WCNC), pp 1–6

  • Xiaoyan H, Liancheng X, Min R, Weiping G (2015) A Naive Bayesian network intrusion detection algorithm based on Principal Component Analysis. In: 7th International Conference on Information Technology in Medicine and Education, pp 325–328

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Manimurugan.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Manimurugan, S. IoT-Fog-Cloud model for anomaly detection using improved Naïve Bayes and principal component analysis. J Ambient Intell Human Comput (2021). https://doi.org/10.1007/s12652-020-02723-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12652-020-02723-3

Keywords

Navigation