DOI QR코드

DOI QR Code

Intrusion Detection for IoT Traffic in Edge Cloud

에지 클라우드 환경에서 사물인터넷 트래픽 침입 탐지

  • Shin, Kwang-Seong (Department of Digital Contents Engineering, WonKwang University) ;
  • Youm, Sungkwan (Department of Information & Communication Engineering Department, WonKwang University)
  • Received : 2019.11.08
  • Accepted : 2019.11.18
  • Published : 2020.01.31

Abstract

As the IoT is applied to home and industrial networks, data generated by the IoT is being processed at the cloud edge. Intrusion detection function is very important because it can be operated by invading IoT devices through the cloud edge. Data delivered to the edge network in the cloud environment is traffic at the application layer. In order to determine the intrusion of the packet transmitted to the IoT, the intrusion should be detected at the application layer. This paper proposes the intrusion detection function at the application layer excluding normal traffic from IoT intrusion detection function. As the proposed method, we obtained the intrusion detection result by decision tree method and explained the detection result for each feature.

Keywords

References

  1. Y. Ai, M. Peng, and K. Zhang, "Edge cloud computing technologies for internet of things: A primer," Digital Communications and Networks, vol 4, no. 2, pp. 77-86, 2017.
  2. A. Alnoman, S. K. Sharma, W. Ejaz, and A. Anpalagan, "Emerging Edge Computing Technologies for Distributed IoT Systems," IEEE Network, vol. 33, no. 6, pp. 140-147, 2019. https://doi.org/10.1109/MNET.2019.1800543
  3. S. Raponi, M. Caprolu, and R. D. Pietro "Intrusion Detection at the Network Edge: Solutions, Limitations, and Future Directions," in International Conference on Edge Computing, San Diego : SD, 2019.
  4. B. B. Zarpelao, R. S. Miani, C. T. Kawakani, and S. C. de Alvarenga, "A survey of intrusion detection in Internet of Things," Journal of Network and Computer Applications, vol. 84, no. 15, pp. 25-37. 2017. https://doi.org/10.1016/j.jnca.2017.02.009
  5. M. F. Elrawy, A. I. Awad, and H. F. A. Hamed, "Intrusion detection systems for IoT-based smart environments: a survey," Journal of Cloud Computing: Advances, Systems and Applications, vol. 7, no. 21, pp 1-20, 2018. https://doi.org/10.1186/s13677-017-0102-3
  6. M. Hasan, Md. M. Islam, Md I. I. Zarif, and M. M. A. Hashem, "Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches," Internet of Things, vol. 7, 2019.
  7. UCI. 2009. The 3rd International Knowledge Discovery and Data Mining Tools Competition. [Internet]. Available: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.