Aravind Karrothu, G. V. Sriramakrishnan, V. Ragavi
{"title":"Gazelle-Dingo Optimization and Ensemble Classification: A Hybrid Approach for Intrusion Detection in Fog Computing","authors":"Aravind Karrothu, G. V. Sriramakrishnan, V. Ragavi","doi":"10.1002/ett.70084","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>Fog computing is a system that expands the cloud services to the network to manipulate the inherent issues of the cloud. An intrusion detection system (IDS) is a network security tool for monitoring a computer network for malicious activities that include potential threats, abnormal activities, and unauthorized access to fog networks. It is a key component of fog network security that provides quality of service in data communication. In this research, the intrusion is detected using the Ensemble classifier in the fog layer by utilizing the proposed gazelle dingo optimization (GDO). Here, three layers are considered for the entire process, including the endpoint layer, cloud layer, and fog layer. Initially, the physical process is done in the endpoint layer for connecting and exchanging the information. Then, at the cloud layer, various processes like data transformation, feature selection, and ensemble classification are carried out. The data transformation process utilizes Yeo-Johnson transformation, followed by feature selection that is done by Kulczynski similarity. Afterward, the selected features are fed toward ensemble classifiers such as deep residual network (DRN), deep belief network (DBN), and Zeiler-Fergus network (ZF-Net) for the classification, where the ensemble classifier is tuned by GDO. Finally, the fog layer detects the intrusion using an ensemble classifier tuned by GDO. The GDO is formed by combining the gazelle optimization algorithm (GOA) and dingo optimization algorithm (DOA). Here, the proposed GDO-Ensemble Classifier attained the superior values of precision, recall, and F-measure of 0.922, 0.935, and 0.918.</p>\n </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 3","pages":""},"PeriodicalIF":2.5000,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Transactions on Emerging Telecommunications Technologies","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/ett.70084","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0
Abstract
Fog computing is a system that expands the cloud services to the network to manipulate the inherent issues of the cloud. An intrusion detection system (IDS) is a network security tool for monitoring a computer network for malicious activities that include potential threats, abnormal activities, and unauthorized access to fog networks. It is a key component of fog network security that provides quality of service in data communication. In this research, the intrusion is detected using the Ensemble classifier in the fog layer by utilizing the proposed gazelle dingo optimization (GDO). Here, three layers are considered for the entire process, including the endpoint layer, cloud layer, and fog layer. Initially, the physical process is done in the endpoint layer for connecting and exchanging the information. Then, at the cloud layer, various processes like data transformation, feature selection, and ensemble classification are carried out. The data transformation process utilizes Yeo-Johnson transformation, followed by feature selection that is done by Kulczynski similarity. Afterward, the selected features are fed toward ensemble classifiers such as deep residual network (DRN), deep belief network (DBN), and Zeiler-Fergus network (ZF-Net) for the classification, where the ensemble classifier is tuned by GDO. Finally, the fog layer detects the intrusion using an ensemble classifier tuned by GDO. The GDO is formed by combining the gazelle optimization algorithm (GOA) and dingo optimization algorithm (DOA). Here, the proposed GDO-Ensemble Classifier attained the superior values of precision, recall, and F-measure of 0.922, 0.935, and 0.918.
期刊介绍:
ransactions on Emerging Telecommunications Technologies (ETT), formerly known as European Transactions on Telecommunications (ETT), has the following aims:
- to attract cutting-edge publications from leading researchers and research groups around the world
- to become a highly cited source of timely research findings in emerging fields of telecommunications
- to limit revision and publication cycles to a few months and thus significantly increase attractiveness to publish
- to become the leading journal for publishing the latest developments in telecommunications