{"title":"利用生成式对抗网络和长短期记忆网络实现雾环境中的入侵检测","authors":"","doi":"10.1016/j.cose.2024.104004","DOIUrl":null,"url":null,"abstract":"<div><p>Recently, fog computing has been developed to complement cloud computing, which can provide cloud services at the edge of the network with real-time processing. However, the computational power of fog nodes is limited and this leads to security issues. On the other hand, cyber-attacks have become common with the exponential growth of Internet of Things (IoT) connected devices. This fact necessitates the development of Intrusion Detection Systems (IDSs) in fog environments with the aim of detecting attacks. In this paper, we develop an IDS named GAN-LSTM for fog environments that uses Generative Adversarial Networks (GANs) and Long Short-Term Memory Networks (LSTMs). GAN-LSTM is used to identify anomalies in network traffic to specific types of attacks or non-attacks. In general, GAN-LSTM consists of three components: data preprocessing, generation of real traffic patterns, and sequence analysis of real traffic data. Data preprocessing ensures data quality by removing noise and irrelevant features. The pre-processed data is fed to the GAN to generate real traffic as a baseline for normal behavior. Finally, the LSTM component is applied to detect anomalous anomalies in fog computing. The proposed algorithm was evaluated on public databases and experimental results showed that GAN-LSTM improves the accuracy of attack detection compared to equivalent approaches.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8000,"publicationDate":"2024-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Towards intrusion detection in fog environments using generative adversarial network and long short-term memory network\",\"authors\":\"\",\"doi\":\"10.1016/j.cose.2024.104004\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>Recently, fog computing has been developed to complement cloud computing, which can provide cloud services at the edge of the network with real-time processing. However, the computational power of fog nodes is limited and this leads to security issues. On the other hand, cyber-attacks have become common with the exponential growth of Internet of Things (IoT) connected devices. This fact necessitates the development of Intrusion Detection Systems (IDSs) in fog environments with the aim of detecting attacks. In this paper, we develop an IDS named GAN-LSTM for fog environments that uses Generative Adversarial Networks (GANs) and Long Short-Term Memory Networks (LSTMs). GAN-LSTM is used to identify anomalies in network traffic to specific types of attacks or non-attacks. In general, GAN-LSTM consists of three components: data preprocessing, generation of real traffic patterns, and sequence analysis of real traffic data. Data preprocessing ensures data quality by removing noise and irrelevant features. The pre-processed data is fed to the GAN to generate real traffic as a baseline for normal behavior. Finally, the LSTM component is applied to detect anomalous anomalies in fog computing. The proposed algorithm was evaluated on public databases and experimental results showed that GAN-LSTM improves the accuracy of attack detection compared to equivalent approaches.</p></div>\",\"PeriodicalId\":51004,\"journal\":{\"name\":\"Computers & Security\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":4.8000,\"publicationDate\":\"2024-07-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computers & Security\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0167404824003092\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404824003092","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Towards intrusion detection in fog environments using generative adversarial network and long short-term memory network
Recently, fog computing has been developed to complement cloud computing, which can provide cloud services at the edge of the network with real-time processing. However, the computational power of fog nodes is limited and this leads to security issues. On the other hand, cyber-attacks have become common with the exponential growth of Internet of Things (IoT) connected devices. This fact necessitates the development of Intrusion Detection Systems (IDSs) in fog environments with the aim of detecting attacks. In this paper, we develop an IDS named GAN-LSTM for fog environments that uses Generative Adversarial Networks (GANs) and Long Short-Term Memory Networks (LSTMs). GAN-LSTM is used to identify anomalies in network traffic to specific types of attacks or non-attacks. In general, GAN-LSTM consists of three components: data preprocessing, generation of real traffic patterns, and sequence analysis of real traffic data. Data preprocessing ensures data quality by removing noise and irrelevant features. The pre-processed data is fed to the GAN to generate real traffic as a baseline for normal behavior. Finally, the LSTM component is applied to detect anomalous anomalies in fog computing. The proposed algorithm was evaluated on public databases and experimental results showed that GAN-LSTM improves the accuracy of attack detection compared to equivalent approaches.
期刊介绍:
Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world.
Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.