About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in New Computing Environments. Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings

Research Article

Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration

Download(Requires a free EAI acccount)
3 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-66922-5_22,
        author={Ruizhong Du and Yun Li and Xiaoyan Liang and Junfeng Tian},
        title={Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration},
        proceedings={Security and Privacy in New Computing Environments. Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings},
        proceedings_a={SPNCE},
        year={2021},
        month={1},
        keywords={Cloud-fog collaboration Intrusion detection Support vector machine Particle swarm optimization},
        doi={10.1007/978-3-030-66922-5_22}
    }
    
  • Ruizhong Du
    Yun Li
    Xiaoyan Liang
    Junfeng Tian
    Year: 2021
    Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration
    SPNCE
    Springer
    DOI: 10.1007/978-3-030-66922-5_22
Ruizhong Du1, Yun Li1,*, Xiaoyan Liang1, Junfeng Tian1
  • 1: Cyberspace Security and Computer College, Hebei University
*Contact email: 15232045203@163.com

Abstract

Fog computing is a new computing paradigm in the era of the Internet of Things. Aiming at the problem that fog nodes are closer to user equipment, with heterogeneous nodes, limited storage capacity resources, and greater vulnerability to intrusion, a lightweight support vector machine intrusion detection model based on Cloud-Fog Collaboration (CFC-SVM) is proposed. Due to the high dimensionality of network data, first, Principal Component Analysis (PCA) is used to reduce the dimensionality of the data, eliminate the correlation between attributes and reduce the training time. Then, in the cloud server, a support vector machine (SVM) optimized by the particle swarm algorithm is used to complete the training of the dataset, obtain the optimal SVM intrusion-detection classifier, send it to the fog node, and carry out attack detection at the fog node. Experiments with the classic KDD CUP 99 dataset show that the model in this paper is better than other similar algorithms in regard to detection time, detection rate and accuracy, which can effectively solve the problem of intrusion detection in the fog environment.

Keywords
Cloud-fog collaboration Intrusion detection Support vector machine Particle swarm optimization
Published
2021-01-22
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-66922-5_22
Copyright © 2020–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL