iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://unpaywall.org/10.1007/S10115-024-02162-Y
Taxonomy of deep learning-based intrusion detection system approaches in fog computing: a systematic review | Knowledge and Information Systems Skip to main content

Advertisement

Log in

Taxonomy of deep learning-based intrusion detection system approaches in fog computing: a systematic review

  • Review
  • Published:
Knowledge and Information Systems Aims and scope Submit manuscript

A Correction to this article was published on 05 October 2024

This article has been updated

Abstract

The Internet of Things (IoT) has been used in various aspects. Fundamental security issues must be addressed to accelerate and develop the Internet of Things. An intrusion detection system (IDS) is an essential element in network security designed to detect and determine the type of attacks. The use of deep learning (DL) shows promising results in the design of IDS based on IoT. DL facilitates analytics and learning in the dynamic IoT domain. Some deep learning-based IDS in IOT sensors cannot be executed, because of resource restrictions. Although cloud computing could overcome limitations, the distance between the cloud and the end IoT sensors causes high communication costs, security problems and delays. Fog computing has been presented to handle these issues and can bring resources to the edge of the network. Many studies have been conducted to investigate IDS based on IoT. Our goal is to investigate and classify deep learning-based IDS on fog processing. In this paper, researchers can access comprehensive resources in this field. Therefore, first, we provide a complete classification of IDS in IoT. Then practical and important proposed IDSs in the fog environment are discussed in three groups (binary, multi-class, and hybrid), and are examined the advantages and disadvantages of each approach. The results show that most of the studied methods consider hybrid strategies (binary and multi-class). In addition, in the reviewed papers the average Accuracy obtained in the binary method is better than the multi-class. Finally, we highlight some challenges and future directions for the next research in IDS techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Availability of data and materials

Not applicable.

Change history

References

  1. Chopade SS, Gupta HP, Dutta T (2023) Survey on sensors and smart devices for IoT enabled intelligent healthcare system. Wirel Pers Commun 131:1957–1995. https://doi.org/10.1007/s11277-023-10528-8

    Article  Google Scholar 

  2. Nassereddine M, Khang A (2024) Applications of Internet of Things (IoT) in smart cities. In: Khang A, Abdullayev V, Hahanov V, Shah V (eds) Advanced IoT technologies and applications in the industry 4.0 digital economy. CRC Press, Boca Raton, pp 109–136

    Google Scholar 

  3. Parihar A, Prajapati JB, Prajapati BG et al (2024) Role of IOT in healthcare: applications, security and privacy concerns. Intell Pharm. https://doi.org/10.1016/j.ipha.2024.01.003

    Article  Google Scholar 

  4. Kannan P, Mohamed Roshan Abu Firnass M, Bose J et al (2024) Soil moisture and temperature management using IoT for sustainable farming. In: Pandey K, Kushwaha NL, Pande CB, Singh KG (eds) Artificial intelligence and smart agriculture. Springer Nature Singapore, Singapore, pp 209–230

    Chapter  Google Scholar 

  5. Heidari A, Jafari Navimipour N, Unal M, Zhang G (2023) Machine learning applications in Internet-of-Drones: systematic review, recent deployments, and open issues. ACM Comput Surv 55:1–45. https://doi.org/10.1145/3571728

    Article  Google Scholar 

  6. Rath KC, Khang A, Roy D (2024) The role of Internet of Things (IoT) technology in industry 4.0 economy. In: Khang A, Abdullayev V, Hahanov V, Shah V (eds) Advanced IoT technologies and applications in the industry 4.0 digital economy. CRC Press, Boca Raton, pp 1–28

    Google Scholar 

  7. Prakash R, Jyoti N, Manjunatha S (2024) A survey of security challenges, attacks in IoT. In: E3S Web of Conferences. EDP Sciences, p 04018

  8. Madhu B, Gopalachari MV (2023) Classification of the severity of attacks on Internet of Things networks. In: Shakya S, Du K-L, Ntalianis K (eds) Sentiment analysis and deep learning. Springer Nature Singapore, Singapore, pp 411–424

    Chapter  Google Scholar 

  9. Dargaoui S, Azrour M, El Allaoui A et al (2023) An overview of the security challenges in IoT environment. In: Mabrouki J, Mourade A, Irshad A, Chaudhry SA (eds) Advanced technology for smart environment and energy. Springer International Publishing, Cham, pp 151–160

    Chapter  Google Scholar 

  10. Sarker IH, Khan AI, Abushark YB, Alsolami F (2023) Internet of Things (IoT) security intelligence: a comprehensive overview, machine learning solutions and research directions. Mob Netw Appl 28:296–312. https://doi.org/10.1007/s11036-022-01937-3

    Article  Google Scholar 

  11. Jahangir H, Lakshminarayana S, Maple C, Epiphaniou G (2023) A deep learning-based solution for securing the power grid against load altering threats by IoT-enabled devices. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2023.3240289

    Article  Google Scholar 

  12. Soe YN, Feng Y, Santosa PI et al (2020) Implementing lightweight IoT-IDS on Raspberry Pi using correlation-based feature selection and its performance evaluation. In: Barolli L, Takizawa M, Xhafa F, Enokido T (eds) Advanced information networking and applications. Springer International Publishing, Cham, pp 458–469

    Chapter  Google Scholar 

  13. Otoum Y, Liu D, Nayak A (2022) DL-IDS: a deep learning–based intrusion detection framework for securing IoT. Trans Emerg Tel Tech 33:e3803. https://doi.org/10.1002/ett.3803

    Article  Google Scholar 

  14. Sriram S, Shashank A, Vinayakumar R, Soman KP (2020) DCNN–IDS: deep convolutional neural network based intrusion detection system. In: Balusamy S, Dudin AN, Graña M et al (eds) Computational intelligence, cyber security and computational models. Models and techniques for intelligent systems and automation. Springer Singapore, Singapore, pp 85–92

    Google Scholar 

  15. Sakhnini J, Karimipour H, Dehghantanha A et al (2023) A generalizable deep neural network method for detecting attacks in industrial cyber-physical systems. IEEE Syst J. https://doi.org/10.1109/JSYST.2023.3286375

    Article  Google Scholar 

  16. Shafiq M, Tian Z, Bashir AK et al (2020) IoT malicious traffic identification using wrapper-based feature selection mechanisms. Comput Secur 94:101863

    Article  Google Scholar 

  17. Yakubu J, Abdulhamid SM, Christopher HA et al (2019) Security challenges in fog-computing environment: a systematic appraisal of current developments. J Reliab Intell Environ. https://doi.org/10.1007/s40860-019-00081-2

    Article  Google Scholar 

  18. Tamrakar M, Jain S, Doriya R (2021) Security issues in fog computing. In: 2021 5th International conference on intelligent computing and control systems (ICICCS). IEEE, pp 1853–1858

  19. Yi S, Qin Z, Li Q (2015) Security and privacy issues of fog computing: A survey. In: International conference on wireless algorithms, systems, and applications. Springer, pp 685–695

  20. Heidari A, Jabraeil Jamali MA (2023) Internet of Things intrusion detection systems: a comprehensive review and future directions. Clust Comput 26:3753–3780. https://doi.org/10.1007/s10586-022-03776-z

    Article  Google Scholar 

  21. da Costa KA, Papa JP, Lisboa CO et al (2019) Internet of Things: a survey on machine learning-based intrusion detection approaches. Comput Netw 151:147–157

    Article  Google Scholar 

  22. Farnaaz N, Jabbar MA (2016) Random forest modeling for network intrusion detection system. Procedia Comput Sci 89:213–217

    Article  Google Scholar 

  23. Wang H, Gu J, Wang S (2017) An effective intrusion detection framework based on SVM with feature augmentation. Knowl Based Syst 136:130–139

    Article  Google Scholar 

  24. Ahmad Z, Shahid Khan A, Wai Shiang C et al (2021) Network intrusion detection system: a systematic study of machine learning and deep learning approaches. Trans Emerg Telecommun Technol 32:e4150

    Article  Google Scholar 

  25. Labiod Y, Amara Korba A, Ghoualmi N (2022) Fog computing-based intrusion detection architecture to protect IoT networks. Wirel Pers Commun. https://doi.org/10.1007/s11277-022-09548-7

    Article  Google Scholar 

  26. de Souza CA, Westphall CB, Machado RB (2022) Two-step ensemble approach for intrusion detection and identification in IoT and fog computing environments. Comput Electr Eng 98:107694

    Article  Google Scholar 

  27. de Souza CA, Westphall CB, Machado RB et al (2020) Hybrid approach to intrusion detection in fog-based IoT environments. Comput Netw 180:107417

    Article  Google Scholar 

  28. Maithem M, Al-sultany GA (2021) Network intrusion detection system using deep neural networks. J Phys Conf Ser. https://doi.org/10.1088/1742-6596/1804/1/012138

    Article  Google Scholar 

  29. Zwayed FA, Anbar M, Sanjalawe Y, Manickam S (2021) Intrusion detection systems in fog computing—a review. In: international conference on advances in cyber security. Springer, pp 481–504

  30. Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on Mobile cloud computing. pp 13–16

  31. Dastjerdi AV, Buyya R (2016) Fog computing: helping the Internet of Things realize its potential. Computer 49:112–116

    Article  Google Scholar 

  32. Hashemi SM, Sahafi A, Rahmani AM, Bohlouli M (2024) Energy-aware resource management in fog computing for IoT applications: a review, taxonomy, and future directions. Softw Pract Exp 54:109–148. https://doi.org/10.1002/spe.3273

    Article  Google Scholar 

  33. Abofathi Y, Anari B, Masdari M (2024) A learning automata based approach for module placement in fog computing environment. Expert Syst Appl 237:121607

    Article  Google Scholar 

  34. Pakmehr A, Gholipour M, Zeinali E (2024) ETFC: energy-efficient and deadline-aware task scheduling in fog computing. Sustain Comput Inform Syst. https://doi.org/10.1016/j.suscom.2024.100988

    Article  Google Scholar 

  35. Sabireen H, Neelanarayanan V (2021) A review on fog computing: architecture, fog with IoT, algorithms and research challenges. ICT Express 7:162–176

    Article  Google Scholar 

  36. Zhang J, Chen B, Zhao Y et al (2018) Data security and privacy-preserving in edge computing paradigm: survey and open issues. IEEE access 6:18209–18237

    Article  Google Scholar 

  37. An X, Su J, Lü X, Lin F (2018) Hypergraph clustering model-based association analysis of DDOS attacks in fog computing intrusion detection system. EURASIP J Wirel Commun Netw 2018:1–9

    Article  Google Scholar 

  38. Rezapour R, Asghari P, Javadi HHS, Ghanbari S (2021) Security in fog computing: a systematic review on issues, challenges and solutions. Comput Sci Rev 41:100421

    Article  Google Scholar 

  39. Jumani AK, Shi J, Laghari AA et al (2023) Fog computing security: a review. Secur Priv 6:e313. https://doi.org/10.1002/spy2.313

    Article  Google Scholar 

  40. Alwakeel AM (2021) An overview of fog computing and edge computing security and privacy issues. Sensors 21:8226

    Article  Google Scholar 

  41. KarsligEl ME, Yavuz AG, Güvensan MA, et al (2017) Network intrusion detection using machine learning anomaly detection algorithms. In: 2017 25th Signal processing and communications applications conference (SIU). IEEE, pp 1–4

  42. Liao H-J, Lin C-HR, Lin Y-C, Tung K-Y (2013) Intrusion detection system: a comprehensive review. J Netw Comput Appl 36:16–24

    Article  Google Scholar 

  43. Smys S, Basar A, Wang H (2020) Hybrid intrusion detection system for internet of things (IoT). J ISMAC 2:190–199

    Article  Google Scholar 

  44. Mukherjee M, Matam R, Shu L et al (2017) Security and privacy in fog computing: challenges. IEEE Access 5:19293–19304

    Article  Google Scholar 

  45. Sehgal VK, Patrick A, Soni A, Rajput L (2015) Smart human security framework using internet of things, cloud and fog computing. In: Buyya R, Thampi SM (eds) Intelligent distributed computing. Springer, Cham, pp 251–263

    Chapter  Google Scholar 

  46. Krishnaveni S, Vigneshwar P, Kishore S et al (2020) Anomaly-based intrusion detection system using support vector machine. In: Dash SS, Lakshmi C, Das S, Panigrahi BK (eds) Artificial intelligence and evolutionary computations in engineering systems. Springer Singapore, Singapore, pp 723–731

    Chapter  Google Scholar 

  47. Choubisa M, Doshi R, Khatri N, Hiran KK (2022) A simple and robust approach of random forest for intrusion detection system in cyber security. In: 2022 International conference on IoT and blockchain technology (ICIBT). IEEE, pp 1–5

  48. Louk MHL, Tama BA (2023) Dual-IDS: a bagging-based gradient boosting decision tree model for network anomaly intrusion detection system. Expert Syst Appl 213:119030

    Article  Google Scholar 

  49. Kabanda G (2020) A Bayesian network model for machine learning and cyber security. In: Proceedings of the 2nd Africa–Asia dialogue network (AADN) international conference on advances in business management and electronic commerce research. ACM, Ganzhou China, pp 1–7

  50. Kherbache M, Espes D, Amroun K (2021) An enhanced approach of the K-Means clustering for Anomaly-based intrusion detection systems. In: 2021 International conference on computing, computational modelling and applications (ICCMA). IEEE, pp 78–83

  51. Kasongo SM (2023) A deep learning technique for intrusion detection system using a recurrent neural networks based framework. Comput Commun 199:113–125

    Article  Google Scholar 

  52. Awajan A (2023) A novel deep learning-based intrusion detection system for IOT networks. Computers 12:34

    Article  Google Scholar 

  53. Li Y, Ma R, Jiao R (2015) A hybrid malicious code detection method based on deep learning. Int J Secur Its Appl 9:205–216

    Google Scholar 

  54. Srirama SN (2024) A decade of research in fog computing: relevance, challenges, and future directions. Softw Pract Exp 54:3–23. https://doi.org/10.1002/spe.3243

    Article  Google Scholar 

  55. Zhang P, Zhou M, Fortino G (2018) Security and trust issues in fog computing: a survey. Future Gener Comput Syst 88:16–27

    Article  Google Scholar 

  56. Bazgir E, Haque E, Sharif NB, Ahmed MF (2023) Security aspects in IoT based cloud computing. World J Adv Res Rev 20:540–551

    Article  Google Scholar 

  57. Aliyu F, Sheltami T, Mahmoud A et al (2021) Detecting man-in-the-middle attack in fog computing for social media. Comput Mater Continua. https://doi.org/10.32604/cmc.2021.016938

    Article  Google Scholar 

  58. Duolikun D, Enokido T, Takizawa M (2023) A flexible fog computing (FTBFC) model to reduce energy consumption of the IoT. In: International conference on emerging internetworking, data and web technologies. Springer, pp 256–267

  59. Vijarania M, Gupta S, Agrawal A et al (2023) Energy efficient load-balancing mechanism in integrated IoT–Fog–cloud environment. Electronics 12:2543

    Article  Google Scholar 

  60. Hindy H, Brosset D, Bayne E, et al (2018) A taxonomy and survey of intrusion detection system design techniques, network threats and datasets.

  61. Alrajeh NA, Lloret J (2013) Intrusion detection systems based on artificial intelligence techniques in wireless sensor networks. Int J Distrib Sens Netw 9:351047

    Article  Google Scholar 

  62. Kreibich C, Crowcroft J (2004) Honeycomb: creating intrusion detection signatures using honeypots. ACM SIGCOMM Comput Commun Rev 34:51–56

    Article  Google Scholar 

  63. Díaz-Verdejo J, Muñoz-Calle J, Estepa Alonso A et al (2022) On the detection capabilities of signature-based intrusion detection systems in the context of web attacks. Appl Sci 12:852

    Article  Google Scholar 

  64. Kumar P, Gupta GP, Tripathi R (2021) Design of anomaly-based intrusion detection system using fog computing for IoT network. Autom Control Comput Sci 55:137–147

    Article  Google Scholar 

  65. Keserwani PK, Govil MC, Pilli ES, Govil P (2021) A smart anomaly-based intrusion detection system for the Internet of Things (IoT) network using GWO–PSO–RF model. J Reliab Intell Environ 7:3–21

    Article  Google Scholar 

  66. Gurung S, Ghose MK, Subedi A (2019) Deep learning approach on network intrusion detection system using NSL-KDD dataset. Int J Comput Netw Inf Secur 11:8–14

    Google Scholar 

  67. Deshpande P, Sharma SC, Peddoju SK, Junaid S (2018) HIDS: a host based intrusion detection system for cloud computing environment. Int J Syst Assur Eng Manag 9:567–576

    Article  Google Scholar 

  68. Ahmet EFE, Abaci İN (2022) Comparison of the host based intrusion detection systems and network based intrusion detection systems. Celal Bayar Univ J Sci 18:23–32

    Google Scholar 

  69. Ahamed J, Rajan AV (2016) Internet of Things (IoT): application systems and security vulnerabilities. In: 2016 5th International conference on electronic devices, systems and applications (ICEDSA). IEEE, pp 1–5

  70. Vasilomanolakis E, Karuppayah S, Mühlhäuser M, Fischer M (2015) Taxonomy and survey of collaborative intrusion detection. ACM Comput Surv (CSUR) 47:1–33

    Article  Google Scholar 

  71. Chen M, Hao Y, Li Y et al (2015) On the computation offloading at ad hoc cloudlet: architecture and service modes. IEEE Commun Mag 53:18–24

    Article  Google Scholar 

  72. Zhang Y, Niyato D, Wang P (2015) Offloading in mobile cloudlet systems with intermittent connectivity. IEEE Trans Mob Comput 14:2516–2529

    Article  Google Scholar 

  73. Abeshu A, Chilamkurti N (2018) Deep learning: the frontier for distributed attack detection in fog-to-things computing. IEEE Commun Mag 56:169–175. https://doi.org/10.1109/MCOM.2018.1700332

    Article  Google Scholar 

  74. Roopak M, Tian GY, Chambers J (2019) Deep learning models for cyber security in IoT Networks. In: 2019 IEEE 9th annual computing and communication workshop and conference (CCWC). IEEE, pp 0452–0457

  75. Sadaf K, Sultana J (2020) Intrusion detection based on autoencoder and isolation Forest in fog computing. IEEE Access 8:167059–167068

    Article  Google Scholar 

  76. Syed NF, Ge M, Baig Z (2023) Fog–cloud based intrusion detection system using recurrent neural networks and feature selection for IoT networks. Comput Netw 225:109662

    Article  Google Scholar 

  77. Yang Y, Tu S, Ali RH et al (2023) Intrusion detection based on bidirectional long short-term memory with attention mechanism. Comput Mater Continua. https://doi.org/10.32604/cmc.2023.031907

    Article  Google Scholar 

  78. Viet HN, Van QN, Trang LLT, Nathan S (2018) Using deep learning model for network scanning detection. In: Proceedings of the 4th international conference on frontiers of educational technologies. pp 117–121

  79. Sahar N, Mishra R, Kalam S (2021) Deep learning approach-based network intrusion detection system for fog-assisted IoT. In: Proceedings of international conference on big data, machine learning and their applications. Springer, pp 39–50

  80. Azarkasb SO, Kashi SS, Khasteh SH (2021) A network intrusion detection approach at the edge of fog. In: 2021 26th International computer conference, computer society of Iran (CSICC). IEEE, pp 1–6

  81. Kaliyaperumal K, Murugaiyan C, Perumal D et al (2023) Combined ensemble intrusion detection model using deep learning with feature selection for fog computing environments. Acta Sci Technol 45:e60551–e60551

    Article  Google Scholar 

  82. Zhao G, Wang Y, Wang J (2023) Lightweight intrusion detection model of the Internet of Things with hybrid cloud-fog computing. Secur Commun Netw. https://doi.org/10.1155/2023/7107663

    Article  Google Scholar 

  83. Binbusayyis A (2024) Hybrid VGG19 and 2D-CNN for intrusion detection in the FOG-cloud environment. Expert Syst Appl 238:121758

    Article  Google Scholar 

  84. Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using deep learning approach for Internet of Things. Future Gener Comput Syst 82:761–768. https://doi.org/10.1016/j.future.2017.08.043

    Article  Google Scholar 

  85. Diro A, Chilamkurti N (2018) Leveraging LSTM networks for attack detection in fog-to-things communications. IEEE Commun Mag 56:124–130

    Article  Google Scholar 

  86. Almiani M, AbuGhazleh A, Al-Rahayfeh A et al (2020) Deep recurrent neural network for IoT intrusion detection system. Simul Model Pract Theory 101:102031

    Article  Google Scholar 

  87. Ba NG, Selvakumar S (2020) Anomaly detection framework for Internet of things traffic using vector convolutional deep learning approach in fog environment. Future Gener Comput Syst 113:255–265

    Article  Google Scholar 

  88. Samy A, Yu H, Zhang H (2020) Fog-based attack detection framework for Internet of Things using deep learning. IEEE Access 8:74571–74585

    Article  Google Scholar 

  89. Roy S, Li J, Bai Y (2022) A two-layer fog-cloud intrusion detection model for IoT networks. Internet Things. https://doi.org/10.1016/j.iot.2022.100557

    Article  Google Scholar 

  90. Chen Y, Lin Q, Wei W et al (2022) Intrusion detection using multi-objective evolutionary convolutional neural network for Internet of Things in fog computing. Knowl Based Syst 244:108505

    Article  Google Scholar 

  91. Lazzarini R, Tianfield H, Charissis P (2023) A stacking ensemble of deep learning models for IoT network intrusion detection. Knowl Based Syst. https://doi.org/10.1016/j.knosys.2023.110941

    Article  Google Scholar 

  92. Soon HF, Amir A, Azemi SN (2021) An analysis of multiclass imbalanced data problem in machine learning for network attack detections. J Phys Conf Ser. https://doi.org/10.1088/1742-6596/1755/1/012030

    Article  Google Scholar 

  93. Poornima IGA, Paramasivan B (2020) Anomaly detection in wireless sensor network using machine learning algorithm. Comput Commun 151:331–337

    Article  Google Scholar 

  94. Sokolov AN, Pyatnitsky IA, Alabugin SK (2018) Research of classical machine learning methods and deep learning models effectiveness in detecting anomalies of industrial control system. In: 2018 Global smart industry conference (GloSIC). IEEE, pp 1–6

  95. Malaiya RK, Kwon D, Kim J, et al (2018) An empirical evaluation of deep learning for network anomaly detection. In: 2018 International conference on computing, networking and communications (ICNC). IEEE, pp 893–898

  96. Alqarni AA, El-Alfy E-SM (2022) Improving intrusion detection for imbalanced network traffic using generative deep learning. Int J Adv Comput Sci Appl. https://doi.org/10.14569/IJACSA.2022.01304109

    Article  Google Scholar 

  97. Illy P, Kaddoum G, Moreira CM, et al (2019) Securing fog-to-things environment using intrusion detection system based on ensemble learning. In: 2019 IEEE wireless communications and networking conference (WCNC). IEEE, pp 1–7

  98. Zhiqiang L, Mohi-Ud-Din G, Bing L, et al (2019) Modeling network intrusion detection system using feed-forward neural network using UNSW-NB15 dataset. In: 2019 IEEE 7th International conference on smart energy grid engineering (SEGE). IEEE, pp 299–303

  99. Heidari A, Navimipour NJ, Unal M (2023) A secure intrusion detection platform using blockchain and radial basis function neural networks for internet of drones. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2023.3237661

    Article  Google Scholar 

  100. Nakhodchi S, Zolfaghari B, Yazdinejad A, Dehghantanha A (2021) Steeleye: an application-layer attack detection and attribution model in industrial control systems using semi-deep learning. In: 2021 18th International conference on privacy, security and trust (PST). IEEE, pp 1–8

  101. Shakya AK, Pillai G, Chakrabarty S (2023) Reinforcement learning algorithms: a brief survey. Expert Syst Appl. https://doi.org/10.1016/j.eswa.2023.120495

    Article  Google Scholar 

  102. Krichen M (2023) Deep reinforcement learning. In: 2023 14th International conference on computing communication and networking technologies (ICCCNT). IEEE, pp 1–7

  103. Sater RA, Hamza AB (2021) A federated learning approach to anomaly detection in smart buildings. ACM Trans Internet Things 2:1–23. https://doi.org/10.1145/3467981

    Article  Google Scholar 

  104. Wen J, Zhang Z, Lan Y et al (2023) A survey on federated learning: challenges and applications. Int J Mach Learn Cybern 14:513–535. https://doi.org/10.1007/s13042-022-01647-y

    Article  Google Scholar 

  105. Yazdinejad A, Dehghantanha A, Parizi RM, Epiphaniou G (2023) An optimized fuzzy deep learning model for data classification based on NSGA-II. Neurocomputing 522:116–128

    Article  Google Scholar 

  106. Yazdinejad A, Dehghantanha A, Parizi RM et al (2023) Secure intelligent fuzzy blockchain framework: effective threat detection in IoT networks. Comput Ind 144:103801

    Article  Google Scholar 

  107. Namakshenas D, Yazdinejad A, Dehghantanha A, Srivastava G (2024) Federated quantum-based privacy-preserving threat detection model for consumer internet of things. IEEE Trans Consum Electro. https://doi.org/10.1109/TCE.2024.3377550

    Article  Google Scholar 

  108. Yazdinejad A, Dehghantanha A, Srivastava G et al (2024) Hybrid privacy preserving federated learning against irregular users in next-generation Internet of Things. J Syst Archit. https://doi.org/10.1016/j.sysarc.2024.103088

    Article  Google Scholar 

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed to the writing of the manuscript text and reviewed it.

Corresponding author

Correspondence to Abolfazl Toroghi Haghighat.

Ethics declarations

Conflict of interest

Not applicable.

Ethical approval

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

The original online version of this article was revised to update the typo in the author from Abolrazl Toroghi Haghighat to Abolfazl Toroghi Haghighat.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Najafli, S., Toroghi Haghighat, A. & Karasfi, B. Taxonomy of deep learning-based intrusion detection system approaches in fog computing: a systematic review. Knowl Inf Syst 66, 6527–6560 (2024). https://doi.org/10.1007/s10115-024-02162-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10115-024-02162-y

Keywords

Navigation