Abstract
The Internet of Things (IoT) has been used in various aspects. Fundamental security issues must be addressed to accelerate and develop the Internet of Things. An intrusion detection system (IDS) is an essential element in network security designed to detect and determine the type of attacks. The use of deep learning (DL) shows promising results in the design of IDS based on IoT. DL facilitates analytics and learning in the dynamic IoT domain. Some deep learning-based IDS in IOT sensors cannot be executed, because of resource restrictions. Although cloud computing could overcome limitations, the distance between the cloud and the end IoT sensors causes high communication costs, security problems and delays. Fog computing has been presented to handle these issues and can bring resources to the edge of the network. Many studies have been conducted to investigate IDS based on IoT. Our goal is to investigate and classify deep learning-based IDS on fog processing. In this paper, researchers can access comprehensive resources in this field. Therefore, first, we provide a complete classification of IDS in IoT. Then practical and important proposed IDSs in the fog environment are discussed in three groups (binary, multi-class, and hybrid), and are examined the advantages and disadvantages of each approach. The results show that most of the studied methods consider hybrid strategies (binary and multi-class). In addition, in the reviewed papers the average Accuracy obtained in the binary method is better than the multi-class. Finally, we highlight some challenges and future directions for the next research in IDS techniques.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Availability of data and materials
Not applicable.
Change history
05 October 2024
A Correction to this paper has been published: https://doi.org/10.1007/s10115-024-02206-3
References
Chopade SS, Gupta HP, Dutta T (2023) Survey on sensors and smart devices for IoT enabled intelligent healthcare system. Wirel Pers Commun 131:1957–1995. https://doi.org/10.1007/s11277-023-10528-8
Nassereddine M, Khang A (2024) Applications of Internet of Things (IoT) in smart cities. In: Khang A, Abdullayev V, Hahanov V, Shah V (eds) Advanced IoT technologies and applications in the industry 4.0 digital economy. CRC Press, Boca Raton, pp 109–136
Parihar A, Prajapati JB, Prajapati BG et al (2024) Role of IOT in healthcare: applications, security and privacy concerns. Intell Pharm. https://doi.org/10.1016/j.ipha.2024.01.003
Kannan P, Mohamed Roshan Abu Firnass M, Bose J et al (2024) Soil moisture and temperature management using IoT for sustainable farming. In: Pandey K, Kushwaha NL, Pande CB, Singh KG (eds) Artificial intelligence and smart agriculture. Springer Nature Singapore, Singapore, pp 209–230
Heidari A, Jafari Navimipour N, Unal M, Zhang G (2023) Machine learning applications in Internet-of-Drones: systematic review, recent deployments, and open issues. ACM Comput Surv 55:1–45. https://doi.org/10.1145/3571728
Rath KC, Khang A, Roy D (2024) The role of Internet of Things (IoT) technology in industry 4.0 economy. In: Khang A, Abdullayev V, Hahanov V, Shah V (eds) Advanced IoT technologies and applications in the industry 4.0 digital economy. CRC Press, Boca Raton, pp 1–28
Prakash R, Jyoti N, Manjunatha S (2024) A survey of security challenges, attacks in IoT. In: E3S Web of Conferences. EDP Sciences, p 04018
Madhu B, Gopalachari MV (2023) Classification of the severity of attacks on Internet of Things networks. In: Shakya S, Du K-L, Ntalianis K (eds) Sentiment analysis and deep learning. Springer Nature Singapore, Singapore, pp 411–424
Dargaoui S, Azrour M, El Allaoui A et al (2023) An overview of the security challenges in IoT environment. In: Mabrouki J, Mourade A, Irshad A, Chaudhry SA (eds) Advanced technology for smart environment and energy. Springer International Publishing, Cham, pp 151–160
Sarker IH, Khan AI, Abushark YB, Alsolami F (2023) Internet of Things (IoT) security intelligence: a comprehensive overview, machine learning solutions and research directions. Mob Netw Appl 28:296–312. https://doi.org/10.1007/s11036-022-01937-3
Jahangir H, Lakshminarayana S, Maple C, Epiphaniou G (2023) A deep learning-based solution for securing the power grid against load altering threats by IoT-enabled devices. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2023.3240289
Soe YN, Feng Y, Santosa PI et al (2020) Implementing lightweight IoT-IDS on Raspberry Pi using correlation-based feature selection and its performance evaluation. In: Barolli L, Takizawa M, Xhafa F, Enokido T (eds) Advanced information networking and applications. Springer International Publishing, Cham, pp 458–469
Otoum Y, Liu D, Nayak A (2022) DL-IDS: a deep learning–based intrusion detection framework for securing IoT. Trans Emerg Tel Tech 33:e3803. https://doi.org/10.1002/ett.3803
Sriram S, Shashank A, Vinayakumar R, Soman KP (2020) DCNN–IDS: deep convolutional neural network based intrusion detection system. In: Balusamy S, Dudin AN, Graña M et al (eds) Computational intelligence, cyber security and computational models. Models and techniques for intelligent systems and automation. Springer Singapore, Singapore, pp 85–92
Sakhnini J, Karimipour H, Dehghantanha A et al (2023) A generalizable deep neural network method for detecting attacks in industrial cyber-physical systems. IEEE Syst J. https://doi.org/10.1109/JSYST.2023.3286375
Shafiq M, Tian Z, Bashir AK et al (2020) IoT malicious traffic identification using wrapper-based feature selection mechanisms. Comput Secur 94:101863
Yakubu J, Abdulhamid SM, Christopher HA et al (2019) Security challenges in fog-computing environment: a systematic appraisal of current developments. J Reliab Intell Environ. https://doi.org/10.1007/s40860-019-00081-2
Tamrakar M, Jain S, Doriya R (2021) Security issues in fog computing. In: 2021 5th International conference on intelligent computing and control systems (ICICCS). IEEE, pp 1853–1858
Yi S, Qin Z, Li Q (2015) Security and privacy issues of fog computing: A survey. In: International conference on wireless algorithms, systems, and applications. Springer, pp 685–695
Heidari A, Jabraeil Jamali MA (2023) Internet of Things intrusion detection systems: a comprehensive review and future directions. Clust Comput 26:3753–3780. https://doi.org/10.1007/s10586-022-03776-z
da Costa KA, Papa JP, Lisboa CO et al (2019) Internet of Things: a survey on machine learning-based intrusion detection approaches. Comput Netw 151:147–157
Farnaaz N, Jabbar MA (2016) Random forest modeling for network intrusion detection system. Procedia Comput Sci 89:213–217
Wang H, Gu J, Wang S (2017) An effective intrusion detection framework based on SVM with feature augmentation. Knowl Based Syst 136:130–139
Ahmad Z, Shahid Khan A, Wai Shiang C et al (2021) Network intrusion detection system: a systematic study of machine learning and deep learning approaches. Trans Emerg Telecommun Technol 32:e4150
Labiod Y, Amara Korba A, Ghoualmi N (2022) Fog computing-based intrusion detection architecture to protect IoT networks. Wirel Pers Commun. https://doi.org/10.1007/s11277-022-09548-7
de Souza CA, Westphall CB, Machado RB (2022) Two-step ensemble approach for intrusion detection and identification in IoT and fog computing environments. Comput Electr Eng 98:107694
de Souza CA, Westphall CB, Machado RB et al (2020) Hybrid approach to intrusion detection in fog-based IoT environments. Comput Netw 180:107417
Maithem M, Al-sultany GA (2021) Network intrusion detection system using deep neural networks. J Phys Conf Ser. https://doi.org/10.1088/1742-6596/1804/1/012138
Zwayed FA, Anbar M, Sanjalawe Y, Manickam S (2021) Intrusion detection systems in fog computing—a review. In: international conference on advances in cyber security. Springer, pp 481–504
Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on Mobile cloud computing. pp 13–16
Dastjerdi AV, Buyya R (2016) Fog computing: helping the Internet of Things realize its potential. Computer 49:112–116
Hashemi SM, Sahafi A, Rahmani AM, Bohlouli M (2024) Energy-aware resource management in fog computing for IoT applications: a review, taxonomy, and future directions. Softw Pract Exp 54:109–148. https://doi.org/10.1002/spe.3273
Abofathi Y, Anari B, Masdari M (2024) A learning automata based approach for module placement in fog computing environment. Expert Syst Appl 237:121607
Pakmehr A, Gholipour M, Zeinali E (2024) ETFC: energy-efficient and deadline-aware task scheduling in fog computing. Sustain Comput Inform Syst. https://doi.org/10.1016/j.suscom.2024.100988
Sabireen H, Neelanarayanan V (2021) A review on fog computing: architecture, fog with IoT, algorithms and research challenges. ICT Express 7:162–176
Zhang J, Chen B, Zhao Y et al (2018) Data security and privacy-preserving in edge computing paradigm: survey and open issues. IEEE access 6:18209–18237
An X, Su J, Lü X, Lin F (2018) Hypergraph clustering model-based association analysis of DDOS attacks in fog computing intrusion detection system. EURASIP J Wirel Commun Netw 2018:1–9
Rezapour R, Asghari P, Javadi HHS, Ghanbari S (2021) Security in fog computing: a systematic review on issues, challenges and solutions. Comput Sci Rev 41:100421
Jumani AK, Shi J, Laghari AA et al (2023) Fog computing security: a review. Secur Priv 6:e313. https://doi.org/10.1002/spy2.313
Alwakeel AM (2021) An overview of fog computing and edge computing security and privacy issues. Sensors 21:8226
KarsligEl ME, Yavuz AG, Güvensan MA, et al (2017) Network intrusion detection using machine learning anomaly detection algorithms. In: 2017 25th Signal processing and communications applications conference (SIU). IEEE, pp 1–4
Liao H-J, Lin C-HR, Lin Y-C, Tung K-Y (2013) Intrusion detection system: a comprehensive review. J Netw Comput Appl 36:16–24
Smys S, Basar A, Wang H (2020) Hybrid intrusion detection system for internet of things (IoT). J ISMAC 2:190–199
Mukherjee M, Matam R, Shu L et al (2017) Security and privacy in fog computing: challenges. IEEE Access 5:19293–19304
Sehgal VK, Patrick A, Soni A, Rajput L (2015) Smart human security framework using internet of things, cloud and fog computing. In: Buyya R, Thampi SM (eds) Intelligent distributed computing. Springer, Cham, pp 251–263
Krishnaveni S, Vigneshwar P, Kishore S et al (2020) Anomaly-based intrusion detection system using support vector machine. In: Dash SS, Lakshmi C, Das S, Panigrahi BK (eds) Artificial intelligence and evolutionary computations in engineering systems. Springer Singapore, Singapore, pp 723–731
Choubisa M, Doshi R, Khatri N, Hiran KK (2022) A simple and robust approach of random forest for intrusion detection system in cyber security. In: 2022 International conference on IoT and blockchain technology (ICIBT). IEEE, pp 1–5
Louk MHL, Tama BA (2023) Dual-IDS: a bagging-based gradient boosting decision tree model for network anomaly intrusion detection system. Expert Syst Appl 213:119030
Kabanda G (2020) A Bayesian network model for machine learning and cyber security. In: Proceedings of the 2nd Africa–Asia dialogue network (AADN) international conference on advances in business management and electronic commerce research. ACM, Ganzhou China, pp 1–7
Kherbache M, Espes D, Amroun K (2021) An enhanced approach of the K-Means clustering for Anomaly-based intrusion detection systems. In: 2021 International conference on computing, computational modelling and applications (ICCMA). IEEE, pp 78–83
Kasongo SM (2023) A deep learning technique for intrusion detection system using a recurrent neural networks based framework. Comput Commun 199:113–125
Awajan A (2023) A novel deep learning-based intrusion detection system for IOT networks. Computers 12:34
Li Y, Ma R, Jiao R (2015) A hybrid malicious code detection method based on deep learning. Int J Secur Its Appl 9:205–216
Srirama SN (2024) A decade of research in fog computing: relevance, challenges, and future directions. Softw Pract Exp 54:3–23. https://doi.org/10.1002/spe.3243
Zhang P, Zhou M, Fortino G (2018) Security and trust issues in fog computing: a survey. Future Gener Comput Syst 88:16–27
Bazgir E, Haque E, Sharif NB, Ahmed MF (2023) Security aspects in IoT based cloud computing. World J Adv Res Rev 20:540–551
Aliyu F, Sheltami T, Mahmoud A et al (2021) Detecting man-in-the-middle attack in fog computing for social media. Comput Mater Continua. https://doi.org/10.32604/cmc.2021.016938
Duolikun D, Enokido T, Takizawa M (2023) A flexible fog computing (FTBFC) model to reduce energy consumption of the IoT. In: International conference on emerging internetworking, data and web technologies. Springer, pp 256–267
Vijarania M, Gupta S, Agrawal A et al (2023) Energy efficient load-balancing mechanism in integrated IoT–Fog–cloud environment. Electronics 12:2543
Hindy H, Brosset D, Bayne E, et al (2018) A taxonomy and survey of intrusion detection system design techniques, network threats and datasets.
Alrajeh NA, Lloret J (2013) Intrusion detection systems based on artificial intelligence techniques in wireless sensor networks. Int J Distrib Sens Netw 9:351047
Kreibich C, Crowcroft J (2004) Honeycomb: creating intrusion detection signatures using honeypots. ACM SIGCOMM Comput Commun Rev 34:51–56
Díaz-Verdejo J, Muñoz-Calle J, Estepa Alonso A et al (2022) On the detection capabilities of signature-based intrusion detection systems in the context of web attacks. Appl Sci 12:852
Kumar P, Gupta GP, Tripathi R (2021) Design of anomaly-based intrusion detection system using fog computing for IoT network. Autom Control Comput Sci 55:137–147
Keserwani PK, Govil MC, Pilli ES, Govil P (2021) A smart anomaly-based intrusion detection system for the Internet of Things (IoT) network using GWO–PSO–RF model. J Reliab Intell Environ 7:3–21
Gurung S, Ghose MK, Subedi A (2019) Deep learning approach on network intrusion detection system using NSL-KDD dataset. Int J Comput Netw Inf Secur 11:8–14
Deshpande P, Sharma SC, Peddoju SK, Junaid S (2018) HIDS: a host based intrusion detection system for cloud computing environment. Int J Syst Assur Eng Manag 9:567–576
Ahmet EFE, Abaci İN (2022) Comparison of the host based intrusion detection systems and network based intrusion detection systems. Celal Bayar Univ J Sci 18:23–32
Ahamed J, Rajan AV (2016) Internet of Things (IoT): application systems and security vulnerabilities. In: 2016 5th International conference on electronic devices, systems and applications (ICEDSA). IEEE, pp 1–5
Vasilomanolakis E, Karuppayah S, Mühlhäuser M, Fischer M (2015) Taxonomy and survey of collaborative intrusion detection. ACM Comput Surv (CSUR) 47:1–33
Chen M, Hao Y, Li Y et al (2015) On the computation offloading at ad hoc cloudlet: architecture and service modes. IEEE Commun Mag 53:18–24
Zhang Y, Niyato D, Wang P (2015) Offloading in mobile cloudlet systems with intermittent connectivity. IEEE Trans Mob Comput 14:2516–2529
Abeshu A, Chilamkurti N (2018) Deep learning: the frontier for distributed attack detection in fog-to-things computing. IEEE Commun Mag 56:169–175. https://doi.org/10.1109/MCOM.2018.1700332
Roopak M, Tian GY, Chambers J (2019) Deep learning models for cyber security in IoT Networks. In: 2019 IEEE 9th annual computing and communication workshop and conference (CCWC). IEEE, pp 0452–0457
Sadaf K, Sultana J (2020) Intrusion detection based on autoencoder and isolation Forest in fog computing. IEEE Access 8:167059–167068
Syed NF, Ge M, Baig Z (2023) Fog–cloud based intrusion detection system using recurrent neural networks and feature selection for IoT networks. Comput Netw 225:109662
Yang Y, Tu S, Ali RH et al (2023) Intrusion detection based on bidirectional long short-term memory with attention mechanism. Comput Mater Continua. https://doi.org/10.32604/cmc.2023.031907
Viet HN, Van QN, Trang LLT, Nathan S (2018) Using deep learning model for network scanning detection. In: Proceedings of the 4th international conference on frontiers of educational technologies. pp 117–121
Sahar N, Mishra R, Kalam S (2021) Deep learning approach-based network intrusion detection system for fog-assisted IoT. In: Proceedings of international conference on big data, machine learning and their applications. Springer, pp 39–50
Azarkasb SO, Kashi SS, Khasteh SH (2021) A network intrusion detection approach at the edge of fog. In: 2021 26th International computer conference, computer society of Iran (CSICC). IEEE, pp 1–6
Kaliyaperumal K, Murugaiyan C, Perumal D et al (2023) Combined ensemble intrusion detection model using deep learning with feature selection for fog computing environments. Acta Sci Technol 45:e60551–e60551
Zhao G, Wang Y, Wang J (2023) Lightweight intrusion detection model of the Internet of Things with hybrid cloud-fog computing. Secur Commun Netw. https://doi.org/10.1155/2023/7107663
Binbusayyis A (2024) Hybrid VGG19 and 2D-CNN for intrusion detection in the FOG-cloud environment. Expert Syst Appl 238:121758
Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using deep learning approach for Internet of Things. Future Gener Comput Syst 82:761–768. https://doi.org/10.1016/j.future.2017.08.043
Diro A, Chilamkurti N (2018) Leveraging LSTM networks for attack detection in fog-to-things communications. IEEE Commun Mag 56:124–130
Almiani M, AbuGhazleh A, Al-Rahayfeh A et al (2020) Deep recurrent neural network for IoT intrusion detection system. Simul Model Pract Theory 101:102031
Ba NG, Selvakumar S (2020) Anomaly detection framework for Internet of things traffic using vector convolutional deep learning approach in fog environment. Future Gener Comput Syst 113:255–265
Samy A, Yu H, Zhang H (2020) Fog-based attack detection framework for Internet of Things using deep learning. IEEE Access 8:74571–74585
Roy S, Li J, Bai Y (2022) A two-layer fog-cloud intrusion detection model for IoT networks. Internet Things. https://doi.org/10.1016/j.iot.2022.100557
Chen Y, Lin Q, Wei W et al (2022) Intrusion detection using multi-objective evolutionary convolutional neural network for Internet of Things in fog computing. Knowl Based Syst 244:108505
Lazzarini R, Tianfield H, Charissis P (2023) A stacking ensemble of deep learning models for IoT network intrusion detection. Knowl Based Syst. https://doi.org/10.1016/j.knosys.2023.110941
Soon HF, Amir A, Azemi SN (2021) An analysis of multiclass imbalanced data problem in machine learning for network attack detections. J Phys Conf Ser. https://doi.org/10.1088/1742-6596/1755/1/012030
Poornima IGA, Paramasivan B (2020) Anomaly detection in wireless sensor network using machine learning algorithm. Comput Commun 151:331–337
Sokolov AN, Pyatnitsky IA, Alabugin SK (2018) Research of classical machine learning methods and deep learning models effectiveness in detecting anomalies of industrial control system. In: 2018 Global smart industry conference (GloSIC). IEEE, pp 1–6
Malaiya RK, Kwon D, Kim J, et al (2018) An empirical evaluation of deep learning for network anomaly detection. In: 2018 International conference on computing, networking and communications (ICNC). IEEE, pp 893–898
Alqarni AA, El-Alfy E-SM (2022) Improving intrusion detection for imbalanced network traffic using generative deep learning. Int J Adv Comput Sci Appl. https://doi.org/10.14569/IJACSA.2022.01304109
Illy P, Kaddoum G, Moreira CM, et al (2019) Securing fog-to-things environment using intrusion detection system based on ensemble learning. In: 2019 IEEE wireless communications and networking conference (WCNC). IEEE, pp 1–7
Zhiqiang L, Mohi-Ud-Din G, Bing L, et al (2019) Modeling network intrusion detection system using feed-forward neural network using UNSW-NB15 dataset. In: 2019 IEEE 7th International conference on smart energy grid engineering (SEGE). IEEE, pp 299–303
Heidari A, Navimipour NJ, Unal M (2023) A secure intrusion detection platform using blockchain and radial basis function neural networks for internet of drones. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2023.3237661
Nakhodchi S, Zolfaghari B, Yazdinejad A, Dehghantanha A (2021) Steeleye: an application-layer attack detection and attribution model in industrial control systems using semi-deep learning. In: 2021 18th International conference on privacy, security and trust (PST). IEEE, pp 1–8
Shakya AK, Pillai G, Chakrabarty S (2023) Reinforcement learning algorithms: a brief survey. Expert Syst Appl. https://doi.org/10.1016/j.eswa.2023.120495
Krichen M (2023) Deep reinforcement learning. In: 2023 14th International conference on computing communication and networking technologies (ICCCNT). IEEE, pp 1–7
Sater RA, Hamza AB (2021) A federated learning approach to anomaly detection in smart buildings. ACM Trans Internet Things 2:1–23. https://doi.org/10.1145/3467981
Wen J, Zhang Z, Lan Y et al (2023) A survey on federated learning: challenges and applications. Int J Mach Learn Cybern 14:513–535. https://doi.org/10.1007/s13042-022-01647-y
Yazdinejad A, Dehghantanha A, Parizi RM, Epiphaniou G (2023) An optimized fuzzy deep learning model for data classification based on NSGA-II. Neurocomputing 522:116–128
Yazdinejad A, Dehghantanha A, Parizi RM et al (2023) Secure intelligent fuzzy blockchain framework: effective threat detection in IoT networks. Comput Ind 144:103801
Namakshenas D, Yazdinejad A, Dehghantanha A, Srivastava G (2024) Federated quantum-based privacy-preserving threat detection model for consumer internet of things. IEEE Trans Consum Electro. https://doi.org/10.1109/TCE.2024.3377550
Yazdinejad A, Dehghantanha A, Srivastava G et al (2024) Hybrid privacy preserving federated learning against irregular users in next-generation Internet of Things. J Syst Archit. https://doi.org/10.1016/j.sysarc.2024.103088
Funding
Not applicable.
Author information
Authors and Affiliations
Contributions
All authors contributed to the writing of the manuscript text and reviewed it.
Corresponding author
Ethics declarations
Conflict of interest
Not applicable.
Ethical approval
Not applicable.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
The original online version of this article was revised to update the typo in the author from Abolrazl Toroghi Haghighat to Abolfazl Toroghi Haghighat.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Najafli, S., Toroghi Haghighat, A. & Karasfi, B. Taxonomy of deep learning-based intrusion detection system approaches in fog computing: a systematic review. Knowl Inf Syst 66, 6527–6560 (2024). https://doi.org/10.1007/s10115-024-02162-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10115-024-02162-y