Using AI to Identify and Mitigate Cybersecurity Threats in Fog Computing Environments
Abstract
Fog computing represents a transformative paradigm shift, bridging the gap between centralized cloud architectures and distributed edge computing environments. This research explores the cybersecurity challenges introduced by the dispersed nature of fog computing and evaluates the effectiveness of artificial intelligence (AI) in mitigating these risks. Traditional security solutions are often inadequate for these dynamic environments. This study examines the applicability of AI-driven techniques of AI machine-learning Models like (Random Forest, Gaussian Naive Bayes, Logistic Regression, and KNN) in addressing these cybersecurity challenges and producing a high accuracy score of prediction of threats. Machine learning models are employed to detect anomalies and potential security breaches in algorithms that analyze complex data streams for subtle deviations, and natural language processing techniques improve the analysis of security logs and communication patterns. The research highlights the strategic value of AI in safeguarding decentralized computing resources and provides a foundation for future exploration and practical implementation of AI-driven cybersecurity measures in fog computing contexts.
Full Text:
PDFReferences
Bécue, A., Praça, I., & Gama, J. (2021). Artificial intelligence, cyber-threats and Industry 4.0: Challenges and opportunities. Artificial Intelligence Review, 54(5), 3849-3886. Arif, H., Kumar, A., Fahad, M., & Hussain, H. K. (2024). Future Horizons: AI-Enhanced Threat Detection in Cloud Environments: Unveiling Opportunities for Research. International Journal of Multidisciplinary Sciences and Arts, 3(1), 242-251.
Kaloudi, N., & Li, J. (2020). The ai-based cyber threat landscape: A survey. ACM Computing Surveys (CSUR), 53(1), 1-34.
Gudala, L., Shaik, M., Venkataramanan, S., & Sadhu, A. K. R. (2019). Leveraging Artificial Intelligence for Enhanced Threat Detection, Response, and Anomaly Identification in Resource-Constrained IoT Networks. Distributed Learning and Broad Applications in Scientific Research, 5, 23-54.
Sarker, I. H., Furhad, M. H., & Nowrozy, R. (2021). Ai-driven cybersecurity: an overview, security intelligence modeling and research directions. SN Computer Science, 2(3), 173.
Sohal, A.S., Sandhu, R., Sood, S.K. and Chang, V., 2018. A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Computers & security, 74, pp.340-354.
Sharma, A., & Singh, U. K. (2022). Modelling of smart risk assessment approach for cloud computing environment using AI & supervised machine learning algorithms. Global Transitions Proceedings, 3(1), 243-250.
Ahanger, T. A., Tariq, U., Ibrahim, A., Ullah, I., Bouteraa, Y., & Gebali, F. (2022). Securing iot-empowered fog computing systems: machine learning perspective. Mathematics, 10(8), 1298.
Chang, V., Golightly, L., Modesti, P., Xu, Q. A., Doan, L. M. T., Hall, K., ... & Kobusińska, A. (2022). A survey on intrusion detection systems for fog and cloud computing. Future Internet, 14(3), 89.
Lawal, M. A., Shaikh, R. A., & Hassan, S. R. (2020). An anomaly mitigation framework for iot using fog computing. Electronics, 9(10), 1565.
Qiu, M., Kung, S. Y., & Gai, K. (2020). Intelligent security and optimization in Edge/Fog Computing. Future generation computer systems, 107, 1140-1142.
Krishnaraj, N., Daniel, A., Saini, K., & Bellam, K. (2022). EDGE/FOG computing paradigm: Concept, platforms and toolchains. In Advances in Computers (Vol. 127, pp. 413-436). Elsevier.
Sari, A. (2018). Context-aware intelligent systems for fog computing environments for cyber-threat intelligence. Fog computing: Concepts, frameworks and technologies, 205-225.
Alwakeel, A. M. (2021). An overview of fog computing and edge computing security and privacy issues. Sensors, 21(24), 8226.
Abdullahi, M., Baashar, Y., Alhussian, H., Alwadain, A., Aziz, N., Capretz, L. F., & Abdulkadir, S. J. (2022). Detecting cybersecurity attacks in Internet of things using artificial intelligence methods: A systematic literature review. Electronics, 11(2), 198.
Sandhu, R., Sohal, A. S., & Sood, S. K. (2017). Identification of malicious edge devices in fog computing environments. Information Security Journal: A Global Perspective, 26(5), 213-228.
Zhou, L., Guo, H., & Deng, G. (2019). A fog computing based approach to DDoS mitigation in IIoT systems. Computers & Security, 85, 51-62.
Moura, J., & Hutchison, D. (2020). Fog computing systems: State of the art, research issues and future trends, with a focus on resilience. Journal of Network and Computer Applications, 169, 102784.
Yakubu, J., Abdulhamid, S. I. M., Christopher, H. A., Chiroma, H., & Abdullahi, M. (2019). Security challenges in fog-computing environment: a systematic appraisal of current developments. Journal of Reliable Intelligent Environments, 5(4), 209-233.
Abdulkareem, K. H., Mohammed, M. A., Gunasekaran, S. S., Al-Mhiqani, M. N., Mutlag, A. A., Mostafa, S. A., ... & Ibrahim, D. A. (2019). A review of fog computing and machine learning: concepts, applications, challenges, and open issues. Ieee Access, 7, 153123-153140.
de Souza, C. A., Westphall, C. B., Machado, R. B., Loffi, L., Westphall, C. M., & Geronimo, G. A. (2022). Intrusion detection and prevention in fog based IoT environments: A systematic literature review. Computer Networks, 214, 109154.
Zhou, I., Makhdoom, I., Shariati, N., Raza, M. A., Keshavarz, R., Lipman, J., ... & Jamalipour, A. (2021). Internet of things 2.0: Concepts, applications, and future directions. IEEE Access, 9, 70961-71012.
Zaman, S., Alhazmi, K., Aseeri, M. A., Ahmed, M. R., Khan, R. T., Kaiser, M. S., & Mahmud, M. (2021). Security threats and artificial intelligence based countermeasures for Internet of things networks: a comprehensive survey. Ieee Access, 9, 94668-94690.
Alwakeel, A. M. (2021). An overview of fog computing and edge computing security and privacy issues. Sensors, 21(24), 8226.
Wazid, M., Das, A. K., Shetty, S., Rodrigues, J. J., & Guizani, M. (2022). AISCM-FH: AI-enabled secure communication mechanism in fog computing-based healthcare. IEEE Transactions on Information Forensics and Security, 18, 319-334.
Kasongo, S. M., & Sun, Y. (2020). Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset. Journal of Big Data, 7(1), 105.
Kumar, V., Das, A. K., & Sinha, D. (2020). Statistical analysis of the UNSW-NB15 dataset for intrusion detection. In Computational Intelligence in Pattern Recognition: Proceedings of CIPR 2019 (pp. 279-294). Springer Singapore.
Choudhary, S., & Kesswani, N. (2020). Analysis of KDD-Cup’99, NSL-KDD and UNSW-NB15 datasets using deep learning in IoT. Procedia Computer Science, 167, 1561-1573.
Mosavi, A., Salimi, M., Faizollahzadeh Ardabili, S., Rabczuk, T., Shamshirband, S., & Varkonyi-Koczy, A. R. (2019). State of the art of machine learning models in energy systems, a systematic review. Energies, 12(7), 1301.
Sullivan, E. (2022). Understanding from machine learning models. The British Journal for the Philosophy of Science.
Reddy, E. M. K., Gurrala, A., Hasitha, V. B., & Kumar, K. V. R. (2022). Introduction to Naive Bayes and a review on its subtypes with applications. Bayesian reasoning and gaussian processes for machine learning applications, 1-14.
Boateng, E. Y., & Abaye, D. A. (2019). A review of the logistic regression model with emphasis on medical research. Journal of data analysis and information processing, 7(04), 190.
Handelman, G. S., Kok, H. K., Chandra, R. V., Razavi, A. H., Huang, S., Brooks, M., ... & Asadi, H. (2019). Peering into the black box of artificial intelligence: evaluation metrics of machine learning methods. American Journal of Roentgenology, 212(1), 38-43.
Bowles, M. (2019). Machine Learning with Spark and Python: Essential Techniques for Predictive Analytics. John Wiley & Sons.
Shah, K., Patel, H., Sanghvi, D., & Shah, M. (2020). A comparative analysis of logistic regression, random forest and KNN models for the text classification. Augmented Human Research, 5(1), 12.
W. Yu, T. Dillon, F. Mostafa, W. Rahayu, and Y. Liu, “A global manufacturing big data ecosystem for fault detection in predictive maintenance,” IEEE Transactions on Industrial Informatics, vol. 16, no. 1, pp. 183–192, Jan. 2020. doi:10.1109/tii.2019.2915846
Yang, Y., Chen, X., Tan, R., & Xiao, Y. (2021). Intelligent IoT for the Digital World: Incorporating 5G Communications and Fog/Edge Computing Technologies. John Wiley & Sons.
Mouradian, C., Naboulsi, D., Yangui, S., Glitho, R. H., Morrow, M. J., & Polakos, P. A. (2017). A comprehensive survey on fog computing: State-of-the-art and research challenges. IEEE communications surveys & tutorials, 20(1), 416-464.
Atlam, H. F., Walters, R. J., & Wills, G. B. (2018). Fog computing and the internet of things: A review. big data and cognitive computing, 2(2), 10.
Refbacks
- There are currently no refbacks.
Copyright (c) 2024 International Journal of Sustainable Development in Computing Science
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
A Double-Blind Peer Reviewed Journal