Abordagem de detecção de intrusão em ambientes fog computing e internet of things

Detalhes bibliográficos
Autor(a) principal: Valencio, Jean Douglas Gomes
Data de Publicação: 2021
Tipo de documento: Dissertação
Idioma: por
Título da fonte: Biblioteca Digital de Teses e Dissertações do UNIOESTE
Texto Completo: https://tede.unioeste.br/handle/tede/5958
Resumo: Given the advantages of innovations and technological advances in our era, the connection between people through devices connected to the Internet is intrinsic in our daily lives, allowing the distribution and sharing of information in real time various business models and distribution chains are Internet based, that is also, useful to connect and control IoT devices that permeate the environment creating an interface from the digital world to the physical world. However, some innovations become catalysts for the activities of malicious actors that look for vulnerabilities in systems and then exploit them, causing damage or making a personal gain on possession of others resources. The fragility of systems has been constantly exposed through increasing computational incidents. In this context, intrusion detection systems add a great value to organizations that look for greater resistance to external solutions, protecting their users and resources. The amount of traffic to be analyzed by intrusion detection systems is often prohibitive and consumes a large amount of computing resources, especially on IoT devices that are resource weakly and are the architecture usually based on multiple layers. Given this context, this work consists of an intrusion detection approach based on attribute selection and event classification. The ensemble of attribute selection phase is composed of two steps, in the first one a method based on statistics and information gain is used, the Information gain (IG) method, reducing quantity of attributes and generating a subset which is then submitted to the second step of the method, that consist on two algorithms, the Sequential Forward Feature Selection (SFFS) and Sequential Backward Feature Elimination (SBFE), which perform the evaluation based on the performance of the combination of several subsets, generating a set of reduced attributes combined by a combination method. The resulting set of this processing is then used to train the classifier algorithm, Extra-Tree (ET). To carry out the experiments, a public database CICIDS2017 was used, reduced to 20% during a pre-processing phase. The arrangement of the attribute selection algorithms were varied in order to train the classification algorithm and execute it, totaling 5 attribute selection approaches and another approach using a complete base with all attributes. The approach using IG + SFFS cap SBFE presented the best result in testing time and training time maintaining the accuracy levels, balanced accuracy and precision of the other approaches.
id UNIOESTE-1_24890d85169130e0dc9904e76d26c9d0
oai_identifier_str oai:tede.unioeste.br:tede/5958
network_acronym_str UNIOESTE-1
network_name_str Biblioteca Digital de Teses e Dissertações do UNIOESTE
repository_id_str
spelling Machado, Renato Bobsinhttp://lattes.cnpq.br/8407723021436270Silva, Rômulo Césarhttp://lattes.cnpq.br/6868372533000061Maciejewski, Narco Afonso Ravazzolihttp://lattes.cnpq.br/9214991739582650http://lattes.cnpq.br/9458275930050814Valencio, Jean Douglas Gomes2022-04-08T14:23:17Z2021-12-21Valencio, Jean Douglas Gomes. Abordagem de detecção de intrusão em ambientes fog computing e internet of things. 2021. 106 f. Dissertação (Programa de Pós-Graduação em Engenharia Elétrica e Computação) - Universidade Estadual do Oeste do Paraná, Foz do Iguaçu-PR.https://tede.unioeste.br/handle/tede/5958Given the advantages of innovations and technological advances in our era, the connection between people through devices connected to the Internet is intrinsic in our daily lives, allowing the distribution and sharing of information in real time various business models and distribution chains are Internet based, that is also, useful to connect and control IoT devices that permeate the environment creating an interface from the digital world to the physical world. However, some innovations become catalysts for the activities of malicious actors that look for vulnerabilities in systems and then exploit them, causing damage or making a personal gain on possession of others resources. The fragility of systems has been constantly exposed through increasing computational incidents. In this context, intrusion detection systems add a great value to organizations that look for greater resistance to external solutions, protecting their users and resources. The amount of traffic to be analyzed by intrusion detection systems is often prohibitive and consumes a large amount of computing resources, especially on IoT devices that are resource weakly and are the architecture usually based on multiple layers. Given this context, this work consists of an intrusion detection approach based on attribute selection and event classification. The ensemble of attribute selection phase is composed of two steps, in the first one a method based on statistics and information gain is used, the Information gain (IG) method, reducing quantity of attributes and generating a subset which is then submitted to the second step of the method, that consist on two algorithms, the Sequential Forward Feature Selection (SFFS) and Sequential Backward Feature Elimination (SBFE), which perform the evaluation based on the performance of the combination of several subsets, generating a set of reduced attributes combined by a combination method. The resulting set of this processing is then used to train the classifier algorithm, Extra-Tree (ET). To carry out the experiments, a public database CICIDS2017 was used, reduced to 20% during a pre-processing phase. The arrangement of the attribute selection algorithms were varied in order to train the classification algorithm and execute it, totaling 5 attribute selection approaches and another approach using a complete base with all attributes. The approach using IG + SFFS cap SBFE presented the best result in testing time and training time maintaining the accuracy levels, balanced accuracy and precision of the other approaches.Diante de inúmeras inovações e avanços tecnológicos em nossa era, a conexão entre pessoas através de dispositivos conectados à Internet é intrínseca em nosso cotidiano, permitindo a troca e o compartilhamento de informações em tempo real, a emersão de variados modelos e cadeias de negócio cujo núcleo é a Internet e a conexão e controle dos dispositivos IoT que permeiam o ambiente criando uma interface como digital e físico. No entanto, algumas inovações se tornam catalisadores para atividades de atores maliciosos que buscam vulnerabilidades em sistemas para então explorá-los e causar danos ou realizar um ganho de recurso sobre a posse alheia. A fragilidade de sistemas vem sendo exposta constantemente através de incidentes computacionais crescentes. Nesse contexto, sistemas de detecção de intrusão são de grande valia para organizações que buscam uma maior resistência a ataques e ameaças externas, protegendo seus usuários e recursos. A quantidade de tráfego a ser analisada por sistemas de detecção de intrusão é muitas vezes proibitiva e consome uma grande quantidade de recursos computacionais, principalmente em dispositivos IoT que não dispõem de muitos recursos e são geralmente baseados em uma arquitetura de diversas camadas. Diante deste contexto, este trabalho consiste em uma abordagem de detecção de intrusão baseada em seleção de atributos e classificação de eventos. A fase de seleção de atributos ensemble é composta de duas etapas, na primeira é utilizado um método baseado em estatística e no ganho de informação, Information Gain (IG), reduzindo a quantidade de atributos e gerando um subconjunto que é então submetido à segunda etapa do método, composto por dois algoritmos, Sequential Forward Feature Selection (SFFS) e Sequential Backward Feature Elimination (SBFE), que realizam a avaliação baseado no desempenho da combinação de diversos subconjuntos, gerando um conjunto de atributos reduzidos combinados por um método. O conjunto resultante deste processamento é então utilizado para o treinamento do algoritmo classificador, Extra-Tree (ET). Para a realização dos experimentos utilizou-se a base de dados pública CICIDS2017, reduzida para 20% durante a fase de pré-processamento. Foram variados os arranjos dos algoritmos de seleção de atributos para então ser treinado o algoritmo de classificação e executar o mesmo, totalizando em 5 abordagens de seleção de atributos e mais uma abordagem utilizando a base completa com todos os atributos. A abordagem que utiliza IG + SFFS ∩ SBFE apresentou o melhor resultado em tempo de teste e tempo de treino mantendo os níveis de acurácia, acurácia balanceada e precisão das outras abordagens.Submitted by Katia Abreu (katia.abreu@unioeste.br) on 2022-04-08T14:23:17Z No. of bitstreams: 2 Jean_Douglas_Gomes_Valencio_2021.pdf: 4151505 bytes, checksum: 0fa70048c837df957a083ec3ea7b0b7b (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)Made available in DSpace on 2022-04-08T14:23:17Z (GMT). No. of bitstreams: 2 Jean_Douglas_Gomes_Valencio_2021.pdf: 4151505 bytes, checksum: 0fa70048c837df957a083ec3ea7b0b7b (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Previous issue date: 2021-12-21application/pdfpor8774263440366006536500Universidade Estadual do Oeste do ParanáFoz do IguaçuPrograma de Pós-Graduação em Engenharia Elétrica e ComputaçãoUNIOESTEBrasilCentro de Engenharias e Ciências Exatashttp://creativecommons.org/licenses/by-nc-nd/4.0/info:eu-repo/semantics/openAccessSeleção de atributosMétodos ensembleSegurança de redesFeature selectionEnsemble methodsNetwork securitySISTEMAS DE COMPUTACAO::TELEINFORMATICAAbordagem de detecção de intrusão em ambientes fog computing e internet of thingsIntrusion detection in fog computing and internet of thingsinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/masterThesis-1040084669565072649600600600-7734402124082146922-8816208982924656813reponame:Biblioteca Digital de Teses e Dissertações do UNIOESTEinstname:Universidade Estadual do Oeste do Paraná (UNIOESTE)instacron:UNIOESTEORIGINALJean_Douglas_Gomes_Valencio_2021.pdfJean_Douglas_Gomes_Valencio_2021.pdfapplication/pdf4151505http://tede.unioeste.br:8080/tede/bitstream/tede/5958/5/Jean_Douglas_Gomes_Valencio_2021.pdf0fa70048c837df957a083ec3ea7b0b7bMD55CC-LICENSElicense_urllicense_urltext/plain; charset=utf-849http://tede.unioeste.br:8080/tede/bitstream/tede/5958/2/license_url4afdbb8c545fd630ea7db775da747b2fMD52license_textlicense_texttext/html; charset=utf-80http://tede.unioeste.br:8080/tede/bitstream/tede/5958/3/license_textd41d8cd98f00b204e9800998ecf8427eMD53license_rdflicense_rdfapplication/rdf+xml; charset=utf-80http://tede.unioeste.br:8080/tede/bitstream/tede/5958/4/license_rdfd41d8cd98f00b204e9800998ecf8427eMD54LICENSElicense.txtlicense.txttext/plain; charset=utf-82165http://tede.unioeste.br:8080/tede/bitstream/tede/5958/1/license.txtbd3efa91386c1718a7f26a329fdcb468MD51tede/59582022-04-08 11:23:17.769oai:tede.unioeste.br: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Biblioteca Digital de Teses e Dissertaçõeshttp://tede.unioeste.br/PUBhttp://tede.unioeste.br/oai/requestbiblioteca.repositorio@unioeste.bropendoar:2022-04-08T14:23:17Biblioteca Digital de Teses e Dissertações do UNIOESTE - Universidade Estadual do Oeste do Paraná (UNIOESTE)false
dc.title.por.fl_str_mv Abordagem de detecção de intrusão em ambientes fog computing e internet of things
dc.title.alternative.eng.fl_str_mv Intrusion detection in fog computing and internet of things
title Abordagem de detecção de intrusão em ambientes fog computing e internet of things
spellingShingle Abordagem de detecção de intrusão em ambientes fog computing e internet of things
Valencio, Jean Douglas Gomes
Seleção de atributos
Métodos ensemble
Segurança de redes
Feature selection
Ensemble methods
Network security
SISTEMAS DE COMPUTACAO::TELEINFORMATICA
title_short Abordagem de detecção de intrusão em ambientes fog computing e internet of things
title_full Abordagem de detecção de intrusão em ambientes fog computing e internet of things
title_fullStr Abordagem de detecção de intrusão em ambientes fog computing e internet of things
title_full_unstemmed Abordagem de detecção de intrusão em ambientes fog computing e internet of things
title_sort Abordagem de detecção de intrusão em ambientes fog computing e internet of things
author Valencio, Jean Douglas Gomes
author_facet Valencio, Jean Douglas Gomes
author_role author
dc.contributor.advisor1.fl_str_mv Machado, Renato Bobsin
dc.contributor.advisor1Lattes.fl_str_mv http://lattes.cnpq.br/8407723021436270
dc.contributor.referee1.fl_str_mv Silva, Rômulo César
dc.contributor.referee1Lattes.fl_str_mv http://lattes.cnpq.br/6868372533000061
dc.contributor.referee2.fl_str_mv Maciejewski, Narco Afonso Ravazzoli
dc.contributor.referee2Lattes.fl_str_mv http://lattes.cnpq.br/9214991739582650
dc.contributor.authorLattes.fl_str_mv http://lattes.cnpq.br/9458275930050814
dc.contributor.author.fl_str_mv Valencio, Jean Douglas Gomes
contributor_str_mv Machado, Renato Bobsin
Silva, Rômulo César
Maciejewski, Narco Afonso Ravazzoli
dc.subject.por.fl_str_mv Seleção de atributos
Métodos ensemble
Segurança de redes
topic Seleção de atributos
Métodos ensemble
Segurança de redes
Feature selection
Ensemble methods
Network security
SISTEMAS DE COMPUTACAO::TELEINFORMATICA
dc.subject.eng.fl_str_mv Feature selection
Ensemble methods
Network security
dc.subject.cnpq.fl_str_mv SISTEMAS DE COMPUTACAO::TELEINFORMATICA
description Given the advantages of innovations and technological advances in our era, the connection between people through devices connected to the Internet is intrinsic in our daily lives, allowing the distribution and sharing of information in real time various business models and distribution chains are Internet based, that is also, useful to connect and control IoT devices that permeate the environment creating an interface from the digital world to the physical world. However, some innovations become catalysts for the activities of malicious actors that look for vulnerabilities in systems and then exploit them, causing damage or making a personal gain on possession of others resources. The fragility of systems has been constantly exposed through increasing computational incidents. In this context, intrusion detection systems add a great value to organizations that look for greater resistance to external solutions, protecting their users and resources. The amount of traffic to be analyzed by intrusion detection systems is often prohibitive and consumes a large amount of computing resources, especially on IoT devices that are resource weakly and are the architecture usually based on multiple layers. Given this context, this work consists of an intrusion detection approach based on attribute selection and event classification. The ensemble of attribute selection phase is composed of two steps, in the first one a method based on statistics and information gain is used, the Information gain (IG) method, reducing quantity of attributes and generating a subset which is then submitted to the second step of the method, that consist on two algorithms, the Sequential Forward Feature Selection (SFFS) and Sequential Backward Feature Elimination (SBFE), which perform the evaluation based on the performance of the combination of several subsets, generating a set of reduced attributes combined by a combination method. The resulting set of this processing is then used to train the classifier algorithm, Extra-Tree (ET). To carry out the experiments, a public database CICIDS2017 was used, reduced to 20% during a pre-processing phase. The arrangement of the attribute selection algorithms were varied in order to train the classification algorithm and execute it, totaling 5 attribute selection approaches and another approach using a complete base with all attributes. The approach using IG + SFFS cap SBFE presented the best result in testing time and training time maintaining the accuracy levels, balanced accuracy and precision of the other approaches.
publishDate 2021
dc.date.issued.fl_str_mv 2021-12-21
dc.date.accessioned.fl_str_mv 2022-04-08T14:23:17Z
dc.type.status.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.driver.fl_str_mv info:eu-repo/semantics/masterThesis
format masterThesis
status_str publishedVersion
dc.identifier.citation.fl_str_mv Valencio, Jean Douglas Gomes. Abordagem de detecção de intrusão em ambientes fog computing e internet of things. 2021. 106 f. Dissertação (Programa de Pós-Graduação em Engenharia Elétrica e Computação) - Universidade Estadual do Oeste do Paraná, Foz do Iguaçu-PR.
dc.identifier.uri.fl_str_mv https://tede.unioeste.br/handle/tede/5958
identifier_str_mv Valencio, Jean Douglas Gomes. Abordagem de detecção de intrusão em ambientes fog computing e internet of things. 2021. 106 f. Dissertação (Programa de Pós-Graduação em Engenharia Elétrica e Computação) - Universidade Estadual do Oeste do Paraná, Foz do Iguaçu-PR.
url https://tede.unioeste.br/handle/tede/5958
dc.language.iso.fl_str_mv por
language por
dc.relation.program.fl_str_mv -1040084669565072649
dc.relation.confidence.fl_str_mv 600
600
600
dc.relation.department.fl_str_mv -7734402124082146922
dc.relation.cnpq.fl_str_mv -8816208982924656813
dc.rights.driver.fl_str_mv http://creativecommons.org/licenses/by-nc-nd/4.0/
info:eu-repo/semantics/openAccess
rights_invalid_str_mv http://creativecommons.org/licenses/by-nc-nd/4.0/
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv application/pdf
dc.publisher.none.fl_str_mv Universidade Estadual do Oeste do Paraná
Foz do Iguaçu
dc.publisher.program.fl_str_mv Programa de Pós-Graduação em Engenharia Elétrica e Computação
dc.publisher.initials.fl_str_mv UNIOESTE
dc.publisher.country.fl_str_mv Brasil
dc.publisher.department.fl_str_mv Centro de Engenharias e Ciências Exatas
publisher.none.fl_str_mv Universidade Estadual do Oeste do Paraná
Foz do Iguaçu
dc.source.none.fl_str_mv reponame:Biblioteca Digital de Teses e Dissertações do UNIOESTE
instname:Universidade Estadual do Oeste do Paraná (UNIOESTE)
instacron:UNIOESTE
instname_str Universidade Estadual do Oeste do Paraná (UNIOESTE)
instacron_str UNIOESTE
institution UNIOESTE
reponame_str Biblioteca Digital de Teses e Dissertações do UNIOESTE
collection Biblioteca Digital de Teses e Dissertações do UNIOESTE
bitstream.url.fl_str_mv http://tede.unioeste.br:8080/tede/bitstream/tede/5958/5/Jean_Douglas_Gomes_Valencio_2021.pdf
http://tede.unioeste.br:8080/tede/bitstream/tede/5958/2/license_url
http://tede.unioeste.br:8080/tede/bitstream/tede/5958/3/license_text
http://tede.unioeste.br:8080/tede/bitstream/tede/5958/4/license_rdf
http://tede.unioeste.br:8080/tede/bitstream/tede/5958/1/license.txt
bitstream.checksum.fl_str_mv 0fa70048c837df957a083ec3ea7b0b7b
4afdbb8c545fd630ea7db775da747b2f
d41d8cd98f00b204e9800998ecf8427e
d41d8cd98f00b204e9800998ecf8427e
bd3efa91386c1718a7f26a329fdcb468
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
MD5
repository.name.fl_str_mv Biblioteca Digital de Teses e Dissertações do UNIOESTE - Universidade Estadual do Oeste do Paraná (UNIOESTE)
repository.mail.fl_str_mv biblioteca.repositorio@unioeste.br
_version_ 1811723456205553664