[HTML][HTML] Genetic Algorithm based feature selection and Naïve Bayes for anomaly detection in fog computing environment

JO Onah, M Abdullahi, IH Hassan… - Machine Learning with …, 2021 - Elsevier
The sharp rise in network attacks has been a major source of concern in cyber security,
particularly that now internet usage and connectivity are in high demand. As a complement …

Optimized machine learning-based intrusion detection system for fog and edge computing environment

OA Alzubi, JA Alzubi, M Alazab, A Alrabea, A Awajan… - Electronics, 2022 - mdpi.com
As a new paradigm, fog computing (FC) has several characteristics that set it apart from the
cloud computing (CC) environment. Fog nodes and edge computing (EC) hosts have limited …

Fog computing-based intrusion detection architecture to protect iot networks

Y Labiod, A Amara Korba, N Ghoualmi - Wireless Personal …, 2022 - Springer
With the deployment of billions of Internet of Things (IoT) devices, more and more cyber
attacks involving or even targeting such devices are rife. Cyberattack vectors are in constant …

IoT-Fog-Cloud model for anomaly detection using improved Naïve Bayes and principal component analysis

S Manimurugan - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
Abstract Internet of Things (IoT) is one of the significant emerging domains in computing. IoT
structures the base of future infrastructures, developing the advancement of future smart …

Design of anomaly-based intrusion detection system using fog computing for IoT network

P Kumar, GP Gupta, R Tripathi - Automatic Control and Computer …, 2021 - Springer
With increase in the demand for Internet of Things (IoT)-based services, the capability to
detect anomalies such as malicious control, spying and other threats within IoT-based …

Intrusion detection based on autoencoder and isolation forest in fog computing

K Sadaf, J Sultana - IEEE Access, 2020 - ieeexplore.ieee.org
Fog Computing has emerged as an extension to cloud computing by providing an efficient
infrastructure to support IoT. Fog computing acting as a mediator provides local processing …

Rooted learning model at fog computing analysis for crime incident surveillance

R Rawat, V Mahor, J Díaz-Álvarez… - … Conference on Smart …, 2022 - ieeexplore.ieee.org
Cyber Loopholes in smart devices' applications invited intruders to conduct malicious
activities. The growing quantity and diversity of smart devices has posed significant cyber …

Intrusion detection system based on decision tree over big data in fog environment

K Peng, VCM Leung, L Zheng, S Wang… - Wireless …, 2018 - Wiley Online Library
Fog computing, as the supplement of cloud computing, can provide low‐latency services
between mobile users and the cloud. However, fog devices may encounter security …

Scalable anomaly-based intrusion detection for secure Internet of Things using generative adversarial networks in fog environment

W Yao, H Shi, H Zhao - Journal of Network and Computer Applications, 2023 - Elsevier
The data generated exponentially by a massive number of devices in the Internet of Things
(IoT) are extremely high-dimensional, large-scale, non-labeled, which poses great …

Artificial neural networks-based intrusion detection system for internet of things fog nodes

J Pacheco, VH Benitez, LC Felix-Herran… - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) represents a mean to share resources (memory, storage
computational power, data, etc.) between computers and mobile devices, as well as …