Detection of malicious cloud bandwidth consumption in cloud computing using machine learning techniques

D Veeraiah, R Mohanty, S Kundu… - Computational …, 2022 - Wiley Online Library
The Internet of Things, sometimes known as IoT, is a relatively new kind of Internet
connectivity that connects physical objects to the Internet in a way that was not possible in …

[HTML][HTML] Detecting iot attacks using an ensemble machine learning model

V Tomer, S Sharma - Future Internet, 2022 - mdpi.com
Malicious attacks are becoming more prevalent due to the growing use of Internet of Things
(IoT) devices in homes, offices, transportation, healthcare, and other locations. By …

Malicious attack detection approach in cloud computing using machine learning techniques

M Arunkumar, K Ashok Kumar - Soft Computing, 2022 - Springer
The increasing development of decentralized computer systems that interact extensively has
increased the criticality of confronting cyberattackers, hackers, and terrorists. With the …

Semi-supervised learning based distributed attack detection framework for IoT

S Rathore, JH Park - Applied Soft Computing, 2018 - Elsevier
Alongside the development of Internet of Things (IoT), security attacks are also increasing
day by day. A number of centralized attack detection mechanisms have been proposed to …

[HTML][HTML] Energy Analysis-Based Cyber Attack Detection by IoT with Artificial Intelligence in a Sustainable Smart City

D Prabakar, M Sundarrajan, R Manikandan, NZ Jhanjhi… - Sustainability, 2023 - mdpi.com
Cybersecurity continues to be a major issue for all industries engaged in digital activity given
the cyclical surge in security incidents. Since more Internet of Things (IoT) devices are being …

A two-layer fog-cloud intrusion detection model for IoT networks

S Roy, J Li, Y Bai - Internet of Things, 2022 - Elsevier
Abstract The Internet of Things (IoT) and its applications are becoming ubiquitous in our life.
However, the open deployment environment and the limited resources of IoT devices make …

Anomaly detection framework for Internet of things traffic using vector convolutional deep learning approach in fog environment

BA NG, S Selvakumar - Future Generation Computer Systems, 2020 - Elsevier
The proliferation of Internet of things (IoT) devices has lured hackers to launch attacks.
Therefore, anomalies in IoT traffic must be detected to mitigate these attacks and protect …

Rooted learning model at fog computing analysis for crime incident surveillance

R Rawat, V Mahor, J Díaz-Álvarez… - … Conference on Smart …, 2022 - ieeexplore.ieee.org
Cyber Loopholes in smart devices' applications invited intruders to conduct malicious
activities. The growing quantity and diversity of smart devices has posed significant cyber …

Detection and mitigation of DDoS attacks in internet of things using a fog computing hybrid approach

KF Hassan, ME Manaa - Bulletin of Electrical Engineering and Informatics, 2022 - beei.org
The introduction of a new technology has aided the exponential growth of the internet of
things (IoT), allowing for the connecting of more devices in the IoT network to be made …

A Deep Intelligent Attack Detection Framework for Fog‐Based IoT Systems

SPK Gudla, SK Bhoi, SR Nayak… - Computational …, 2022 - Wiley Online Library
Fog computing provides a multitude of end‐based IoT system services. End IoT devices
exchange information with fog nodes and the cloud to handle client undertakings. During the …