Fog computing: A taxonomy, systematic review, current trends and research challenges

J Singh, P Singh, SS Gill - Journal of Parallel and Distributed Computing, 2021 - Elsevier
There has been rapid development in the number of Internet of Things (IoT) connected
nodes and devices in our daily life in recent times. With this increase in the number of …

An overview of fog computing and edge computing security and privacy issues

AM Alwakeel - Sensors, 2021 - mdpi.com
With the advancement of different technologies such as 5G networks and IoT the use of
different cloud computing technologies became essential. Cloud computing allowed …

Intelligent fog computing surveillance system for crime and vulnerability identification and tracing

R Rawat, RK Chakrawarti, P Vyas… - International Journal of …, 2023 - igi-global.com
IoT devices generate enormous amounts of data, which deep learning algorithms can learn
from more effectively than shallow learning algorithms. The approach for threat detection …

An SDN perspective IoT-Fog security: A survey

S Javanmardi, M Shojafar, R Mohammadi, M Alazab… - Computer Networks, 2023 - Elsevier
The utilization of the Internet of Things (IoT) has burst in recent years. Fog computing is a
notion that solves cloud computing's limitations by offering low latency to IoT network user …

Machine learning in network anomaly detection: A survey

S Wang, JF Balarezo, S Kandeepan… - IEEE …, 2021 - ieeexplore.ieee.org
Anomalies could be the threats to the network that have ever/never happened. To protect
networks against malicious access is always challenging even though it has been studied …

Interactive anomaly-based DDoS attack detection method in cloud computing environments using a third party auditor

SM Hezavehi, R Rahmani - Journal of Parallel and Distributed Computing, 2023 - Elsevier
Cloud computing environments are indispensable components of the majority of information
technology organizations and users' lives. Despite multiple benefits of cloud computing …

Machine learning to combat cyberattack: a survey of datasets and challenges

A Prasad, S Chandra - The Journal of Defense Modeling and …, 2023 - journals.sagepub.com
The ever-increasing number of multi-vector cyberattacks has become a concern for all levels
of organizations. Attackers are infecting Internet-enabled devices and exploiting them to …

DDoS attacks & defense mechanisms in SDN-enabled cloud: Taxonomy, review and research challenges

JK Chahal, A Bhandari, S Behal - Computer Science Review, 2024 - Elsevier
Software-defined Networking (SDN) is a transformative approach for addressing the
limitations of legacy networks due to decoupling of control planes from data planes. It offers …

Toward a Real‐Time TCP SYN Flood DDoS Mitigation Using Adaptive Neuro‐Fuzzy Classifier and SDN Assistance in Fog Computing

R Bensaid, N Labraoui, AA Abba Ari… - Security and …, 2024 - Wiley Online Library
The growth of the Internet of Things (IoT) has recently impacted our daily lives in many ways.
As a result, a massive volume of data are generated and need to be processed in a short …

A Perspicacious Multi-level Defense System Against DDoS Attacks in Cloud Using Information Metric & Game Theoretical Approach

M Mohan, V Tamizhazhagan, S Balaji - Journal of Network and Systems …, 2023 - Springer
Abstract Distributed Denial of Service (DDoS) attack poses a significant threat to the cloud
environment that can impoverish the resource availability, engage the server busy, and …