Open Access Open Access  Restricted Access Subscription Access

Classification of Network Cyberattacks for Efficient Cognitive Fog Computing

Prof. A. V. Deorankar, Shiwani S. Thakare

Abstract


IoT is the network which connects and communicates with billions of devices through the internet and due to the massive use of IoT devices, the shared data between the devices or over the network is not confidential because of increasing growth of cyberattacks. The network traffic via loT systems is growing widely and introducing new cybersecurity challenges since these loT devices are connected to sensors that are directly connected to large-scale cloud servers. In order to reduce these cyberattacks, the developers need to raise new techniques for detecting infected loT devices. In this paper, to control over this cyberattacks, the fog layer is introduced, to maintain the security of data on a cloud. Also, the working of fog layer and different anomaly detection techniques to prevent the cyberattacks has been studied.

Full Text:

PDF

References


https://internetofthingsagenda.techtarge t.com/definition/Internet-of-Things-IoT

A. Abeshu and N. Chilarnkurti. Deep learning: the frontier for distributed attack detection in fog-to-things computing. IEEE Communications Magazine.2018.56(2):169-175p.

T. A. Tang, L. Mhamdi, et al. Deep learning approach for network intrusion detection in software defined networking. Wireless Networks and Mobile Communications (WINCOM). International Conference on. IEEE, 2016:258-263p.

B. B. Zarpelao, R. S. Miani, C. T. Kawakani, and S. C. de Alvarenga. A survey of intrusion detection in internet of things. Journal of Networkand Computer Applications.2017.84:25-37p.

B. B. Zarpelao, et al. A survey of intrusion detection in internet of things. Journal of Network and Computer Applications.2017.84:25-37p.

S. Raza, L. Wallgren, and T. Voigt. Svelte: Real-time intrusion detection in the internet of things. Ad hoc networks.2013.11(8):2661- 2674p.

M. Nobakht, V. Sivaraman, and R. Boreli. A host-based intrusion detection and mitigation framework for smart home iot using open flow. Availability, Reliability and Security (ARES), 11th International Conference on. IEEE, 2016.147-156p.

D. H. Summerville, K. M. Zach, and Y. Chen. Ultra-lightweight deep packet anomaly detection for internet of things devices. Computing and Communications Conference (IPCCC), 2015 IEEE 34th International Performance. IEEE, 2015.

M. Tavallaee, N. Stakhanova, and A. Ghorbani. Toward credible evaluation of anomaly-based intrusion- detection methods. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).2010.40:516-524p.

J. Zhang, M. Zulkernine, and A. Haque. Random-forests-based network intrusion detection systems. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 2008.38(5):649- 659p.


Refbacks

  • There are currently no refbacks.