Classification of Network Cyberattacks for Efficient Cognitive Fog Computing
Abstract
Full Text:
PDFReferences
https://internetofthingsagenda.techtarge t.com/definition/Internet-of-Things-IoT
A. Abeshu and N. Chilarnkurti. Deep learning: the frontier for distributed attack detection in fog-to-things computing. IEEE Communications Magazine.2018.56(2):169-175p.
T. A. Tang, L. Mhamdi, et al. Deep learning approach for network intrusion detection in software defined networking. Wireless Networks and Mobile Communications (WINCOM). International Conference on. IEEE, 2016:258-263p.
B. B. Zarpelao, R. S. Miani, C. T. Kawakani, and S. C. de Alvarenga. A survey of intrusion detection in internet of things. Journal of Networkand Computer Applications.2017.84:25-37p.
B. B. Zarpelao, et al. A survey of intrusion detection in internet of things. Journal of Network and Computer Applications.2017.84:25-37p.
S. Raza, L. Wallgren, and T. Voigt. Svelte: Real-time intrusion detection in the internet of things. Ad hoc networks.2013.11(8):2661- 2674p.
M. Nobakht, V. Sivaraman, and R. Boreli. A host-based intrusion detection and mitigation framework for smart home iot using open flow. Availability, Reliability and Security (ARES), 11th International Conference on. IEEE, 2016.147-156p.
D. H. Summerville, K. M. Zach, and Y. Chen. Ultra-lightweight deep packet anomaly detection for internet of things devices. Computing and Communications Conference (IPCCC), 2015 IEEE 34th International Performance. IEEE, 2015.
M. Tavallaee, N. Stakhanova, and A. Ghorbani. Toward credible evaluation of anomaly-based intrusion- detection methods. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).2010.40:516-524p.
J. Zhang, M. Zulkernine, and A. Haque. Random-forests-based network intrusion detection systems. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 2008.38(5):649- 659p.
Refbacks
- There are currently no refbacks.