2019
DOI: 10.3390/app9010178
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Perceptron-Based Intrusion Detection System for Fog Computing

Abstract: Fog computing is a paradigm that extends cloud computing and services to the edge of the network in order to address the inherent problems of the cloud, such as latency and lack of mobility support and location-awareness. The fog is a decentralized platform capable of operating and processing data locally and can be installed in heterogeneous hardware which makes it ideal for Internet of Things (IoT) applications. Intrusion Detection Systems (IDSs) are an integral part of any security system for fog and IoT ne… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
41
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 97 publications
(41 citation statements)
references
References 36 publications
0
41
0
Order By: Relevance
“…Dual features were applied to a 2-tier model for classifying the attacks using KNN and NB classifiers [27]. Based on space representation using vectors, a lightweight Intrusion Detection System was suggested by Khater et al [28]. The suggested model used a single hidden layer of MLP and a small number of nodes to evaluate two different datasets containing information of intrusion attacks and they belong to different domains on different applications of a particular region.…”
Section: Related Workmentioning
confidence: 99%
“…Dual features were applied to a 2-tier model for classifying the attacks using KNN and NB classifiers [27]. Based on space representation using vectors, a lightweight Intrusion Detection System was suggested by Khater et al [28]. The suggested model used a single hidden layer of MLP and a small number of nodes to evaluate two different datasets containing information of intrusion attacks and they belong to different domains on different applications of a particular region.…”
Section: Related Workmentioning
confidence: 99%
“…The study [19] proposed the intrusion detection system for fog computing, and their proposal was based on the multilayer perceptron (MLP). Their experiments with two datasets [20,21] achieved the 94% accuracy with ADFA-LD and 74% accuracy with ADFA-WD.…”
Section: Related Workmentioning
confidence: 99%
“…The IDS studies [5,[19][20][21][22][23][24][25][26][27] also have proposed attack detection based on Raspberry Pi. In the work of [18], the anomaly-based detection method was proposed by capturing the previous traffic patterns asbenign data for attack detection system construction.…”
Section: Raspberry Pi-based Idsmentioning
confidence: 99%
“…How to implement a lightweight and efficient detection system in the IoT environment has become a crucially important issue. The IDS on fog computing [24] was introduced using new modern datasets, namely Australian Defence Force Academy Linux Dataset (ADFA-LD) and ADFA-Windows Dataset (ADFA-WD) [3,25]. This work [24] also used Raspberry Pi to evaluate the performance of attack detecting model.…”
Section: Raspberry Pi-based Idsmentioning
confidence: 99%
See 1 more Smart Citation