2018
DOI: 10.1109/mcom.2018.1700332
|View full text |Cite
|
Sign up to set email alerts
|

Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
152
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 319 publications
(153 citation statements)
references
References 6 publications
1
152
0
Order By: Relevance
“…A previous study [245] proposed a DL model to enhance cybersecurity and enable attack detection in IoT systems and verified the appropriateness of the DL model in securing the cyberspace of IoT systems. Similarly, [246] proposed a distributed DL model to deliver accurate protection against cyberattacks and threats in fog-to-things computing and used an SAE algorithm to construct their learning model. The authors confirmed that the DL models are more suitable for such cyberattack protection than are traditional methods in terms of scalability, accuracy and false alarm rate.…”
Section: Application Layermentioning
confidence: 99%
“…A previous study [245] proposed a DL model to enhance cybersecurity and enable attack detection in IoT systems and verified the appropriateness of the DL model in securing the cyberspace of IoT systems. Similarly, [246] proposed a distributed DL model to deliver accurate protection against cyberattacks and threats in fog-to-things computing and used an SAE algorithm to construct their learning model. The authors confirmed that the DL models are more suitable for such cyberattack protection than are traditional methods in terms of scalability, accuracy and false alarm rate.…”
Section: Application Layermentioning
confidence: 99%
“…[14] also explored how deep reinforcement learning and its shift towards semi-supervision can handle the cognitive side of smart-city services. The work in [15] indicated that the application of deep networks has already been successful in big-data areas, and fog-to-things computing can be the ultimate beneficiary of the approach for attack detection because the massive amount of data produced by IoT devices enables deep models to learn better than shallow algorithms. In summary, most of the current researches on cognitive computing has focused on the design of algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…A back-propagation approach that relies on the gradient descent method is used to learn the model parameters efficiently. The detailed process for the back-propagation approach can be found in Abeshu et al [7].…”
Section: Related Workmentioning
confidence: 99%
“…The abovementioned process to train a multilayer and complex DL model entails a high computational overhead. To mitigate this issue, various novel DL paradigms have been proposed by many researchers at the different layer of IoT such as cloud edge, and fog [4][5][6][7][8]. Zhang et al [6] presented a DL approach wherein the learning task is performed at the cloud layer to improve the learning efficiency for big data analysis.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation