2020
DOI: 10.1109/access.2020.3022855
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection Based on Autoencoder and Isolation Forest in Fog Computing

Abstract: Fog Computing has emerged as an extension to cloud computing by providing an efficient infrastructure to support IoT. Fog computing acting as a mediator provides local processing of the endusers' requests and reduced delays in communication between the end-users and the cloud via fog devices. Therefore, the authenticity of incoming network traffic on the fog devices is of immense importance. These devices are vulnerable to malicious attacks. All kinds of information, especially financial and health information… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
76
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 144 publications
(76 citation statements)
references
References 49 publications
0
76
0
Order By: Relevance
“…Although the authors report very low FAR (≤ 1), this evaluation is provided only for a maximum of 25 packets. Many anomaly detection-based research works report improved accuracy [24], [25], but the main problem with these models is their high false alarm rate [26]. Such intrusion detection models may not be able to generalize effectively on an unknown observation and may classify it as an attack even though it is an unknown benign observation [27].…”
Section: ) Deep Learningmentioning
confidence: 99%
“…Although the authors report very low FAR (≤ 1), this evaluation is provided only for a maximum of 25 packets. Many anomaly detection-based research works report improved accuracy [24], [25], but the main problem with these models is their high false alarm rate [26]. Such intrusion detection models may not be able to generalize effectively on an unknown observation and may classify it as an attack even though it is an unknown benign observation [27].…”
Section: ) Deep Learningmentioning
confidence: 99%
“…IDS can also be used in computing fog on the fog node system side to detect any unsuspecting behavior by monitoring and analyzing files, especially log files, tracking the implementation of access control policies, as well as monitoring user login information. Also, intrusion detection techniques can be classified into two categories, namely detection, signature based intrusion detection systems, and anomaly-based intrusion detection systems [13].…”
Section: B Intrusion Detection Systemmentioning
confidence: 99%
“…Applying strong access control to enable good protection to the Fog node, detecting fake, rogue, or compromised Fog nodes and IoT devices is still a big challenge 87 . Reusing Cloud computing's intrusion detection and protection systems can help to detect external attacks with a certain probability only 29,113 . Therefore, further researches on the detection and protection methods from rogue and compromised Fog nodes and IoT devices are an urgent need in Fog computing 29,87 .…”
Section: Rq3—challenges and Future Directionsmentioning
confidence: 99%
“…87 Reusing Cloud computing's intrusion detection and protection systems can help to detect external attacks with a certain probability only. 29,113 Therefore, further researches on the detection and protection methods from rogue and compromised Fog nodes and IoT devices are an urgent need in Fog computing. 29,87 Moreover, packet forwarding is another big issue in the Fog environment.…”
Section: Malicious Fog Node and Packet Forwardingmentioning
confidence: 99%