2022
DOI: 10.17762/ijcnis.v12i1.4459
|View full text |Cite
|
Sign up to set email alerts
|

IoT Crawler with Behavior Analyzer at Fog layer for Detecting Malicious Nodes

Abstract: The limitations in terms of power and processing in IoT (Internet of Things) nodes make nodes an easy prey for malicious attacks, thus threatening business and industry. Detecting malicious nodes before they trigger an attack is highly recommended. The paper introduces a special purpose IoT crawler that works as an inspector to catch malicious nodes. This crawler is deployed in the Fog layer to inherit its capabilities, and to be an intermediate connection between the things and the cloud computing nodes. The … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 73 publications
0
1
0
Order By: Relevance
“…Instead of looking for the most discriminating cut points, they are drawn randomly in ET, making the ET training process faster. In [Albdour et al 2020] is proposed an ET-based intrusion detection approach for the fog layer. The approach has 10 DTs and uses the Gini criterion.…”
Section: State Of the Art In Intrusion Detection In The Context Of Io...mentioning
confidence: 99%
See 2 more Smart Citations
“…Instead of looking for the most discriminating cut points, they are drawn randomly in ET, making the ET training process faster. In [Albdour et al 2020] is proposed an ET-based intrusion detection approach for the fog layer. The approach has 10 DTs and uses the Gini criterion.…”
Section: State Of the Art In Intrusion Detection In The Context Of Io...mentioning
confidence: 99%
“…Many approaches found in the state-of-the-art focus on performing binary detection (attack or non-attack). However, binary methods cannot identify the type or category of attack [Albdour et al 2020]. The approaches, which aim to classify the attack into specific categories, are multiclass.…”
Section: Machine Learning Approachsmentioning
confidence: 99%
See 1 more Smart Citation
“…A recent study by Layla Albdour et al . [8] uses a crawler that acts as a security checker to monitor IoT nodes and collect data streams to analyze the behavior of the nodes. Based on that, to put the fake IoT alert action.…”
Section: Related Studiesmentioning
confidence: 99%