2019
DOI: 10.1109/access.2019.2899017
|View full text |Cite
|
Sign up to set email alerts
|

Node State Monitoring Scheme in Fog Radio Access Networks for Intrusion Detection

Abstract: This paper studies intrusion detection for fog computing in fog radio access networks (F-RANs). As fog nodes are resource constrained, a traditional intrusion detection system (IDS) cannot be directly deployed in F-RANs due to the communication overhead and computational complexity. To address this challenge, we propose a skyline query-based scheme that can analyze the IDS log statistics of fog nodes and provide a complete data processing flow. Specifically, a three-step solution is proposed. First, a lightwei… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 36 publications
0
11
0
Order By: Relevance
“…Figure 16 shows a 3D figure for the accuracy rate per class for TIDCS as a function of time for TVSU = 300. First, we can remark that TIDCS has a 100% accuracy for 6 class classifications which are (0,4,5,6,7,8) and has a weak detection performance for the rest (1,2,3,9). In particular, class 10 has 0 packets detected from 100 received.…”
Section: F Tidcs Vs Tidcs-amentioning
confidence: 95%
See 1 more Smart Citation
“…Figure 16 shows a 3D figure for the accuracy rate per class for TIDCS as a function of time for TVSU = 300. First, we can remark that TIDCS has a 100% accuracy for 6 class classifications which are (0,4,5,6,7,8) and has a weak detection performance for the rest (1,2,3,9). In particular, class 10 has 0 packets detected from 100 received.…”
Section: F Tidcs Vs Tidcs-amentioning
confidence: 95%
“…where the attacker can steal property or information for a personal gain), a fog administrator, who can manage fog instances, can instantiate a rogue fog instance rather than a legitimate one. The existence of fake fog node presents a big threat to personal data privacy and security [3]. Furthermore, the virtual machine instances are dynamically created/added/removed which makes it hard to maintain a blacklist of rogue nodes and to establish longterm trust between nodes.…”
Section: Introductionmentioning
confidence: 99%
“…In this section, we implement this process with an Ed-Max filtering strategy (EMFS) based on Skyline query. Ed-Max algorithm was first proposed in [41] and the authors proved that the data filtered by this algorithm will not affect the global Skyline set. In addition, the filtering effect of this algorithm is better than that of MinMax algorithm.…”
Section: E Ed-max Filtering Strategymentioning
confidence: 99%
“…In the following, we introduce the content recommendation algorithm pseudocode in Algorithm 1. In this algorithm, the step 3 is similar to the fog node filtering strategy (FNFS) proposed in [41], for both of them need to find the optimal Euclidean distance.…”
Section: E Ed-max Filtering Strategymentioning
confidence: 99%
“…Intrusion detection has been also possible by analyzing IDS log statistics in the fog nodes with a query-based strategy plus uncertainty tests to calculate the degree of a potential threat. This approach was tested for fog radio access networks (F-RANs) [8]. A different approach reported an IDS architecture for edge computing.…”
Section: Introductionmentioning
confidence: 99%