2018
DOI: 10.1155/2018/7472095
|View full text |Cite
|
Sign up to set email alerts
|

Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC

Abstract: Fog computing, as a new paradigm, has many characteristics that are different from cloud computing. Due to the resources being limited, fog nodes/MEC hosts are vulnerable to cyberattacks. Lightweight intrusion detection system (IDS) is a key technique to solve the problem. Because extreme learning machine (ELM) has the characteristics of fast training speed and good generalization ability, we present a new lightweight IDS called sample selected extreme learning machine (SS-ELM). The reason why we propose "samp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
68
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 82 publications
(71 citation statements)
references
References 26 publications
0
68
0
Order By: Relevance
“…Each ED j needing task computation is a selfish and rational player with the aim of minimizing its task overall completion time, according to (3), (4), and (5). In particular, each ED j forms its preference list over  by sorting the computation sites to find min , ,…”
Section: Eds and Fns Preference Listmentioning
confidence: 99%
See 2 more Smart Citations
“…Each ED j needing task computation is a selfish and rational player with the aim of minimizing its task overall completion time, according to (3), (4), and (5). In particular, each ED j forms its preference list over  by sorting the computation sites to find min , ,…”
Section: Eds and Fns Preference Listmentioning
confidence: 99%
“…Within this context, the development of efficient approaches to meet specific real‐time applications constraints to store and process data became a major study issue. In parallel, IoT security has also become a central issue in many application scenarios . Over the past decade, cloud computing (CC) has been foreseen as a powerful network architecture to execute remote storage and data computation .…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The focus of this study is on the intrusion response. Intrusion response is an important function of IDS framework [8] as shown in Figure 3.…”
Section: Intrusion In Fog Networkmentioning
confidence: 99%
“…Intrusion detection system [6] (IDS) is a measure that can provide effective security for fog network [7]. Our previous work [8,9] has proposed a general IDS framework to protect cloud servers and fog nodes from security threats. One of the functions of IDS is to make corresponding response strategy based on attackers' behaviors.…”
Section: Introductionmentioning
confidence: 99%