2020
DOI: 10.1109/access.2020.2988055
|View full text |Cite
|
Sign up to set email alerts
|

Artificial Neural Networks-Based Intrusion Detection System for Internet of Things Fog Nodes

Abstract: The Internet of Things (IoT) represents a mean to share resources (memory, storage computational power, data, etc.) between computers and mobile devices, as well as buildings, wearable devices, electrical grids, and automobiles, just to name few. The IoT is leading to the development of advanced information services that will require large storage and computational power, as well as real-time processing capabilities. The integration of IoT with emerging technologies such as Fog Computing can complement these r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 53 publications
(28 citation statements)
references
References 37 publications
0
27
0
1
Order By: Relevance
“…An efficient way to detect network scanning attacks is the data mining of network traffic based on a neural network approach [14][15][16][17]. This approach is based on the creation of a neural network trained with the use of data that include the signs of a network scanning attack.…”
Section: Methodsmentioning
confidence: 99%
“…An efficient way to detect network scanning attacks is the data mining of network traffic based on a neural network approach [14][15][16][17]. This approach is based on the creation of a neural network trained with the use of data that include the signs of a network scanning attack.…”
Section: Methodsmentioning
confidence: 99%
“…Pacheco et al [ 13 ] proposed an artificial neural network-based method for implementing an adaptive IDS to detect attacks on fog nodes in IoT applications and ensure the availability of communication, allowing the nodes to continuously deliver the important information to the end users. The proposed method was able to detect the normal behavior of fog nodes and was able to detect anomalies due to different sources, such as misuses, cyber-attacks, with a high detection rate and low false alarms.…”
Section: Related Workmentioning
confidence: 99%
“…A literature work has been carried out to examine recent findings in the area of IDS solutions in MEC networks [66][67][68][69][70][71][72][73][74]. A firewall architecture has been designed to protect the edge network from the insider attack [75].…”
Section: Related Workmentioning
confidence: 99%