2023
DOI: 10.1007/s11276-023-03382-w
|View full text |Cite
|
Sign up to set email alerts
|

Decision model of intrusion response based on markov game in fog computing environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 24 publications
0
1
0
Order By: Relevance
“…• With augmented traffic in the network, there is a high suspicion of distortions, leading to a loss of coherence in the data that could potentially cause false-positive alarms; • Regrettably, the quantity of false-positive alarms surpasses the potential attacks by intruders-therefore, a limitation is to accurately differentiate these genuine attacks from the irrelevant ones; • A challenge in classifying alarms arises due to the diversity of firmware versions-it is imperative to keep the devices' versions in the network as current as possible and to utilize devices from vendors with minimal diversification [30][31][32][33][34].…”
Section: Limitations Of Own Researchmentioning
confidence: 99%
“…• With augmented traffic in the network, there is a high suspicion of distortions, leading to a loss of coherence in the data that could potentially cause false-positive alarms; • Regrettably, the quantity of false-positive alarms surpasses the potential attacks by intruders-therefore, a limitation is to accurately differentiate these genuine attacks from the irrelevant ones; • A challenge in classifying alarms arises due to the diversity of firmware versions-it is imperative to keep the devices' versions in the network as current as possible and to utilize devices from vendors with minimal diversification [30][31][32][33][34].…”
Section: Limitations Of Own Researchmentioning
confidence: 99%