2022
DOI: 10.1155/2022/6750757
|View full text |Cite
|
Sign up to set email alerts
|

Design of Graph-Based Layered Learning-Driven Model for Anomaly Detection in Distributed Cloud IoT Network

Abstract: Within numerous IoT domains, recent IoT proliferation has influenced organizational activities and business procedures. The number of connected edge devices has increased dramatically, resulting in a vast stream of data that is prone to leakage and manipulation, decreasing the security level of the attacked IoT ecosystem. Anomaly detection systems based on graphs have been widely used to prevent network malfunction while considering the mergers of organizations involved, modeling their relationships, and integ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

4
4

Authors

Journals

citations
Cited by 13 publications
(14 citation statements)
references
References 21 publications
0
14
0
Order By: Relevance
“…The new parameter "Q ¼ q 1 , q 2 , …, q j h i " given above as in (12) represents the likelihood feature representation to each dimensionality-reduced network traffic features data. The aggregated likelihood feature representation is mathematically represented as given below.…”
Section: • Hosmer Lemeshow Logistic Regression Window-based Attack De...mentioning
confidence: 99%
“…The new parameter "Q ¼ q 1 , q 2 , …, q j h i " given above as in (12) represents the likelihood feature representation to each dimensionality-reduced network traffic features data. The aggregated likelihood feature representation is mathematically represented as given below.…”
Section: • Hosmer Lemeshow Logistic Regression Window-based Attack De...mentioning
confidence: 99%
“…All strategies used to lower energy-specific hardware components/levels are covered in extreme detail. There is much emphasis on techniques deployed at the hardware-level (network-or server-level) that can lead to energy-efficient or ecologically friendly data centers [122][123][124][125][126][127][128][129][130][131][132].…”
Section: Related Surveysmentioning
confidence: 99%
“…A hypervisor is the system software that works as an operating system (abstraction layer) for virtual machines and coordinates with the underlying hardware components according to the virtual machine's predefined instructions [124][125][126][127]. Virtualization is not a new concept in the IT sector as it has already been implemented with our grand old Main Frames, which belong to second-generation computing devices.…”
Section: Rq5: Describe Various Energy Efficiency Techniques Employed ...mentioning
confidence: 99%
“…To create learning representations that are efcient and resistant to intrinsic EEG noise as well as inter-and intrasubject variation, deep recurrent convolutional neural networks are used [15]. To avoid the need for handcrafted features, deep belief networks, an unsupervised feature learning architecture, were applied to the sleep data [16]. Compared with handcrafted features, the deep belief network (DBN) technique improved the sleep classifcation accuracy.…”
Section: Introductionmentioning
confidence: 99%