2019
DOI: 10.34117/bjdv5n11-089
|View full text |Cite
|
Sign up to set email alerts
|

DoS attack detection and prevention in fog-based intelligent environments

Abstract: The Internet of Things and Fog Computing are technologies currently used in many areas. They can be applied to provide a residential automation environment, for example, fire alarm applications, gas leak alarms, among others. Security-related searches for these fog-based environments are still in the early stages. Also, the fact that these environments are connected to the Internet makes them vulnerable to various threats, such as Denial of Service (DoS) attacks. In this work, we propose a module for detection… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 17 publications
(17 reference statements)
0
2
0
Order By: Relevance
“…No OS-ELM High accuracy rate Using legacy dataset (public databases NSL-KDD) [11] Yes CEP Good accuracy rate percentage of missing data reaches 8% [12] No SVM and etc. Multiclass detection Low accuracy rate and time [13] Yes -Reduce resource use Not mentioning the methods used for detection [14] Yes FOCUS Efficient VPNs might slow down your internet connection. [15] No…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…No OS-ELM High accuracy rate Using legacy dataset (public databases NSL-KDD) [11] Yes CEP Good accuracy rate percentage of missing data reaches 8% [12] No SVM and etc. Multiclass detection Low accuracy rate and time [13] Yes -Reduce resource use Not mentioning the methods used for detection [14] Yes FOCUS Efficient VPNs might slow down your internet connection. [15] No…”
Section: Resultsmentioning
confidence: 99%
“…A methodology for detecting DDoS assaults in fog computing is proposed by Cardoso et al [13] utilizing a Raspberry Pi 3B as a fog server. Denial of service (DoS) and DDoS assaults are generated with the help of the HPING3 application (SYN Flood, Ping Flood, and UDP Flood).…”
Section: Related Workmentioning
confidence: 99%