Design of Cognitive Fog Computing for Intrusion Detection in Internet of Things

Internet of things (IoT) is penetrating into every aspect of our lives including our body, our home and our living environment along with numerous security challenges. With rapidly growing number of connected devices in IoT, the scope for cyber-attack also increases exponentially. Therefore an effec...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of communications and networks 2018, Vol.20 (3), p.291-298
Hauptverfasser: Prabavathy, S, Sundarakantham, K, Shalinie, S.Mercy
Format: Artikel
Sprache:kor
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 298
container_issue 3
container_start_page 291
container_title Journal of communications and networks
container_volume 20
creator Prabavathy, S
Sundarakantham, K
Shalinie, S.Mercy
description Internet of things (IoT) is penetrating into every aspect of our lives including our body, our home and our living environment along with numerous security challenges. With rapidly growing number of connected devices in IoT, the scope for cyber-attack also increases exponentially. Therefore an effective intrusion detection system (IDS) is needed to efficiently detect the attack at faster rate in highly scalable and dynamic IoT environment. In this paper, a novel intrusion detection technique is proposed based on fog computing using Online Sequential Extreme Learning Machine (OS-ELM) which can intelligently interpret the attacks from the IoT traffic. In the proposed system, the existing centralized cloud intelligence in detecting the attack is distributed to local fog nodes to detect the attack at faster rate for IoT application. The distributed architecture of fog computing enables distributed intrusion detection mechanism with scalability, flexibility and interoperability. The analysis of the proposed system proves to be efficient in terms of response time and detection accuracy.
format Article
fullrecord <record><control><sourceid>kisti</sourceid><recordid>TN_cdi_kisti_ndsl_JAKO201825677858002</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>JAKO201825677858002</sourcerecordid><originalsourceid>FETCH-kisti_ndsl_JAKO2018256778580023</originalsourceid><addsrcrecordid>eNqNi8sOgjAURBujiUT5h25ckpTW0rI0IPGxYMOe-Ch4I7aGW_x-IfEDXM2ZyZkZCeJUJZGU23g-MudpxIViSxIiwpVJIbRWXASkzA1Ca6lraOZaCx4-hhauHdvrPXiwLW1cT4_W9wOCszQ33tz8RGCn2fTW-OlePUYZ12TRXDo04S9XZFPsq-wQPQE91PaOXX3anUvOYs1lopSWmjEu_vW-L1E-ew</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Design of Cognitive Fog Computing for Intrusion Detection in Internet of Things</title><source>IEEE Electronic Library (IEL)</source><creator>Prabavathy, S ; Sundarakantham, K ; Shalinie, S.Mercy</creator><creatorcontrib>Prabavathy, S ; Sundarakantham, K ; Shalinie, S.Mercy</creatorcontrib><description>Internet of things (IoT) is penetrating into every aspect of our lives including our body, our home and our living environment along with numerous security challenges. With rapidly growing number of connected devices in IoT, the scope for cyber-attack also increases exponentially. Therefore an effective intrusion detection system (IDS) is needed to efficiently detect the attack at faster rate in highly scalable and dynamic IoT environment. In this paper, a novel intrusion detection technique is proposed based on fog computing using Online Sequential Extreme Learning Machine (OS-ELM) which can intelligently interpret the attacks from the IoT traffic. In the proposed system, the existing centralized cloud intelligence in detecting the attack is distributed to local fog nodes to detect the attack at faster rate for IoT application. The distributed architecture of fog computing enables distributed intrusion detection mechanism with scalability, flexibility and interoperability. The analysis of the proposed system proves to be efficient in terms of response time and detection accuracy.</description><identifier>ISSN: 1229-2370</identifier><identifier>EISSN: 1976-5541</identifier><language>kor</language><ispartof>Journal of communications and networks, 2018, Vol.20 (3), p.291-298</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,314,776,780,881,4009</link.rule.ids></links><search><creatorcontrib>Prabavathy, S</creatorcontrib><creatorcontrib>Sundarakantham, K</creatorcontrib><creatorcontrib>Shalinie, S.Mercy</creatorcontrib><title>Design of Cognitive Fog Computing for Intrusion Detection in Internet of Things</title><title>Journal of communications and networks</title><addtitle>Journal of communications and networks</addtitle><description>Internet of things (IoT) is penetrating into every aspect of our lives including our body, our home and our living environment along with numerous security challenges. With rapidly growing number of connected devices in IoT, the scope for cyber-attack also increases exponentially. Therefore an effective intrusion detection system (IDS) is needed to efficiently detect the attack at faster rate in highly scalable and dynamic IoT environment. In this paper, a novel intrusion detection technique is proposed based on fog computing using Online Sequential Extreme Learning Machine (OS-ELM) which can intelligently interpret the attacks from the IoT traffic. In the proposed system, the existing centralized cloud intelligence in detecting the attack is distributed to local fog nodes to detect the attack at faster rate for IoT application. The distributed architecture of fog computing enables distributed intrusion detection mechanism with scalability, flexibility and interoperability. The analysis of the proposed system proves to be efficient in terms of response time and detection accuracy.</description><issn>1229-2370</issn><issn>1976-5541</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>JDI</sourceid><recordid>eNqNi8sOgjAURBujiUT5h25ckpTW0rI0IPGxYMOe-Ch4I7aGW_x-IfEDXM2ZyZkZCeJUJZGU23g-MudpxIViSxIiwpVJIbRWXASkzA1Ca6lraOZaCx4-hhauHdvrPXiwLW1cT4_W9wOCszQ33tz8RGCn2fTW-OlePUYZ12TRXDo04S9XZFPsq-wQPQE91PaOXX3anUvOYs1lopSWmjEu_vW-L1E-ew</recordid><startdate>2018</startdate><enddate>2018</enddate><creator>Prabavathy, S</creator><creator>Sundarakantham, K</creator><creator>Shalinie, S.Mercy</creator><scope>JDI</scope></search><sort><creationdate>2018</creationdate><title>Design of Cognitive Fog Computing for Intrusion Detection in Internet of Things</title><author>Prabavathy, S ; Sundarakantham, K ; Shalinie, S.Mercy</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-kisti_ndsl_JAKO2018256778580023</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>kor</language><creationdate>2018</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Prabavathy, S</creatorcontrib><creatorcontrib>Sundarakantham, K</creatorcontrib><creatorcontrib>Shalinie, S.Mercy</creatorcontrib><collection>KoreaScience</collection><jtitle>Journal of communications and networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Prabavathy, S</au><au>Sundarakantham, K</au><au>Shalinie, S.Mercy</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Design of Cognitive Fog Computing for Intrusion Detection in Internet of Things</atitle><jtitle>Journal of communications and networks</jtitle><addtitle>Journal of communications and networks</addtitle><date>2018</date><risdate>2018</risdate><volume>20</volume><issue>3</issue><spage>291</spage><epage>298</epage><pages>291-298</pages><issn>1229-2370</issn><eissn>1976-5541</eissn><abstract>Internet of things (IoT) is penetrating into every aspect of our lives including our body, our home and our living environment along with numerous security challenges. With rapidly growing number of connected devices in IoT, the scope for cyber-attack also increases exponentially. Therefore an effective intrusion detection system (IDS) is needed to efficiently detect the attack at faster rate in highly scalable and dynamic IoT environment. In this paper, a novel intrusion detection technique is proposed based on fog computing using Online Sequential Extreme Learning Machine (OS-ELM) which can intelligently interpret the attacks from the IoT traffic. In the proposed system, the existing centralized cloud intelligence in detecting the attack is distributed to local fog nodes to detect the attack at faster rate for IoT application. The distributed architecture of fog computing enables distributed intrusion detection mechanism with scalability, flexibility and interoperability. The analysis of the proposed system proves to be efficient in terms of response time and detection accuracy.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1229-2370
ispartof Journal of communications and networks, 2018, Vol.20 (3), p.291-298
issn 1229-2370
1976-5541
language kor
recordid cdi_kisti_ndsl_JAKO201825677858002
source IEEE Electronic Library (IEL)
title Design of Cognitive Fog Computing for Intrusion Detection in Internet of Things
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-25T15%3A28%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-kisti&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Design%20of%20Cognitive%20Fog%20Computing%20for%20Intrusion%20Detection%20in%20Internet%20of%20Things&rft.jtitle=Journal%20of%20communications%20and%20networks&rft.au=Prabavathy,%20S&rft.date=2018&rft.volume=20&rft.issue=3&rft.spage=291&rft.epage=298&rft.pages=291-298&rft.issn=1229-2370&rft.eissn=1976-5541&rft_id=info:doi/&rft_dat=%3Ckisti%3EJAKO201825677858002%3C/kisti%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true