349 426
Full Length Article
Journal of Cybersecurity and Information Management
Volume 12 , Issue 2, PP: 08-17 , 2023 | Cite this article as | XML | Html |PDF

Title

An Effective FOG Computing Based Distributed Forecasting of Cyber-Attacks in Internet of Things

  Vandana Roy 1 *

1  DoEC, Gyan Ganga Institute of Technology and Sciences, Jabalpur, M. P., India
    (vandanaroy@ggits.org)


Doi   :   https://doi.org/10.54216/JCIM.120201

Received: December 12, 2022 Revised: February 05, 2023 Accepted: May 09, 2023

Abstract :

Existing cloud based security procedures are insufficient to manage the ever-increasing assaults in IoT due to the volume of data generated and the processing latency. IoT applications are vulnerable to cyberattacks, and some of these assaults might have catastrophic results if not stopped or mitigated quickly enough. As a result, IoT calls for self-protect security systems that can automatically interpret attacks in IoT traffic and efficiently handle the attack situation by activating the proper response quickly. Fog computing satisfies this need because it can embed the intelligent self-protection mechanism in the distributed fog nodes, allowing them to swiftly deal with the assault scenario and safeguard the IoT application with little in the way of human interaction. At the fog nodes, the forecasting method employs distributed Gaussian process regression. The cyber-attack may be predicted more quickly and with less mistake for both low- and high-rate attacks thanks to the local forecasting about the IoT traffic characteristics at fog node. One of the fundamental necessities of an IoT security mechanism is the ability to forecast attacks in a timely manner with a high degree of accuracy, and the simulation results highlight this fact.

Keywords :

IoT; GPR; FPGR; MSE.

References :

[1]. Ammar, M, Russello, G & Crispo, B 2018, 'Internet of things: A survey on the security of IoT frameworks', Journal of Information Security and Applications, vol. 38, pp. 8-27.

[2]. Arabo Abdullahi & Bernardi Pranggono 2013, ‘Mobile malware and smart device security: Trends, challenges and solutions’, 19th International Conference on In Control Systems and Computer Science (CSCS), pp. 526-531.

[3]. Fawaz Ahmed, Robin Berthier & William H Sanders 2016, ‘A response cost model for advanced metering infrastructures’, IEEE Transactions on Smart Grid, vol. 7, no. 2, pp. 543-553.

[4]. Lyu, L, Jin, J, Rajasegarar, S, He, X & Palaniswami, M 2017, ‘Fogempowered anomaly detection in IoT using hyperellipsoidal clustering’, IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1174-1184. [5]. Malialis, K, Devlin, S & Kudenko, D 2015, ‘Distributed reinforcement learning for adaptive and robust network intrusion response’, Connection Science, vol. 27, no. 3, pp. 234-252.

[6]. Pongle, P & Chavan, G 2015, 'Real time intrusion and wormhole attack detection in internet of things', International Journal of Computer Applications, vol. 121, no. 9, pp. 1-9.

[7]. Phan, L.A.; Nguyen, D.T.; Lee, M.; Park, D.H.; Kim, T. Dynamic Fog-to-Fog Offloading in SDN-Based Fog Computing Systems. Future Gener. Comput. Syst. 2021, 117, 486–497

[8]. Martinez, I.; Hafid, A.S.; Jarray, A. Design, Resource Management, and Evaluation of Fog Computing Systems: A Survey. IEEE Internet Things J. 2021, 8, 2494–2516.

[9]. Dash, S.; Biswas, S.; Banerjee, D. Atta-Ur-Rahman Edge and Fog Computing in Healthcare—A Review. Scalable Comput. 2019, 20, 191–206.

[10]. Sahil; Sood, S.K. Fog-Cloud Centric IoT-Based Cyber Physical Framework for Panic Oriented Disaster Evacuation in Smart Cities. Earth Sci. Inform. 2022, 15, 1449–1470.

[11]. Basir, R.; Qaisar, S.; Ali, M.; Aldwairi, M.; Ashraf, M.I.; Mahmood, A.; Gidlund, M. Fog Computing Enabling Industrial Internet of Things: State-of-the-Art and Research Challenges. Sensors 2019, 19, 4807.

[12]. Pop, P.; Zarrin, B.; Barzegaran, M.; Schulte, S.; Punnekkat, S.; Ruh, J.; Steiner, W. The FORA Fog Computing Platform for Industrial IoT. Inf. Syst. 2021, 98, 101727.

[13]. Sadaf, K.; Sultana, J. Intrusion Detection Based on Autoencoder and Isolation Forest in Fog Computing. IEEE Access 2020, 8, 167059–167068.

[14]. Sheikh Sofla, M.; Haghi Kashani, M.; Mahdipour, E.; Faghih Mirzaee, R. Towards Effective Offloading Mechanisms in Fog Computing. Multimed. Tools Appl. 2022, 81, 1997.

[15]. Vilela, P.H.; Rodrigues, J.J.P.C.; Righi, R.D.R.; Kozlov, S.; Rodrigues, V.F. Looking at Fog Computing for E-Health through the Lens of Deployment Challenges and Applications. Sensors 2020, 20, 2553.

[16]. Roy V et. Al., “Network Physical Address Based Encryption Technique Using Digital Logic”, International Journal of Scientific & Technology Research, Vol. 9, No. 4, 2020, Pp no.- 3119-3122.

[17]. Seema Gaba , Kavita . , Sahil Verma , Monica Sood, Multicasting Data Routing for Vehicular Ad hoc Network using Fog Computing, International Journal of Wireless and Ad Hoc Communication, Vol. 3 , No. 1 , (2021) : 37-48 (Doi   :  https://doi.org/10.54216/IJWAC.030104)

[18]. Zhang, P.Y.; Zhou, M.C.; Fortino, G. Security and Trust Issues in Fog Computing: A Survey. Future Gener. Comput. Syst. 2018, 88, 16–27.

[19]. Hu, P.; Dhelim, S.; Ning, H.; Qiu, T. Survey on Fog Computing: Architecture, Key Technologies, Applications and Open Issues. J. Netw. Comput. Appl. 2017, 98, 27–42.

[20]. Prabavathy, S, Sundarakantham, K & Mercy Shalinie, S 2018, ‘Design of cognitive fog computing for autonomic security system in critical infrastructure’, Journal of Universal Computer Science, vol. 24, no. 5, pp. 577-602.

[21]. Lera, I.; Guerrero, C.; Juiz, C. YAFS: A Simulator for IoT Scenarios in Fog Computing. IEEE Access 2019, 7, 91745–91758.

[22]. Mouradian, C.; Naboulsi, D.; Yangui, S.; Glitho, R.H.; Morrow, M.J.; Polakos, P.A. A Comprehensive Survey on Fog Computing: State-of-the-Art and Research Challenges. IEEE Commun. Surv. Tutor. 2018, 20, 416–464.

[23]. Moshayedi, A.J.; Roy, A.S.; Taravet, A.; Liao, L.; Wu, J.; Gheisari, M. A Secure Traffic Police Remote Sensing Approach via a Deep Learning-Based Low-Altitude Vehicle Speed Detector through UAVs in Smart Cites: Algorithm, Implementation and Evaluation. Future Transp. 2023, 3, 12.

[24]. Tselios, C.; Politis, I.; Amaxilatis, D.; Akrivopoulos, O.; Chatzigiannakis, I.; Panagiotakis, S.; Markakis, E.K. Melding Fog Computing and IoT for Deploying Secure, Response-Capable Healthcare Services in 5G and Beyond. Sensors 2022, 22, 3375.

[25]. Tuli, Shreshth & Mirhakimi, Fatemeh & Pallewatta, Samodha & Zawad, Syed & Casale, Giuliano & Javadi, Bahman & Yan, Feng & Buyya, Rajkumar & Jennings, Nicholas. (2023). AI augmented Edge and Fog computing: Trends and challenges. Journal of Network and Computer Applications. 216. 103648. 10.1016/j.jnca.2023.103648.


Cite this Article as :
Style #
MLA Vandana Roy. "An Effective FOG Computing Based Distributed Forecasting of Cyber-Attacks in Internet of Things." Journal of Cybersecurity and Information Management, Vol. 12, No. 2, 2023 ,PP. 08-17 (Doi   :  https://doi.org/10.54216/JCIM.120201)
APA Vandana Roy. (2023). An Effective FOG Computing Based Distributed Forecasting of Cyber-Attacks in Internet of Things. Journal of Journal of Cybersecurity and Information Management, 12 ( 2 ), 08-17 (Doi   :  https://doi.org/10.54216/JCIM.120201)
Chicago Vandana Roy. "An Effective FOG Computing Based Distributed Forecasting of Cyber-Attacks in Internet of Things." Journal of Journal of Cybersecurity and Information Management, 12 no. 2 (2023): 08-17 (Doi   :  https://doi.org/10.54216/JCIM.120201)
Harvard Vandana Roy. (2023). An Effective FOG Computing Based Distributed Forecasting of Cyber-Attacks in Internet of Things. Journal of Journal of Cybersecurity and Information Management, 12 ( 2 ), 08-17 (Doi   :  https://doi.org/10.54216/JCIM.120201)
Vancouver Vandana Roy. An Effective FOG Computing Based Distributed Forecasting of Cyber-Attacks in Internet of Things. Journal of Journal of Cybersecurity and Information Management, (2023); 12 ( 2 ): 08-17 (Doi   :  https://doi.org/10.54216/JCIM.120201)
IEEE Vandana Roy, An Effective FOG Computing Based Distributed Forecasting of Cyber-Attacks in Internet of Things, Journal of Journal of Cybersecurity and Information Management, Vol. 12 , No. 2 , (2023) : 08-17 (Doi   :  https://doi.org/10.54216/JCIM.120201)