Detecting Man-in-the-Middle Attack in Fog Computing for Social Media
نویسندگان
چکیده
Fog computing (FC) is a networking paradigm where wireless devices known as fog nodes are placed at the edge of network (close to Internet Things (IoT) devices). provide services in lieu cloud. Thus, improving performance and making it attractive social media-based systems. Security issues one most challenges encountered FC. In this paper, we propose an anomaly-based Intrusion Detection Prevention System (IDPS) against Man-in-the-Middle (MITM) attack layer. The system uses special (IDS) detect intrusion network. They periodically monitor behavior Any deviation from normal activity categorized malicious, suspected node isolated. Exponentially Weighted Moving Average (EWMA) added smooth out noise that typically found media communications. Our results (with 95% confidence) show accuracy proposed increases 80% after EWMA added. Also, with EWMA, can 0.25–0.5 s seconds faster than without EWMA. However, affects latency provided by least 0.75–1.3 s. Finally, has not increased energy overhead system, due its lightweight.
منابع مشابه
Security Challenges in Fog Computing in Healthcare
Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...
متن کاملDevelopment of a Model for Predicting Heart Attack Based on Fog Computing
Introduction: Various studies have demonstrated the benefits of using distributed fog computing for the Internet of Things (IoT). Fog computing has brought cloud computing capabilities such as computing, storage, and processing closer to IoT nodes. The new model of fog and edge computing, compared to cloud computing, provides less latency for data processing by bringing resources closer to user...
متن کاملDevelopment of a Model for Predicting Heart Attack Based on Fog Computing
Introduction: Various studies have demonstrated the benefits of using distributed fog computing for the Internet of Things (IoT). Fog computing has brought cloud computing capabilities such as computing, storage, and processing closer to IoT nodes. The new model of fog and edge computing, compared to cloud computing, provides less latency for data processing by bringing resources closer to user...
متن کاملA Mechanism for Detecting and Identifying DoS attack in VANET
VANET (Vehicular Ad-hoc Network) which is a hy- brid network (combination of infrastructure and infra- structure-less networks) is an emergent technology with promising future as well as great challenges especially in security. By the other hand this type of network is very sensible to safety problem. This paper focuses on a new mechanism for DoS (denial of service) attacks on the physical and ...
متن کاملthe tragedy of modern man in arthur millers world
what miller wants is a theatre of heightened consciousness. he speaks of two passions in a man, the passion to "feel" and the passion "know". he belives that we can have more of the latter. he says: drama is akin to the other inventions of man in that it ought to help us know more and not merely to spend our feelings. the writing of the crucible shows us that he is trying to give more heightene...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers, materials & continua
سال: 2021
ISSN: ['1546-2218', '1546-2226']
DOI: https://doi.org/10.32604/cmc.2021.016938