Detecting Man-in-the-Middle Attack in Fog Computing for Social Media

نویسندگان

چکیده

Fog computing (FC) is a networking paradigm where wireless devices known as fog nodes are placed at the edge of network (close to Internet Things (IoT) devices). provide services in lieu cloud. Thus, improving performance and making it attractive social media-based systems. Security issues one most challenges encountered FC. In this paper, we propose an anomaly-based Intrusion Detection Prevention System (IDPS) against Man-in-the-Middle (MITM) attack layer. The system uses special (IDS) detect intrusion network. They periodically monitor behavior Any deviation from normal activity categorized malicious, suspected node isolated. Exponentially Weighted Moving Average (EWMA) added smooth out noise that typically found media communications. Our results (with 95% confidence) show accuracy proposed increases 80% after EWMA added. Also, with EWMA, can 0.25–0.5 s seconds faster than without EWMA. However, affects latency provided by least 0.75–1.3 s. Finally, has not increased energy overhead system, due its lightweight.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Challenges in Fog Computing in Healthcare

Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...

متن کامل

Development of a Model for Predicting Heart Attack Based on Fog Computing

Introduction: Various studies have demonstrated the benefits of using distributed fog computing for the Internet of Things (IoT). Fog computing has brought cloud computing capabilities such as computing, storage, and processing closer to IoT nodes. The new model of fog and edge computing, compared to cloud computing, provides less latency for data processing by bringing resources closer to user...

متن کامل

Development of a Model for Predicting Heart Attack Based on Fog Computing

Introduction: Various studies have demonstrated the benefits of using distributed fog computing for the Internet of Things (IoT). Fog computing has brought cloud computing capabilities such as computing, storage, and processing closer to IoT nodes. The new model of fog and edge computing, compared to cloud computing, provides less latency for data processing by bringing resources closer to user...

متن کامل

A Mechanism for Detecting and Identifying DoS attack in VANET

VANET (Vehicular Ad-hoc Network) which is a hy- brid network (combination of infrastructure and infra- structure-less networks) is an emergent technology with promising future as well as great challenges especially in security. By the other hand this type of network is very sensible to safety problem. This paper focuses on a new mechanism for DoS (denial of service) attacks on the physical and ...

متن کامل

the tragedy of modern man in arthur millers world

what miller wants is a theatre of heightened consciousness. he speaks of two passions in a man, the passion to "feel" and the passion "know". he belives that we can have more of the latter. he says: drama is akin to the other inventions of man in that it ought to help us know more and not merely to spend our feelings. the writing of the crucible shows us that he is trying to give more heightene...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computers, materials & continua

سال: 2021

ISSN: ['1546-2218', '1546-2226']

DOI: https://doi.org/10.32604/cmc.2021.016938