Dynamic Adaptation Attack Detection Model for a Distributed Multi-Access Edge Computing Smart City
نویسندگان
چکیده
The internet of things (IoT) technology presents an intelligent way to improve our lives and contributes many fields such as industry, communications, agriculture, etc. Unfortunately, IoT networks are exposed attacks that may destroy the entire network consume resources. This paper aims propose process automation auto-configured detection model (IADM) detect prevent malicious traffic behaviors/events at distributed multi-access edge computing in IoT-based smart city. proposed consists two phases. first phase relies on (IPA) technique contains five modules named, specifically, dataset collection pre-processing module, analysis rules action database module. In phase, each module composes connecting give feedback reports about send information next modules. Therefore, any change can be easily detected labeled intrusion. connection (ICM) reduce search time, increase speed, security level. second is dynamic adaptation attack based reinforcement one-shot learning. a multi-classification using Random Forest Trees (RFT), k-Nearest Neighbor (K-NN), J48, AdaBoost, Bagging. learn new changed behaviors reinforced learning zero-day events cities. experiments implemented UNSW-NB 15 dataset. achieves high accuracy rates RFT, K-NN, AdaBoost approximately 98.8%. It noted rate J48 classifier 85.51%, which lower than others. Subsequently, Bagging 98.9% 91.41%, respectively. Additionally, error very low. Similarly, precision, recall, F1-measure depends creating auto-adaptive through small number instances conserve memory device network. false reporting by intrusion system (IDS). devices quickly easily. IADM performance for IDS maintaining consumption, time speed process.
منابع مشابه
A context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کاملReliable Distributed Authentication in Multi-Access Mobile Edge Computing
The fifth generation (5G) mobile telecommunication network is expected to support multi-access mobile edge computing (MEC), which intends to distribute computation tasks and services from the central cloud to the edge clouds. Towards ultraresponsive, ultra-reliable and ultra-low-latency MEC services, the current mobile network security architecture should enable more decentralized approach for ...
متن کاملDistributed Dynamic Processing for Edge Detection
This paper discusses a dynamic method of edge detection which works from a sequence of frames. Most edge detection algorithms process image information statically, regardless of whether the application is static i.e. whether the input is a singular, unique image or a dynamic sequence of frames used for tracking or optic flow extraction. As many applications are dynamic, such as robotics, autono...
متن کاملAttack Classification Schema for Smart City WSNs
Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information s...
متن کاملDevelopment of a Model for Predicting Heart Attack Based on Fog Computing
Introduction: Various studies have demonstrated the benefits of using distributed fog computing for the Internet of Things (IoT). Fog computing has brought cloud computing capabilities such as computing, storage, and processing closer to IoT nodes. The new model of fog and edge computing, compared to cloud computing, provides less latency for data processing by bringing resources closer to user...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Sensors
سال: 2023
ISSN: ['1424-8220']
DOI: https://doi.org/10.3390/s23167135