[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Site Facilities::
Indexing::
Contact us::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
Print ISSN
Print ISSN: 2476-3047
..
:: Volume 11, Issue 1 (9-2022) ::
منادی 2022, 11(1): 83-93 Back to browse issues page
Inventing a Method to Save the Fog Node from Attacks
Seyed Omid Azarkasb * , Seyed Hossein Khasteh , Saeed Sedighian Kashi
Software Engineering Faculty, K.N. Toosi University of Technology, Tehran, Iran
Abstract:   (2056 Views)
Fog is a cloud that closes to the ground. The components of fog and cloud complement each other. These components provide mutually beneficial interdependent services for communication, processing, control, and storage across the network. Attacking the fog nodes are as important as attacking the cloud. Since the fog node has more limited resources, it is more targeted by intruders. In addition, fog nodes are more attractive to attackers because they have less computing power and are located closer to the attacker than the cloud. But the key point is that access to limited resources makes it easier to save the fog node because the fog does not have the complexities of the cloud, and it is easy to run an intrusion detection system on it. In this article, focusing on the resource limitation in the fog node, we will invent a method to save the fog node. In the proposed method, the support vector machines (SVMs) technique is used. Among the advantages of using the support vector machine, we can mention not being trapped in local optima, solving the over fitting problem, and ease of working with high-dimensional data. Based on the research, support vector machine is the most widely used machine learning method for Internet of Things security articles in the literature. In this article, in order to conduct tests, according to published global statistics, the most important category of web attacks, i.e. SQL injection attacks, is considered. The average detection accuracy is obtained and the results of the evaluations indicate the acceptable efficiency of the proposed method.
Keywords: fog computing, cloud computing, intrusion detection, SQL injection flaw attacks, support vector machines, internet of things
Full-Text [PDF 1428 kb]   (646 Downloads)    
Type of Study: Research Article | Subject: Special
Received: 2023/02/17 | Accepted: 2022/09/1 | Published: 2022/09/1
Send email to the article author

Add your comments about this article
Your username or Email:

CAPTCHA


XML   Persian Abstract   Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Azarkasb S O, Khasteh S H, Sedighian Kashi S. Inventing a Method to Save the Fog Node from Attacks. منادی 2022; 11 (1) :83-93
URL: http://monadi.isc.org.ir/article-1-224-en.html


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Volume 11, Issue 1 (9-2022) Back to browse issues page
دوفصل نامه علمی  منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.09 seconds with 39 queries by YEKTAWEB 4700