Please use this identifier to cite or link to this item:
http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/16275
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Dua, Amit | - |
dc.contributor.author | Gupta, Shashank | - |
dc.date.accessioned | 2024-10-29T09:22:17Z | - |
dc.date.available | 2024-10-29T09:22:17Z | - |
dc.date.issued | 2020 | - |
dc.identifier.uri | https://ieeexplore.ieee.org/abstract/document/9145195 | - |
dc.identifier.uri | http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/16275 | - |
dc.description.abstract | Fog computing generally uses the host's resources instead of acquiring resources from remote PC leading to less latency problems and moreover, improving the performance which makes it more competent. Distributed denials of service (DDOS) attack exhausts the existing resources which make the services inaccessible to genuine users. DDoS has deep impact on the computer networks. As a cyber-threat, it compromises the standard performance of the organization by Internet protocol (IP) spoofing, overflow of bandwidth, memory space consumption and leading to immense loss. DoS attacks are a great threat to computerized association. Primary objective of any defense system for DoS is knowledge that it exists, preferably as early prior to accumulation of attack traffic. In case of large traffic inflow to an attacked server, it is essential to categorize the legitimate acquisitions and intrusions. In this work, the authors present a model that draws out the key parameters from requests in traffic for DDoS attack recognition in fog network. It benefits from existing data, and presents competent algorithms to detect and predict most probable cases. Authors have used Bayesian Network to calculate the conditional probabilities to decide whether the new packet is normal or intruded. A log of the path of the attacker is maintained in a VHD so as to easily detect attacks that have previously occurred. Having both the systems in place, the false positives of DDoS attacks detection have decreased immensely which has been observed through the implementation of this experiment. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Bayesian Networks (BN) | en_US |
dc.subject | Virtual Honeypot Devices | en_US |
dc.subject | Fog Computing | en_US |
dc.subject | Markov model | en_US |
dc.title | Detecting Different Attack Instances of DDoS Vulnerabilities on Edge Network of Fog Computing using Gaussian Naive Bayesian Classifier | en_US |
dc.type | Article | en_US |
Appears in Collections: | Department of Computer Science and Information Systems |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.