A deep and systematic review of the intrusion detection systems in the fog environment

Loading...
Thumbnail Image

Date

Journal Title

Journal ISSN

Volume Title

Publisher

Wiley

Access Rights

info:eu-repo/semantics/closedAccess

Abstract

Fog computing has arisen to complement cloud computing, offering a cost-effective architecture to power the Internet of things. Fog computing is a network computing and service paradigm that expands cloud computing and services to the network's edge to solve the cloud's fundamental shortcomings, like a lack of location awareness, mobility, and latency. Besides, fog devices may have security issues because fog nodes are near end-users and have limited computational power. As the linked devices in the Internet of things grow exponentially, so does the potential for cyber-attack. Intrusion detection systems have been developed as a feasible tool for detecting and preventing harmful activity in this vein. This work used a systematic literature review to examine intrusion detection system approaches in a fog environment. By categorizing intrusion detection systems in the literature, we produce a review. An intrusion detection system's characteristic is early identification of an attack and the decrease of false alarms as a result. Some of the issues that these systems' designers will face are also discussed. Recall rate, detection rates, detection delay, and detection precision were the parameters that received the most attention. This report will serve as a roadmap for future network intrusion detection studies in fog computing.

Description

Keywords

Objective Deployment Optimization, Resource-Allocation, Internet, Interference, Networks, Smart, Sdn

Journal or Series

Transactions on Emerging Telecommunications Technologies

WoS Q Value

Scopus Q Value

Volume

34

Issue

1

Citation

Endorsement

Review

Supplemented By

Referenced By