Abstract
A novel platform of dispersed streaming is developed by the fog paradigm for the applications associated with the internet of things. The sensed information's of the IOT plat form is collected from the edge device closer to the user from the lower plane and moved to the fog in the middle of the cloud and edge and then further pushed to the cloud at the top most plane. The information's gathered at the lower plane often holds unanticipated values that are of no use in the application. These unanticipated or the unexpected data's are termed as anomalies. These unexpected data's could emerge either due to the improper edge device functioning which is usually the mobile devices, sensors or the actuators or the coincidences or purposeful attacks or due to environmental changes. The anomalies are supposed to be removed to retain the efficiency of the network and the application. The deep learning frame work developed in the paper involves the hardware techniques to detect the anomalies in the fog paradigm. The experimental analysis showed that the deep learning models are highly grander compared to the rest of the basic detection structures on the terms of the accuracy in detecting, false-alarm and elasticity.
References
Diro, Abebe Abeshu, Naveen Chilamkurti, and Neeraj Kumar. "Lightweight cybersecurity schemes using elliptic curve cryptography in publish-subscribe fog computing." Mobile Networks and Applications 22, no. 5 (2017): 848-858.
Virushabadoss, S., and C. Bhuvaneswari. "Analysis of behavior profiling algorithm to detect usage anomalies in fog computing." In One Day National Conference On Internet Of Things-The Current Trend In Connected World. 2018.
Lyu, Lingjuan, Jiong Jin, Sutharshan Rajasegarar, Xuanli He, and Marimuthu Palaniswami. "Fog-empowered anomaly detection in IoT using hyperellipsoidal clustering." IEEE Internet of Things Journal 4, no. 5 (2017): 1174-1184.
Jyothirmai, P., and Jennifer S. Raj. "Secure interoperable architecture construction for overlay networks." In 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), pp. 1-6. IEEE, 2015.
Praveena, A., and S. Smys. "Anonymization in social networks: a survey on the issues of data privacy in social network sites." Journal of International Journal Of Engineering And Computer Science 5, no. 3 (2016): 15912-15918.
Raj, Jennifer S., S. Smys, G. Josemin Bala, B. Praba, R. Sujath, V. Hilda Christy Gnanam, M. Abdul Rahiman et al. "Editorial Board v-vi A Novel Classification via Clustering Method for
Anomaly Based Network Intrusion Detection System 1-6 Mrutyunjaya Panda and Manas Ranjan Patra Performance Improvement in MANETs: A Cross Layer Approach via TCP 7-11."
Kumar, T. Senthil. "Efficient resource allocation and QOS enhancements of IoT with FOG network." J ISMAC 1 (2019): 101-110.
Karthiban, K., and S. Smys. "Privacy preserving approaches in cloud computing." In 2018 2nd International Conference on Inventive Systems and Control (ICISC), pp. 462-467. IEEE, 2018.
Anguraj, Dinesh Kumar, and S. Smys. "Trust-based intrusion detection and clustering approach for wireless body area networks." Wireless Personal Communications 104, no. 1 (2019): 1-20.
Praveena, A., and S. Smys. "Efficient cryptographic approach for data security in wireless sensor networks using MES VU." In 2016 10th international conference on intelligent systems and control (ISCO), pp. 1-6. IEEE, 2016.
Praveena, A., and S. Smys. "Prevention of inference attacks for private information in social networking sites." In 2017 International Conference on Inventive Systems and Control (ICISC), pp. 1-7. IEEE, 2017.
. Smys, S. "DDOS ATTACK DETECTION IN TELECOMMUNICATION NETWORK USING MACHINE LEARNING." Journal of Ubiquitous Computing and Communication Technologies (UCCT) 1, no. 01 (2019): 33-44.
Bestak, Robert, and S. Smys. "BIG DATA ANALYTICS FOR SMART CLOUD-FOG BASED APPLICATIONS." Journal of trends in Computer Science and Smart technology (TCSST) 1, no. 02 (2019): 74-83.
Sivaganesan, D. "DESIGN AND DEVELOPMENT AI-ENABLED EDGE COMPUTING FOR INTELLIGENT-IOT APPLICATIONS." Journal of trends in Computer Science and Smart technology (TCSST) 1, no. 02 (2019): 84-94.
Bashar, Abul. "SURVEY ON EVOLVING DEEP LEARNING NEURAL NETWORK ARCHITECTURES." Journal of Artificial Intelligence 1, no. 02 (2019): 73-82.
Ananthi, J. Vijitha, and Jennifer S. Raj. "A Peer to Peer Overlay Approach for Topology Maintenance in Wireless Networks."
