[go: up one dir, main page]

Reference Hub55
Intelligent Fog Computing Surveillance System for Crime and Vulnerability Identification and Tracing

Intelligent Fog Computing Surveillance System for Crime and Vulnerability Identification and Tracing

Romil Rawat, Rajesh Kumar Chakrawarti, Piyush Vyas, José Luis Arias Gonzáles, Ranjana Sikarwar, Ramakant Bhardwaj
Copyright: © 2023 |Volume: 17 |Issue: 1 |Pages: 25
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781668479131|DOI: 10.4018/IJISP.317371
Cite Article Cite Article

MLA

Rawat, Romil, et al. "Intelligent Fog Computing Surveillance System for Crime and Vulnerability Identification and Tracing." IJISP vol.17, no.1 2023: pp.1-25. http://doi.org/10.4018/IJISP.317371

APA

Rawat, R., Chakrawarti, R. K., Vyas, P., Gonzáles, J. L., Sikarwar, R., & Bhardwaj, R. (2023). Intelligent Fog Computing Surveillance System for Crime and Vulnerability Identification and Tracing. International Journal of Information Security and Privacy (IJISP), 17(1), 1-25. http://doi.org/10.4018/IJISP.317371

Chicago

Rawat, Romil, et al. "Intelligent Fog Computing Surveillance System for Crime and Vulnerability Identification and Tracing," International Journal of Information Security and Privacy (IJISP) 17, no.1: 1-25. http://doi.org/10.4018/IJISP.317371

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

IoT devices generate enormous amounts of data, which deep learning algorithms can learn from more effectively than shallow learning algorithms. The approach for threat detection may ultimately benefit fog computing or fog networking (fogging). The authors present a cutting-edge distributed DL method for detecting cyberattacks and vulnerability injection (CAVID) in this paper. In terms of the evaluation metrics tested in the tests, the DL model performs better than the SL models. They demonstrated a distributed DL-driven fog computing CAVID approach using the open-source NSL-KDD dataset. A pre-trained SAE was utilised for feature engineering, whereas Softmax was employed for categorization. They used parametric evaluation for system assessment to evaluate the model in comparison to SL techniques. For scalability, accuracy across several worker nodes was taken into consideration. In addition to the robustness, effectiveness, and optimization of distributed parallel learning among fog nodes for enhancing accuracy, the findings demonstrate DL models exceeding classic ML architectures.