Please use this identifier to cite or link to this item:
https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/15642
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Paul, P Mano | - |
dc.contributor.author | Shekhar, R | - |
dc.contributor.author | Jingle, I Diana Jeba | - |
dc.contributor.author | Jingle, I Berin Jeba | - |
dc.date.accessioned | 2024-05-29T08:51:26Z | - |
dc.date.available | 2024-05-29T08:51:26Z | - |
dc.date.issued | 2024 | - |
dc.identifier.citation | Vol. 898; pp. 173-181 | en_US |
dc.identifier.isbn | 9789819997060 | - |
dc.identifier.issn | 2367-3370 | - |
dc.identifier.uri | http://dx.doi.org/10.1007/978-981-99-9707-7_16 | - |
dc.identifier.uri | http://gnanaganga.inflibnet.ac.in:8080/jspui/handle/123456789/15642 | - |
dc.description.abstract | Cloud services in fog network is a platform that inherits software services to a network to handle cloud-specific problems. A significant component of the security paradigm that supports service quality is represented by intrusion detection systems (IDSs). This work develops an optimization environment to mitigate intrusion using RSLO classifier on a cloud-based fog networks. Here, a three-layer approach namely the cloud, end point, and fog layers is used as a trio to carry out all of the processing. In the cloud layer, three layers of processing are required for handling the dataset metrics which are data transformation metrics, feature selection metrics, and classification processes. With log transformation, data is transformed using KS correlation-based filter which is used to choose a feature. The classification using an ensemble methodology of RideNN classifiers which is a Rider Sea Lion Optimization (RSLO), a created classifier, is used to tune the ensemble classifier. Physical work is carried out at another layer called an end point layer. A trained ensemble classifier is used for intrusion detection in the fog layer. A greater precision, recall, and F-measure were obtained with an accuracy approximately 95%, with all benefits of the suggested RSLO-based ensemble strategy. © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Lecture Notes in Networks and Systems | en_US |
dc.publisher | Springer Science and Business Media Deutschland GmbH | en_US |
dc.subject | Cloud Computing | en_US |
dc.subject | Ensemble Classifier | en_US |
dc.subject | Fog Computing | en_US |
dc.subject | Intrusion | en_US |
dc.title | Prevention and Mitigation of Intrusion Using an Efficient Ensemble Classification in Fog Computing | en_US |
dc.type | Article | en_US |
Appears in Collections: | Conference Papers |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.