Intelligent Fog Computing Surveillance System for Crime and Vulnerability Identification and Tracing

Intelligent Fog Computing Surveillance System for Crime and Vulnerability Identification and Tracing

Romil Rawat, Rajesh Kumar Chakrawarti, Piyush Vyas, José Luis Arias Gonzáles, Ranjana Sikarwar, Ramakant Bhardwaj
Copyright: © 2023 |Pages: 25
DOI: 10.4018/IJISP.317371
Article PDF Download
Open access articles are freely available for download

Abstract

IoT devices generate enormous amounts of data, which deep learning algorithms can learn from more effectively than shallow learning algorithms. The approach for threat detection may ultimately benefit fog computing or fog networking (fogging). The authors present a cutting-edge distributed DL method for detecting cyberattacks and vulnerability injection (CAVID) in this paper. In terms of the evaluation metrics tested in the tests, the DL model performs better than the SL models. They demonstrated a distributed DL-driven fog computing CAVID approach using the open-source NSL-KDD dataset. A pre-trained SAE was utilised for feature engineering, whereas Softmax was employed for categorization. They used parametric evaluation for system assessment to evaluate the model in comparison to SL techniques. For scalability, accuracy across several worker nodes was taken into consideration. In addition to the robustness, effectiveness, and optimization of distributed parallel learning among fog nodes for enhancing accuracy, the findings demonstrate DL models exceeding classic ML architectures.
Article Preview
Top

1. Introduction

DL is an approach to categorising things that mimics the capacity of the neurons to learn from expertise and may input raw details through a DNN hierarchy to categorise items by which it is knowledgeable or is taught (Ahmad & Shah, 2022). The human brain has the power to analyse unprocessed neural signals to acquire complicated high-level traits on its own, employing precise and speedier processing outcomes. It is effective for application in a diversity of fields (DIP and Computer Vision), attributable to training stability, generalisation, and adaptability for huge data sets. The improvements in software and hardware that facilitated the introduction of DL and concentrated on BD classifications for traffic analysis (Saranyadevi et. al.,2021) point to its potential usage in cyber security domains like CAVID. Criminal behaviour (moving around with weapons consistently) can be identified in the similar procedure by images and acknowledged by minute updates in pixels. These images contain higher than 99% emerging risks that are mutants of established attacks, demonstrating DL's capacity to recognise such small changes in attack patterns (Nguyen et al.,2021). Unknown dangers and frequent flaws in system design and development may be dealt with using the endurance of DL.

CAVID is an intelligent security architecture based on ML algorithms that have been used to predict cybersecurity attacks in FC. The model detects and analyses vulnerabilities and suspicious behaviours in the FC network.

The ML (Xu, Zhou, Sekula, & Ding, 2021) is divided into two parts: (1) SL and (2) DL, based on its evolutionary timeline. The majority of ML models introduced before 2006, such as SNN with just one hidden layer of nodes, are referred to as SL (Sufyan & Banerjee, 2021). A subclass of machine learning known as “deep learning” uses NN with several hidden layers. In contrast to SL-based applications, DL models require a substantial amount of training data. Additionally, the topology of the network significantly affects how well DL models function (Xu et al., 2021). (Sufyan & Banerjee, 2021). Many SL approaches, like DT, KNN, and SNN, have been in use for a very long time (Ahmad & Shah, 2022)(Saranyadevi et al., 2021). DL algorithms include the CNN, LSTM, RNN, GAN, RBFN, and MLP, for instance. The Figure 1 shows about the representation fog communications Architectural paradigm.

Figure 1.

Architectural paradigm for fog communications

IJISP.317371.f01

The FC environment, which supports IoT applications, makes use of DL's distinctive architectural characteristics in terms of cyber security. A plethora of CAVIDs have been produced as a result of the rise in the amount and disparity of smart devices that can detect, process, and communicate (Nguyen et al., 2021). For these things, which are typically referred to as IoT, FGNs offer communication and resource administration. With the adoption of security services and the offloading of simulations, communications, and storage to the cloud and resource-constrained IoT devices, this new and evolving architecture necessitates the development of fundamentally new distributed CAVID architecture and services that are robust and adaptable, as well as closer to the data sources.

As a result, it makes sense to conduct research on CAVID in the expanding field of F2T computing by utilising a distinctive attributes of DL technique. Our research focuses on the perusal of the DL technique for increased CAVID, with the main contribution of this article.

Complete Article List

Search this Journal:
Reset
Volume 18: 1 Issue (2024)
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing