User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
 ASOS INDEKS
 Views 21
Design of Cognitive Fog Computing for Autonomic Security System in Critical Infrastructure
2018
Journal:  
Journal of Universal Computer Science
Author:  
Abstract:

The rapid growth of Internet of Things(IoT) has reached all the facets of life including critical infrastructures. It has become the foundation for most of the critical infrastructures. The increased connectivity and the heterogeneity in IoT have widened the attack surface of critical infrastructures for attackers to exploit. Certain cyberattacks in critical infrastructures can lead to catastrophe and hence the attack has to be identified as early as possible to stop or reduce its impact by activating suitable responses. Therefore, the critical infrastructures require an intelligent security mechanism which can intelligently interpret the attacks from the IoT traffic and efficiently handle the attack scenario by activating appropriate response at faster rate. In this work, an autonomic security system with intelligent self-protect mechanism has been proposed for critical infrastructures. The autonomic security system can autonomously detect known attacks using Extreme Learning Machine, predict the unknown attacks using Gaussian process regression, and select suitable response for handling the attack using fuzzy logic. This intelligence of self-protect mechanism is incorporated in the distributed fog nodes to handle the attack scenario at faster rate and protect the critical infrastructures with minimal human intervention. The experimental analysis of the proposed autonomic security system proves to be efficient in detecting and defending the cyber-attacks with high accuracy and success rate. The results on network load and response time indicates the effectiveness of fog computing in proposed system.

Keywords:

Citation Owners
Information: There is no ciation to this publication.
Similar Articles










Journal of Universal Computer Science

Journal Type :   Uluslararası

Journal of Universal Computer Science