Abstract

AbstractFog computing has arisen to complement cloud computing, offering a cost‐effective architecture to power the Internet of things. Fog computing is a network computing and service paradigm that expands cloud computing and services to the network's edge to solve the cloud's fundamental shortcomings, like a lack of location awareness, mobility, and latency. Besides, fog devices may have security issues because fog nodes are near end‐users and have limited computational power. As the linked devices in the Internet of things grow exponentially, so does the potential for cyber‐attack. Intrusion detection systems have been developed as a feasible tool for detecting and preventing harmful activity in this vein. This work used a systematic literature review to examine intrusion detection system approaches in a fog environment. By categorizing intrusion detection systems in the literature, we produce a review. An intrusion detection system's characteristic is early identification of an attack and the decrease of false alarms as a result. Some of the issues that these systems' designers will face are also discussed. Recall rate, detection rates, detection delay, and detection precision were the parameters that received the most attention. This report will serve as a roadmap for future network intrusion detection studies in fog computing.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call