Research Article

A Deep Intelligent Attack Detection Framework for Fog-Based IoT Systems

Algorithm 2

Algorithm for DLM installation and network setup.
Input:,
Output: Outcome
(1)for to do
(2)  ;   ⊳ DL model is deployed at all is the node of the fog layer.
(3)end for
(4)                 ⊳ NW : Network
(5){
(6)for to do   ⊳ the NW is prepared for operation in real-time.
(7)  if assistance needed then
(8)   ;
(9)   ;         ⊳ is the nearest FN
(10)   ;       ⊳ establishment of a connection
(11)    operates ;
(12)    stores ;   ⊳ FN stores the communication behaviour of IoT device.
(13)   ;        ⊳ sends outcome to IoT device.
(14)   ;
(15)  end if
(16)end for
(17)}