Research Article
A Deep Intelligent Attack Detection Framework for Fog-Based IoT Systems
Algorithm 2
Algorithm for DLM installation and network setup.
| Input:, | | Output: Outcome | (1) | for to do | (2) | ; ⊳ DL model is deployed at all is the node of the fog layer. | (3) | end for | (4) | ⊳ NW : Network | (5) | { | (6) | for to do ⊳ the NW is prepared for operation in real-time. | (7) | if assistance needed then | (8) | ; | (9) | ; ⊳ is the nearest FN | (10) | ; ⊳ establishment of a connection | (11) | operates ; | (12) | stores ; ⊳ FN stores the communication behaviour of IoT device. | (13) | ; ⊳ sends outcome to IoT device. | (14) | ; | (15) | end if | (16) | end for | (17) | } |
|