Research Article

A Deep Intelligent Attack Detection Framework for Fog-Based IoT Systems

Algorithm 4

Behaviour update at cloud.
Input:of
Output: refurbish of IoT end device table at CN
(1)iteration()
(2){
(3) accepts of ;
(4); ⊳ refurbish cloud’s IoT device table with IoT device’s communication behavior.
(5)}