Research Article
A Deep Intelligent Attack Detection Framework for Fog-Based IoT Systems
| SI. no. | Notation | Description |
| i | | Cloud server | ii | | Network gateway | iii | | Base-station | iv | | Set of fog nodes | v | | fog node | vi | | Compute module of fog node | vii | | Fog node’s memory module | viii | | IoT device | ix | | Perpetrator/attacker | x | | Established group of IoT devices | xi | | Group of behavior instances | xii | | Behavior instance | xiii | | Time instance | xiv | | Accuracy | xv | | Dataset for training and testing | xvi | | Train data | xvii | | Test data | xviii | | Time of total service | xix | | Final Behavior’s label | xx | | Communication behavior detection time | xxi | | Time to refurbish/update FN | xxii | | Accuracy |
|
|