A Fuzzy-Based Approach to Enhance Cyber Defence Security for Next-Generation IoT

被引:7
|
作者
Makkar, Aaisha [1 ]
Ghosh, Uttam [2 ]
Sharma, Pradip Kumar [3 ]
Javed, Amir [4 ]
机构
[1] Chandigarh Univ, Comp Sci & Engn Dept, Ajitgarh 140413, India
[2] Vanderbilt Univ, Dept EECS, Nashville, TN 37240 USA
[3] Univ Aberdeen, Dept Comp Sci, Aberdeen AB24 3FX, Scotland
[4] Cardiff Univ, Sch Comp Sci & Informat, Cardiff CF10 3AT, Wales
基金
英国工程与自然科学研究理事会;
关键词
Machine learning; Internet of Things; Web pages; Cognition; Search engines; Unsolicited e-mail; Computational modeling; Cognitive; ensemble; fuzzy; Web spam; MANAGEMENT;
D O I
10.1109/JIOT.2021.3053326
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the modern era, the Cognitive Internet of Things (CIoT) in conjunction with IoT evolves which provides the intelligence power of sensing and computation for next-generation IoT (Nx-IoT) networks. The data scientists have discovered a large amount of techniques for knowledge discovery from processed data in CIoT. This task is accomplished successfully and data proceeds for further processing. The major cause for the failure of IoT devices is due to the attacks, in which Web spam is more prominent. There seems a requirement of a technique which can detect the Web spam before it enters into a device. Motivated from these issues, in this article, a cognitive spammer framework (CSF) for Web spam detection is proposed. CSF detects the Web spam by fuzzy rule-based classifiers along with machine learning classifiers. Each classifier produces the quality score of the webpage. These quality scores are then ensembled to generate a single score, which predicts the spamicity of the webpage. For ensembling, the fuzzy voting approach is used in CSF. The experiments were performed using a standard data set WEBSPAM-UK 2007 with respect to accuracy and overhead generated. From the results obtained, it has been demonstrated that CSF improves the accuracy by 97.3%, which is comparatively high in comparison to the other existing approaches in the literature.
引用
收藏
页码:2079 / 2086
页数:8
相关论文
共 50 条
  • [1] AI as the bedrock for next-generation cyber security solutions
    Sood A.K.
    Nagal A.
    Network Security, 2024, 2024 (01)
  • [2] Proactive Antifragility: A New Paradigm for Next-Generation Cyber Defence at the Edge
    Uzunov, Anton, V
    Nepal, Surya
    Chhetri, Mohan Baruwal
    2019 IEEE 5TH INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC 2019), 2019, : 246 - 255
  • [3] Enabling Next-Generation Cyber Ranges with Mobile Security Components
    Russo, Enrico
    Verderame, Luca
    Merlo, Alessio
    TESTING SOFTWARE AND SYSTEMS, ICTSS 2020, 2020, 12543 : 150 - 165
  • [4] Threat Hunting as Cyber Security Baseline in the Next-Generation Security Operations Center
    Bikov, Tsviatko
    Radev, Dimitar
    Iliev, Teodor
    Stankovski, Dragan
    2021 29TH TELECOMMUNICATIONS FORUM (TELFOR), 2021,
  • [5] Low-cost Security for Next-generation IoT Networks
    Anagnostopoulos, Nikolaos Athanasios
    Ahmad, Saad
    Arul, Tolga
    Steinmetzer, Daniel
    Hollick, Matthias
    Katzenbeisser, Stefan
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2020, 20 (03)
  • [6] Next-generation - Cyber forensics
    Panda, B
    Giordano, JV
    Kalil, D
    COMMUNICATIONS OF THE ACM, 2006, 49 (02) : 44 - 47
  • [7] Cyber4Drone: A Systematic Review of Cyber Security and Forensics in Next-Generation Drones
    Sihag, Vikas
    Choudhary, Gaurav
    Choudhary, Pankaj
    Dragoni, Nicola
    DRONES, 2023, 7 (07)
  • [8] Teaching Next-Generation Cyber Warfare
    Chen, Jim Q.
    PROCEEDINGS OF THE 23RD EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY, ECCWS 2024, 2024, 23 : 125 - 132
  • [9] A fuzzy-based approach for generation system reliability evaluation
    Narasimhan, S
    Asgarpoor, S
    ELECTRIC POWER SYSTEMS RESEARCH, 2000, 53 (02) : 133 - 138
  • [10] A Blockchain-Based Deep Learning Approach for Cyber Security in Next Generation Industrial Cyber-Physical Systems
    Rathore, Shailendra
    Park, Jong Hyuk
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (08) : 5522 - 5532