本文基于以边缘为中心的认知物联网,提出了一种基于边缘计算的FP-growth算法检测方案抵御共谋的SSDF攻击。该方法可以利用BIRCH算法的英语翻译

本文基于以边缘为中心的认知物联网,提出了一种基于边缘计算的FP-gro

本文基于以边缘为中心的认知物联网,提出了一种基于边缘计算的FP-growth算法检测方案抵御共谋的SSDF攻击。该方法可以利用BIRCH算法将所有物联网设备划分成若干个子集群,在S-FC执行FP-growth算法识别出C-MIDs并过滤其感知报告,最终只将NIDs的感知数据发送到FC进行数据融合。我们提出将识别C-MIDs的FP-growth算法放到S-FC执行,可以有效减轻FC处理大量感知数据的压力,加快算法的运行速度。在仿真实验中我们研究了三种不同共谋攻击下随MIDs的比例增加检测率、虚警率和误检率变化的性能参数,所提出的方案与传统方法相比均可以获得更好的性能。此外,FP-growth算法可以减少扫描数据集的次数,仿真结果表明该算法与关联规则挖掘算法相比运行效率大大提升,适合作为边缘层设备的检测算法。未来,将进一步研究认知物联网中存在的安全问题,防御认知物联网中的SSDF攻击。
0/5000
源语言: -
目标语言: -
结果 (英语) 1: [复制]
复制成功!
Based on the edge-centric cognitive Internet of Things, this paper proposes an edge computing-based FP-growth algorithm detection scheme to resist collusion SSDF attacks. This method can use the BIRCH algorithm to divide all IoT devices into several sub-clusters, execute the FP-growth algorithm in S-FC to identify C-MIDs and filter their perception reports, and finally only send the perception data of NIDs to FC for data fusion . We propose to put the FP-growth algorithm that recognizes C-MIDs into S-FC for execution, which can effectively reduce the pressure of FC to process a large amount of sensing data and speed up the operation of the algorithm. In the simulation experiment, we studied the performance parameters of the detection rate, false alarm rate and false detection rate as the proportion of MIDs increases under three different collusion attacks. The proposed scheme can achieve better performance compared with traditional methods. . In addition, the FP-growth algorithm can reduce the number of scans of the data set. The simulation results show that the algorithm has greatly improved operating efficiency compared with the association rule mining algorithm, and it is suitable as a detection algorithm for edge-level devices. In the future, we will further study the security issues in the cognitive Internet of Things to defend against SSDF attacks in the cognitive Internet of Things.
正在翻译中..
结果 (英语) 2:[复制]
复制成功!
Based on the edge centered cognitive Internet of things, this paper proposes a FP growth algorithm detection scheme based on edge computing to resist collusive SSDF attacks. This method can use birch algorithm to divide all IOT devices into several sub clusters, execute FP growth algorithm in s-fc to identify c-mids and filter its perception report, and finally only send the perception data of NIDS to FC for data fusion. We propose to put the FP growth algorithm for identifying c-mids into s-fc for execution, which can effectively reduce the pressure of FC processing a large number of perceptual data and speed up the running speed of the algorithm. In the simulation experiment, we study the performance parameters of detection rate, false alarm rate and false detection rate with the increase of the proportion of mids under three different collusion attacks. Compared with the traditional methods, the proposed scheme can obtain better performance. In addition, FP growth algorithm can reduce the number of scanning data sets. The simulation results show that the operation efficiency of FP growth algorithm is greatly improved compared with association rule mining algorithm, and it is suitable for edge layer equipment detection algorithm. In the future, we will further study the security problems in the cognitive Internet of things and defend against SSDF attacks in the cognitive Internet of things.
正在翻译中..
结果 (英语) 3:[复制]
复制成功!
Based on the edge-centered cognitive Internet of Things, this paper proposes a FP-growth algorithm detection scheme based on edge computing to resist the collusion SSDF attack. This method can use BIRCH algorithm to divide all IoT devices into several sub-clusters, execute FP-growth algorithm in S-FC to identify C-MIDs and filter its perception report, and finally only send the perception data of NIDs to FC for data fusion. We propose to put FP-growth algorithm for identifying C-MIDs into S-FC for execution, which can effectively reduce the pressure of FC to process a large number of perceived data and speed up the algorithm. In the simulation experiment, we study the performance parameters of three different collusion attacks, which change with the increase of the ratio of MIDs, false alarm rate and false detection rate. Compared with the traditional methods, the proposed schemes can achieve better performance. In addition, FP-growth algorithm can reduce the number of scanning data sets, and the simulation results show that compared with association rule mining algorithm, FP-growth algorithm can greatly improve the running efficiency, which is suitable for the detection algorithm of edge layer devices. In the future, we will further study the security problems in cognitive Internet of Things and defend against SSDF attacks in cognitive Internet of Things.
正在翻译中..
 
其它语言
本翻译工具支持: 世界语, 丹麦语, 乌克兰语, 乌兹别克语, 乌尔都语, 亚美尼亚语, 伊博语, 俄语, 保加利亚语, 信德语, 修纳语, 僧伽罗语, 克林贡语, 克罗地亚语, 冰岛语, 加利西亚语, 加泰罗尼亚语, 匈牙利语, 南非祖鲁语, 南非科萨语, 卡纳达语, 卢旺达语, 卢森堡语, 印地语, 印尼巽他语, 印尼爪哇语, 印尼语, 古吉拉特语, 吉尔吉斯语, 哈萨克语, 土库曼语, 土耳其语, 塔吉克语, 塞尔维亚语, 塞索托语, 夏威夷语, 奥利亚语, 威尔士语, 孟加拉语, 宿务语, 尼泊尔语, 巴斯克语, 布尔语(南非荷兰语), 希伯来语, 希腊语, 库尔德语, 弗里西语, 德语, 意大利语, 意第绪语, 拉丁语, 拉脱维亚语, 挪威语, 捷克语, 斯洛伐克语, 斯洛文尼亚语, 斯瓦希里语, 旁遮普语, 日语, 普什图语, 格鲁吉亚语, 毛利语, 法语, 波兰语, 波斯尼亚语, 波斯语, 泰卢固语, 泰米尔语, 泰语, 海地克里奥尔语, 爱尔兰语, 爱沙尼亚语, 瑞典语, 白俄罗斯语, 科西嘉语, 立陶宛语, 简体中文, 索马里语, 繁体中文, 约鲁巴语, 维吾尔语, 缅甸语, 罗马尼亚语, 老挝语, 自动识别, 芬兰语, 苏格兰盖尔语, 苗语, 英语, 荷兰语, 菲律宾语, 萨摩亚语, 葡萄牙语, 蒙古语, 西班牙语, 豪萨语, 越南语, 阿塞拜疆语, 阿姆哈拉语, 阿尔巴尼亚语, 阿拉伯语, 鞑靼语, 韩语, 马其顿语, 马尔加什语, 马拉地语, 马拉雅拉姆语, 马来语, 马耳他语, 高棉语, 齐切瓦语, 等语言的翻译.

Copyright ©2024 I Love Translation. All reserved.

E-mail: