Intrusion Detection System Based on Decision Tree over Big Data in Fog Environment

Fog computing, as the supplement of cloud computing, can provide low-latency services between mobile users and the cloud. However, fog devices may encounter security challenges as a result of the fog nodes being close to the end users and having limited computing ability. Traditional network attacks...

Full description

Bibliographic Details
Main Authors: Kai Peng, Victor C. M. Leung, Lixin Zheng, Shangguang Wang, Chao Huang, Tao Lin
Format: Article
Language:English
Published: Hindawi-Wiley 2018-01-01
Series:Wireless Communications and Mobile Computing
Online Access:http://dx.doi.org/10.1155/2018/4680867