Research Article
DI-ADS: A Deep Intelligent Distributed Denial of Service Attack Detection Scheme for Fog-Based IoT Applications
Algorithm 2
Algorithm for DLM model deployment at fog layer and network initialization.
| Input: , | | Output: Result | (1) | for to do | (2) | ; DLM is installed at each of the fog layer, where here is the number of fog nodes. | (3) | end for | (4) | | (5) | { | (6) | for to do The network is now ready for real time processing. | (7) | if service needed then | (8) | ; | (9) | ; in proximity | (10) | ; | (11) | process ; | (12) | records the ; Fog node records the behavior of iot device. | (13) | ; Sends result to IoT device. | (14) | ; | (15) | end if | (16) | end for | (17) | } |
|