{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T06:12:25Z","timestamp":1774678345041,"version":"3.50.1"},"reference-count":28,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2018,1,14]],"date-time":"2018-01-14T00:00:00Z","timestamp":1515888000000},"content-version":"vor","delay-in-days":13,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1559696"],"award-info":[{"award-number":["CNS-1559696"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIA-1301726"],"award-info":[{"award-number":["IIA-1301726"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2018,1]]},"abstract":"<jats:p>Fog computing, as a new paradigm, has many characteristics that are different from cloud computing. Due to the resources being limited, fog nodes\/MEC hosts are vulnerable to cyberattacks. Lightweight intrusion detection system (IDS) is a key technique to solve the problem. Because extreme learning machine (ELM) has the characteristics of fast training speed and good generalization ability, we present a new lightweight IDS called sample selected extreme learning machine (SS\u2010ELM). The reason why we propose \u201csample selected extreme learning machine\u201d is that fog nodes\/MEC hosts do not have the ability to store extremely large amounts of training data sets. Accordingly, they are stored, computed, and sampled by the cloud servers. Then, the selected sample is given to the fog nodes\/MEC hosts for training. This design can bring down the training time and increase the detection accuracy. Experimental simulation verifies that SS\u2010ELM performs well in intrusion detection in terms of accuracy, training time, and the receiver operating characteristic (ROC) value.<\/jats:p>","DOI":"10.1155\/2018\/7472095","type":"journal-article","created":{"date-parts":[[2018,1,14]],"date-time":"2018-01-14T23:31:45Z","timestamp":1515972705000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":69,"title":["Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC"],"prefix":"10.1155","volume":"2018","author":[{"given":"Xingshuo","family":"An","sequence":"first","affiliation":[]},{"given":"Xianwei","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Xing","family":"L\u00fc","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5287-5226","authenticated-orcid":false,"given":"Fuhong","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Yang","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2018,1,14]]},"reference":[{"key":"e_1_2_9_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.37"},{"key":"e_1_2_9_2_2","unstructured":"PortalE. Mobile-edge computing-introductory technical white paper 2014."},{"key":"e_1_2_9_3_2","unstructured":"BeckM. WernerM. FeldS. andSchimperS. Mobile edge computing: A taxonomy Proceedings of the the 6th International Conference on Advances in Future Internet 2014."},{"key":"e_1_2_9_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2017.09.014"},{"key":"e_1_2_9_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.009"},{"key":"e_1_2_9_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7721750"},{"key":"e_1_2_9_7_2","doi-asserted-by":"crossref","unstructured":"YiS. LiC. andLiQ. A survey of fog computing: concepts applications and issues Proceedings of the Workshop on Mobile Big Data (Mobidata \u203215) June 2015 Hangzhou China ACM 37\u201342 https:\/\/doi.org\/10.1145\/2757384.2757397.","DOI":"10.1145\/2757384.2757397"},{"key":"e_1_2_9_8_2","doi-asserted-by":"crossref","unstructured":"DsouzaC. AhnG.-J. andTaguinodM. Policy-driven security management for fog computing: preliminary framework and a case study Proceedings of the 15th IEEE International Conference on Information Reuse and Integration (IEEE IRI \u203214) August 2014 Redwood City Calif USA 16\u201323 https:\/\/doi.org\/10.1109\/iri.2014.7051866 2-s2.0-84941286216.","DOI":"10.1109\/IRI.2014.7051866"},{"key":"e_1_2_9_9_2","doi-asserted-by":"crossref","unstructured":"DenningD. E. An Intrusion-Detection Model Proceedings of the IEEE Symposium on Security and Privacy April 1986 Oakland Calif USA https:\/\/doi.org\/10.1109\/SP.1986.10010.","DOI":"10.1109\/SP.1986.10010"},{"key":"e_1_2_9_10_2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.428"},{"key":"e_1_2_9_11_2","doi-asserted-by":"crossref","unstructured":"LindaO. VollmerT. andManicM. Neural Network based intrusion detection system for critical infrastructures Proceedings of the International Joint Conference on Neural Networks IJCNN 2009 June 2009 Atlanta Ga USA 1827\u20131834 https:\/\/doi.org\/10.1109\/IJCNN.2009.5178592 2-s2.0-70449371464.","DOI":"10.1109\/IJCNN.2009.5178592"},{"key":"e_1_2_9_12_2","doi-asserted-by":"crossref","unstructured":"StojmenovicI.andWenS. The fog computing paradigm: scenarios and security issues Proceedings of the Federated Conference on Computer Science and Information Systems (FedCSIS \u203214) September 2014 Warsaw Poland IEEE 1\u20138 https:\/\/doi.org\/10.15439\/2014f503 2-s2.0-84912130127.","DOI":"10.15439\/2014F503"},{"key":"e_1_2_9_13_2","doi-asserted-by":"crossref","unstructured":"StolfoS. J. SalemM. B. andKeromytisA. D. Fog computing: Mitigating insider data theft attacks in the cloud Proceedings of the 1st IEEE Security and Privacy Workshops SPW 2012 May 2012 San Francisco Calif USA 125\u2013128 https:\/\/doi.org\/10.1109\/SPW.2012.19 2-s2.0-84864275237.","DOI":"10.1109\/SPW.2012.19"},{"key":"e_1_2_9_14_2","doi-asserted-by":"crossref","unstructured":"WangY. UeharaT. andSasakiR. Fog computing: Issues and challenges in security and forensics Proceedings of the 39th IEEE Annual Computer Software and Applications Conference Workshops COMPSACW 2015 July 2015 Taichung Taiwan 53\u201359 https:\/\/doi.org\/10.1109\/COMPSAC.2015.173 2-s2.0-84962076525.","DOI":"10.1109\/COMPSAC.2015.173"},{"key":"e_1_2_9_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21837-3_67"},{"key":"e_1_2_9_16_2","doi-asserted-by":"crossref","unstructured":"ShiY. AbhilashS. andHwangK. Cloudlet mesh for securing mobile clouds from intrusions and network attacks Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing Services and Engineering MobileCloud 2015 April 2015 San Francisco Calif USA 109\u2013118 https:\/\/doi.org\/10.1109\/MobileCloud.2015.15 2-s2.0-84939506714.","DOI":"10.1109\/MobileCloud.2015.15"},{"key":"e_1_2_9_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22906-5_11"},{"key":"e_1_2_9_18_2","doi-asserted-by":"crossref","unstructured":"OscarE. C. FernandezE. B. andRa\u00falM. A. Threat analysis and misuse patterns of federated Inter-Cloud systems Proceedings of the 19th European Conference on Pattern Languages of Programs EuroPLoP 2014 July 2014 Irsee Germany https:\/\/doi.org\/10.1145\/2721956.2721986 2-s2.0-84955587196.","DOI":"10.1145\/2721956.2721986"},{"key":"e_1_2_9_19_2","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4133"},{"key":"e_1_2_9_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2005.12.126"},{"key":"e_1_2_9_21_2","doi-asserted-by":"crossref","unstructured":"ChengC. TayW. P. andHuangG.-B. Extreme learning machines for intrusion detection Proceedings of the Annual International Joint Conference on Neural Networks IJCNN 2012 June 2012 Brisbane Australia https:\/\/doi.org\/10.1109\/IJCNN.2012.6252449 2-s2.0-84865067272.","DOI":"10.1109\/IJCNN.2012.6252449"},{"key":"e_1_2_9_22_2","doi-asserted-by":"crossref","unstructured":"YeZ.andYuY. Network intrusion classification based on extreme learning machine Proceedings of the IEEE International Conference on Information and Automation ICIA 2015 August 2015 Lijiang China 1642\u20131647 https:\/\/doi.org\/10.1109\/ICInfA.2015.7279549 2-s2.0-84959922989.","DOI":"10.1109\/ICInfA.2015.7279549"},{"key":"e_1_2_9_23_2","doi-asserted-by":"crossref","unstructured":"SrimuangW.andIntarasothonchunS. Classification model of network intrusion using Weighted Extreme Learning Machine Proceedings of the 12th International Joint Conference on Computer Science and Software Engineering JCSSE 2015 July 2015 Songkhla Thailand 190\u2013194 https:\/\/doi.org\/10.1109\/JCSSE.2015.7219794 2-s2.0-84945951045.","DOI":"10.1109\/JCSSE.2015.7219794"},{"key":"e_1_2_9_24_2","doi-asserted-by":"crossref","unstructured":"CaiC. PanH. andChengG. Fusion of BVM and ELM for anomaly detection in computer networks Proceedings of the International Conference on Computer Science and Service System CSSS 2012 August 2012 Nanjing China 1957\u20131960 https:\/\/doi.org\/10.1109\/CSSS.2012.488 2-s2.0-84873865040.","DOI":"10.1109\/CSSS.2012.488"},{"key":"e_1_2_9_25_2","unstructured":"KDD CUP 99 data set http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html."},{"key":"e_1_2_9_26_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.05.008"},{"key":"e_1_2_9_27_2","unstructured":"ZhouY. An incremental ELM algorithm based on instance selection [M.S. thesis] 2015 Hebei University Hebei China."},{"key":"e_1_2_9_28_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(96)00142-2"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/7472095.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/7472095.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2018\/7472095","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T06:13:05Z","timestamp":1723011185000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2018\/7472095"}},"subtitle":[],"editor":[{"given":"Shangguang","family":"Wang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["10.1155\/2018\/7472095"],"URL":"https:\/\/doi.org\/10.1155\/2018\/7472095","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"value":"1530-8669","type":"print"},{"value":"1530-8677","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1]]},"assertion":[{"value":"2017-09-05","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-11-16","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-01-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"7472095"}}