Please use this identifier to cite or link to this item: http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/30062
Full metadata record
DC FieldValueLanguage
dc.contributor.authorShuaib, Maryam-
dc.contributor.authorAbdulhamid, Shafii Muhammed-
dc.contributor.authorOjeniyi, Joseph Adebayo-
dc.contributor.authorDauda, U. S.-
dc.contributor.authorIsmaila, Idris-
dc.contributor.authorNoel, Moses Dogonyaro-
dc.date.accessioned2025-07-31T06:39:26Z-
dc.date.available2025-07-31T06:39:26Z-
dc.date.issued2025-
dc.identifier.urihttp://irepo.futminna.edu.ng:8080/jspui/handle/123456789/30062-
dc.description.abstractSybil attacks gravely impair the integrity and dependability of fog computing environments, especially when operating in IoT networks. These attacks consist of malicious entities creating multiple identities to disrupt authentic operations of a network. Traditional detection mechanisms have been known to report very high false-positive rates along with latency issues. This paper is an introduction to an advanced feature engineering strategy focused on Sybil attack detection in fog computing environments. The proposed strategy, when experimenting with a balanced and engineered dataset, achieved an accuracy of 86%, which is an improvement over the result gotten from the original dataset. The proposed approach uses the Synthetic Minority Over-sampling Technique (SMOTE) to address class imbalance problems in sybil attack simulation datasets. The results illustrate the promise of advanced feature engineering on datasets to further protect fog computing infrastructure from Sybil attacks especially when integrated with Federated Learningen_US
dc.language.isoenen_US
dc.publisherJournal of Advances in Mathematical and Computational Sciencesen_US
dc.relation.ispartofseries13(2), 15 – 34.;-
dc.subjectFeature Engineering, Fog Computing, Fog Security, Sybil Detection, Anomaly Detection, Sybil Attack simulation Dataset.en_US
dc.titleAn advanced feature engineering approach for sybil attack detection in fog computing environmenten_US
dc.typeArticleen_US
Appears in Collections:Cyber Security Science

Files in This Item:
File Description SizeFormat 
Paper 2- AIMS-Maths Vol 13 No 2.pdf1.26 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.