Open Access Open Access  Restricted Access Subscription Access

Using Artificial Intelligence Network to Analyze Man-in-the-Middle Attack Mechanism in Fog Networking Environment

Shih-Hao Chang,
Yi-Ju Shiau,

Abstract


This paper discusses the network attacks under software-defined fog networking. With artificial intelligence analysis, we need to clearly understand how fog networking and software-defined networking work. By this way, we can gain insights into how to improve the secure communication mechanism and bandwidth efficiency between the fog network and the software-defined network. Although software-defined fog networking can significantly reduce the bandwidth compared to current networks. If the goal of stable and secure communication is not met, there are still doubts about whether it is applicable. In addition, for the system operator, if the transmission security and network security of the fog networking and the software-defined network cannot be guaranteed. It will reduce the willingness to use the fog networking and software-defined network architecture. In this paper, we use artificial intelligence analysis to address security concerns. We also propose the effective network path optimization algorithm, packet inspection mechanism of software-defined network, and artificial intelligence analysis mechanism.


Citation Format:
Shih-Hao Chang, Yi-Ju Shiau, "Using Artificial Intelligence Network to Analyze Man-in-the-Middle Attack Mechanism in Fog Networking Environment," Communications of the CCISA, vol. 26, no. 1 , pp. 25-35, Feb. 2020.

Full Text:

PDF

Refbacks

  • There are currently no refbacks.





Published by Chinese Cryptology and Information Security Association (CCISA), Taiwan, R.O.C
CCCISA Editorial Office, No.1, Sec. 1, Shennong Rd., Yilan City, Yilan County 260, Taiwan (R.O.C.)
E-mail: ccisa.editor@gmail.com