Smart City Gnosys

Smart city article details

Title Cybersecurity In Smart Cities: Detection Of Opposing Decisions On Anomalies In The Computer Network Behavior
ID_Doc 17029
Authors Protic D.; Gaur L.; Stankovic M.; Rahman M.A.
Year 2022
Published Electronics (Switzerland), 11, 22
DOI http://dx.doi.org/10.3390/electronics11223718
Abstract The increased use of urban technologies in smart cities brings new challenges and issues. Cyber security has become increasingly important as many critical components of information and communication systems depend on it, including various applications and civic infrastructures that use data-driven technologies and computer networks. Intrusion detection systems monitor computer networks for malicious activity. Signature-based intrusion detection systems compare the network traffic pattern to a set of known attack signatures and cannot identify unknown attacks. Anomaly-based intrusion detection systems monitor network traffic to detect changes in network behavior and identify unknown attacks. The biggest obstacle to anomaly detection is building a statistical normality model, which is difficult because a large amount of data is required to estimate the model. Supervised machine learning-based binary classifiers are excellent tools for classifying data as normal or abnormal. Feature selection and feature scaling are performed to eliminate redundant and irrelevant data. Of the 24 features of the Kyoto 2006+ dataset, nine numerical features are considered essential for model training. Min-Max normalization in the range [0,1] and [−1,1], Z-score standardization, and new hyperbolic tangent normalization are used for scaling. A hyperbolic tangent normalization is based on the Levenberg-Marquardt damping strategy and linearization of the hyperbolic tangent function with a narrow slope gradient around zero. Due to proven classification ability, in this study we used a feedforward neural network, decision tree, support vector machine, k-nearest neighbor, and weighted k-nearest neighbor models Overall accuracy decreased by less than 0.1 per cent, while processing time was reduced by more than a two-fold reduction. The results show a clear benefit of the TH scaling regarding processing time. Regardless of how accurate the classifiers are, their decisions can sometimes differ. Our study describes a conflicting decision detector based on an XOR operation performed on the outputs of two classifiers, the fastest feedforward neural network, and the more accurate but slower weighted k-nearest neighbor model. The results show that up to 6% of different decisions are detected. © 2022 by the authors.
Author Keywords anomaly detection; binary classification; feature scaling; machine learning


Similar Articles


Id Similarity Authors Title Published
55661 View0.942Baptist Andrews L.J.; Midhun Chakkaravarthy D.; Raj R.A.; Selvam J.; Sarathkumar D.; Akbar S.S.The Identification Of Conflicting Determinations Of Anomalies In Computer Network Behaviour: Cyber Security In Smart CitiesInternational Conference on Recent Advances in Science and Engineering Technology, ICRASET 2023 (2023)
13293 View0.905Khan J.; Elfakharany R.; Saleem H.; Pathan M.; Shahzad E.; Dhou S.; Aloul F.Can Machine Learning Enhance Intrusion Detection To Safeguard Smart City Networks From Multi-Step Cyberattacks?Smart Cities, 8, 1 (2025)
36913 View0.893Girubagari N.; Ravi T.N.Methods Of Anomaly Detection For The Prevention And Detection Of Cyber AttacksInternational Journal of Intelligent Engineering Informatics, 11, 4 (2024)
814 View0.881Basheer L.; Ranjana P.A Comparative Study Of Various Intrusion Detections In Smart Cities Using Machine Learning2022 International Conference on IoT and Blockchain Technology, ICIBT 2022 (2022)
2187 View0.88Gill K.S.; Dhillon A.A Hybrid Machine Learning Framework For Intrusion Detection System In Smart CitiesEvolving Systems, 15, 6 (2024)
19240 View0.88Rangani H.; Chandrashekar K.Detection And Prevention Of Cyber Threats In Smart Cities Using Machine Learning And Intrusion Detection Systems2nd International Conference on Self Sustainable Artificial Intelligence Systems, ICSSAS 2024 - Proceedings (2024)
47766 View0.876Plazas Olaya M.K.; Vergara Tejada J.A.; Aedo Cobo J.E.Securing Microservices-Based Iot Networks: Real-Time Anomaly Detection Using Machine LearningJournal of Computer Networks and Communications, 2024 (2024)
23834 View0.872Al-Atawi A.A.Enhancing Internet Of Smart City Security: Utilizing Logistic Boosted Algorithms For Anomaly Detection And Cyberattack PreventionSN Computer Science, 5, 5 (2024)
19430 View0.871Alhanaya M.; Al-Shqeerat K.Developing An Integrated Framework For Securing Internet Of Things Traffic In Smart Cities Using Machine Learning TechniquesApplied Sciences (Switzerland), 13, 16 (2023)
19918 View0.87Garcia-Font, V; Garrigues, C; Rifà-Pous, HDifficulties And Challenges Of Anomaly Detection In Smart Cities: A Laboratory AnalysisSENSORS, 18, 10 (2018)