Smart City Gnosys

Smart city article details

Title Dynamic Adaptation Attack Detection Model For A Distributed Multi-Access Edge Computing Smart City
ID_Doc 21217
Authors Alotaibi N.S.; Ahmed H.I.; Kamel S.O.M.
Year 2023
Published Sensors, 23, 16
DOI http://dx.doi.org/10.3390/s23167135
Abstract The internet of things (IoT) technology presents an intelligent way to improve our lives and contributes to many fields such as industry, communications, agriculture, etc. Unfortunately, IoT networks are exposed to many attacks that may destroy the entire network and consume network resources. This paper aims to propose intelligent process automation and an auto-configured intelligent automation detection model (IADM) to detect and prevent malicious network traffic and behaviors/events at distributed multi-access edge computing in an IoT-based smart city. The proposed model consists of two phases. The first phase relies on the intelligent process automation (IPA) technique and contains five modules named, specifically, dataset collection and pre-processing module, intelligent automation detection module, analysis module, detection rules and action module, and database module. In the first phase, each module composes an intelligent connecting module to give feedback reports about each module and send information to the next modules. Therefore, any change in each process can be easily detected and labeled as an intrusion. The intelligent connection module (ICM) may reduce the search time, increase the speed, and increase the security level. The second phase is the dynamic adaptation of the attack detection model based on reinforcement one-shot learning. The first phase is based on a multi-classification technique using Random Forest Trees (RFT), k-Nearest Neighbor (K-NN), J48, AdaBoost, and Bagging. The second phase can learn the new changed behaviors based on reinforced learning to detect zero-day attacks and malicious events in IoT-based smart cities. The experiments are implemented using a UNSW-NB 15 dataset. The proposed model achieves high accuracy rates using RFT, K-NN, and AdaBoost of approximately 98.8%. It is noted that the accuracy rate of the J48 classifier achieves 85.51%, which is lower than the others. Subsequently, the accuracy rates of AdaBoost and Bagging based on J48 are 98.9% and 91.41%, respectively. Additionally, the error rates of RFT, K-NN, and AdaBoost are very low. Similarly, the proposed model achieves high precision, recall, and F1-measure high rates using RFT, K-NN, AdaBoost, and Bagging. The second phase depends on creating an auto-adaptive model through the dynamic adaptation of the attack detection model based on reinforcement one-shot learning using a small number of instances to conserve the memory of any smart device in an IoT network. The proposed auto-adaptive model may reduce false rates of reporting by the intrusion detection system (IDS). It can detect any change in the behaviors of smart devices quickly and easily. The IADM can improve the performance rates for IDS by maintaining the memory consumption, time consumption, and speed of the detection process. © 2023 by the authors.
Author Keywords AdaBoost; Bagging; deep reinforcement learning; intelligent process automation (IPA); internet of things; intrusion detection system (IDS); k-Nearest Neighbor; multi-access edge computing; Random Forest Trees; smart city


Similar Articles


Id Similarity Authors Title Published
37777 View0.874Saheed Y.K.; Abdulganiyu O.H.; Tchakoucht T.A.Modified Genetic Algorithm And Fine-Tuned Long Short-Term Memory Network For Intrusion Detection In The Internet Of Things Networks With Edge CapabilitiesApplied Soft Computing, 155 (2024)
19430 View0.867Alhanaya M.; Al-Shqeerat K.Developing An Integrated Framework For Securing Internet Of Things Traffic In Smart Cities Using Machine Learning TechniquesApplied Sciences (Switzerland), 13, 16 (2023)
47782 View0.865Ahmed Y.; Beyioku K.; Yousefi M.Securing Smart Cities Through Machine Learning: A Honeypot-Driven Approach To Attack Detection In Internet Of Things EcosystemsIET Smart Cities, 6, 3 (2024)
24715 View0.864Ali M.; Pervez S.; Hosseini S.E.; Siddhu M.K.Evaluation And Detection Of Cyberattack In Iot-Based Smart City Networks Using Machine Learning On The Unsw-Nb15 DatasetInternational Journal of Online and Biomedical Engineering, 21, 2 (2025)
2052 View0.864Elsayed R.; Hamada R.; Hammoudeh M.; Abdalla M.; Elsaid S.A.A Hierarchical Deep Learning-Based Intrusion Detection Architecture For Clustered Internet Of ThingsJournal of Sensor and Actuator Networks, 12, 1 (2023)
7367 View0.863Albulayhi K.; Sheldon F.T.An Adaptive Deep-Ensemble Anomaly-Based Intrusion Detection System For The Internet Of Things2021 IEEE World AI IoT Congress, AIIoT 2021 (2021)
7014 View0.862Reis M.J.C.S.Ai-Driven Anomaly Detection For Securing Iot Devices In 5G-Enabled Smart CitiesElectronics (Switzerland), 14, 12 (2025)
41565 View0.861Zhukabayeva T.; Ahmad Z.; Adamova A.; Karabayev N.; Mardenov Y.; Satybaldina D.Penetration Testing And Machine Learning-Driven Cybersecurity Framework For Iot And Smart City Wireless NetworksIEEE Access, 13 (2025)
23730 View0.86Sharma A.; Rani S.Enhancing 6G-Iot Network Security: A Trustworthy And Responsible Ai-Driven Stacked-Hybrid Model For Attack DetectionIEEE Internet of Things Journal (2025)
32898 View0.858Kaur B.; Dadkhah S.; Shoeleh F.; Neto E.C.P.; Xiong P.; Iqbal S.; Lamontagne P.; Ray S.; Ghorbani A.A.Internet Of Things (Iot) Security Dataset Evolution: Challenges And Future DirectionsInternet of Things (Netherlands), 22 (2023)