Smart City Gnosys

Smart city article details

Title Identification Of Botnets And Nodes Attacking Smart Cities By Majority Voting Mechanism And Feature Selection
ID_Doc 29995
Authors Araghchi M.; Farzaneh N.
Year 2023
Published 2023 13th International Conference on Computer and Knowledge Engineering, ICCKE 2023
DOI http://dx.doi.org/10.1109/ICCKE60553.2023.10326236
Abstract A network intrusion detection system can monitor network traffic, record it, and apply intrusion detection algorithms to detect network intrusions. An effective intrusion detection system must have the ability to learn and discover intrusion patterns, and for this reason, most intrusion detection systems are designed by machine learning and deep learning methods. In this article, an intrusion detection system in the fog layer of smart cities is presented with feature selection as a group and learning with majority voting to discover the important features of attacks and share them between fog nodes. Here, each fog node can detect the important characteristics of attacks and share it with other fog nodes. Each fog node can perform its own learning on the discovered important features to detect network intrusion. In the proposed method, each fog node recognizes the most important features of the network traffic by the feature selection mechanism as a group and by majority voting and uses these features to use the artificial neural network classifier. Simulation results show that the proposed method has accuracy, sensitivity, and precision of 98.89%, 98.68%, and 98.81%, respectively, in detecting network attacks. The proposed method is more accurate in detecting attacks than methods such as GTO, PSO, HHO, WOA, and JSO. Experiments showed that the proposed method has improved the accuracy index by 1.22%, 1.13%, and 0.77%, respectively, compared to the WOA, HHO, and JSO algorithms. © 2023 IEEE.
Author Keywords Fog computing; Internet of things network; Intrusion detection system; Majority voting; Smart cities


Similar Articles


Id Similarity Authors Title Published
7586 View0.885Al Dawi A.; Tezel N.S.; Rahebi J.; Akbas A.An Approach To Botnet Attacks In The Fog Computing Layer And Apache Spark For Smart CitiesJournal of Supercomputing, 81, 4 (2025)
5688 View0.879Hamdan M.; Eldhai A.M.; Abdelsalam S.; Ullah K.; Bashir A.K.; Marsono M.N.; Kon F.; Batista D.M.A Two-Tier Anomaly-Based Intrusion Detection Approach For Iot-Enabled Smart CitiesIEEE INFOCOM 2023 - Conference on Computer Communications Workshops, INFOCOM WKSHPS 2023 (2023)
19842 View0.874Chinnasamy R.; Subramanian M.; Sengupta N.Devising Network Intrusion Detection System For Smart City With An Ensemble Of Optimization And Deep Learning TechniquesProceedings: ICMERALDA 2023 - International Conference on Modeling and E-Information Research, Artificial Learning and Digital Applications (2023)
8629 View0.871Liloja; Ranjana P.An Intrusion Detection System Using A Machine Learning Approach In Iot-Based Smart CitiesJournal of Internet Services and Information Security, 13, 1 (2023)
36055 View0.867Ngo V.-D.; Vuong T.-C.; Van Luong T.; Tran H.Machine Learning-Based Intrusion Detection: Feature Selection Versus Feature ExtractionCluster Computing, 27, 3 (2024)
1446 View0.864Rakha M.A.; Akbar A.; Chhabra G.; Kaushik K.; Arshi O.; Khan I.U.A Detailed Comparative Study Of Ai-Based Intrusion Detection System For Smart CitiesProceedings of International Conference on Communication, Computer Sciences and Engineering, IC3SE 2024 (2024)
13293 View0.863Khan J.; Elfakharany R.; Saleem H.; Pathan M.; Shahzad E.; Dhou S.; Aloul F.Can Machine Learning Enhance Intrusion Detection To Safeguard Smart City Networks From Multi-Step Cyberattacks?Smart Cities, 8, 1 (2025)
35958 View0.863Lefoane M.; Ghafir I.; Kabir S.; Awan I.-U.Machine Learning For Botnet Detection: An Optimized Feature Selection ApproachACM International Conference Proceeding Series (2021)
957 View0.863Houichi M.; Jaidi F.; Bouhoula A.A Comprehensive Study Of Intrusion Detection Within Internet Of Things-Based Smart Cities: Synthesis, Analysis And A Novel Approach2023 International Wireless Communications and Mobile Computing, IWCMC 2023 (2023)
31583 View0.863Gaber T.; El-Ghamry A.; Hassanien A.E.Injection Attack Detection Using Machine Learning For Smart Iot ApplicationsPhysical Communication, 52 (2022)