Smart City Gnosys

Smart city article details

Title Injection Attack Detection Using Machine Learning For Smart Iot Applications
ID_Doc 31583
Authors Gaber T.; El-Ghamry A.; Hassanien A.E.
Year 2022
Published Physical Communication, 52
DOI http://dx.doi.org/10.1016/j.phycom.2022.101685
Abstract Smart cities are a rapidly growing IoT application. These smart cities mainly rely on wireless sensors to connect their different components (smart devices) together. Smart cities rely on the integration of IoT and 5G technologies, and this has created a demand for a massive IoT network of connected devices. The data traffic coming from indoor wireless networks (e.g., smart homes, smart hospitals, smart factories, or smart school buildings) contributes to over 80% of the total data traffic of the current IoT network. As smart cities and their applications grow, security and privacy challenges have become a major concern for billions of IoT smart devices. One reason for this could be the oversight of handling security issues of IoT devices by their manufacturers, which enables attackers to exploit the vulnerabilities in these devices by performing different types of attacks, e.g., DDoS and injection attacks. Intrusion detection is one way to detect and mitigate the risk of such attacks. In this paper, an intrusion detection method was proposed to detect injection attacks in IoT applications (e.g. smart cities). In this method, two types of feature selection techniques (constant removal and recursive feature elimination) were used and tested by a number of machine learning classifiers (i.e., SVM, Random Forest, and Decision Tree). The T-Test was conducted to evaluate the quality of this proposed feature selection method. Using the public dataset, AWID, the evaluation results showed that the decision tree classifier can be used to detect injection attacks with an accuracy of 99% using only 8 features, which were selected using the proposed feature selection method. Also, the comparison with the most related work showed the advantages of the proposed intrusion detection method. © 2022 Elsevier B.V.
Author Keywords Feature selection; In door wireless network; Injection attacks; Internet of Things; Intrusion detection; Machine learning; Smart cities


Similar Articles


Id Similarity Authors Title Published
33346 View0.909Berhili M.; Chaieb O.; Benabdellah M.Intrusion Detection Systems In Iot Based On Machine Learning: A State Of The ArtProcedia Computer Science, 251 (2024)
9646 View0.902Maniriho P.; Niyigaba E.; Bizimana Z.; Twiringiyimana V.; Mahoro L.J.; Ahmad T.Anomaly-Based Intrusion Detection Approach For Iot Networks Using Machine LearningCENIM 2020 - Proceeding: International Conference on Computer Engineering, Network, and Intelligent Multimedia 2020 (2020)
9197 View0.902Janani Pandeeswari G.; Jeyanthi S.Analysis Of Intrusion Detection Using Machine Learning Techniques2nd IEEE International Conference on Advanced Technologies in Intelligent Control, Environment, Computing and Communication Engineering, ICATIECE 2022 (2022)
36055 View0.902Ngo V.-D.; Vuong T.-C.; Van Luong T.; Tran H.Machine Learning-Based Intrusion Detection: Feature Selection Versus Feature ExtractionCluster Computing, 27, 3 (2024)
23835 View0.902Arabiat A.; Altayeb M.Enhancing Internet Of Things Security: Evaluating Machine Learning Classifiers For Attack PredictionInternational Journal of Electrical and Computer Engineering, 14, 5 (2024)
24715 View0.895Ali M.; Pervez S.; Hosseini S.E.; Siddhu M.K.Evaluation And Detection Of Cyberattack In Iot-Based Smart City Networks Using Machine Learning On The Unsw-Nb15 DatasetInternational Journal of Online and Biomedical Engineering, 21, 2 (2025)
814 View0.893Basheer L.; Ranjana P.A Comparative Study Of Various Intrusion Detections In Smart Cities Using Machine Learning2022 International Conference on IoT and Blockchain Technology, ICIBT 2022 (2022)
28563 View0.893Ansari L.Guarding The Future: Anomaly Detection In Iot-Enabled Smart CitiesLecture Notes in Networks and Systems, 1110 LNNS (2024)
32898 View0.893Kaur B.; Dadkhah S.; Shoeleh F.; Neto E.C.P.; Xiong P.; Iqbal S.; Lamontagne P.; Ray S.; Ghorbani A.A.Internet Of Things (Iot) Security Dataset Evolution: Challenges And Future DirectionsInternet of Things (Netherlands), 22 (2023)
19430 View0.892Alhanaya M.; Al-Shqeerat K.Developing An Integrated Framework For Securing Internet Of Things Traffic In Smart Cities Using Machine Learning TechniquesApplied Sciences (Switzerland), 13, 16 (2023)