Smart City Gnosys

Smart city article details

Title The Identification Of Conflicting Determinations Of Anomalies In Computer Network Behaviour: Cyber Security In Smart Cities
ID_Doc 55661
Authors Baptist Andrews L.J.; Midhun Chakkaravarthy D.; Raj R.A.; Selvam J.; Sarathkumar D.; Akbar S.S.
Year 2023
Published International Conference on Recent Advances in Science and Engineering Technology, ICRASET 2023
DOI http://dx.doi.org/10.1109/ICRASET59632.2023.10420269
Abstract New problems and difficulties have arisen as a result of smart cities' greater reliance on various forms of urban technology. Data-driven technologies and computer networks are used in a broad range of applications and municipal infrastructures. Intrusion detection systems are always looking for evidence of malicious activity on computer networks. Binary classifiers are good tools for determining whether data should be considered normal or pathological. The removal of redundant and unimportant data may be accomplished via the use of feature selection and feature scaling. Nine of the twenty-four numerical characteristics included within the Kyoto 2006+ dataset are regarded as being crucial for the training of models. This linearization is accomplished via a hyperbolic tangent normalization. Different machine learning techniques with proven classification abilities were utilized in this study. While there was a little decline in accuracy overall (less than 0.1 percent), there was a significant reduction in the amount of time it took to analyze data. According to the findings, there is an undeniable advantage to using TH scaling in terms of processing time. It doesn't matter how accurate the classifiers are; there are still situations when their conclusions aren't the same. Based on the XOR process achieved on the results of two separate classifications, we develop a conflicting decision detector. These classifiers are a feedforward neural network, which is the quickest, and a weighted k-nearest neighbor model, which is the most accurate but also the slowest. The findings indicate that up to 6% of the various choices made may be identified. © 2023 IEEE.
Author Keywords Anomaly Detection; Binary Classification; Cyber Security; Feature Scaling; Machine Learning


Similar Articles


Id Similarity Authors Title Published
17029 View0.942Protic D.; Gaur L.; Stankovic M.; Rahman M.A.Cybersecurity In Smart Cities: Detection Of Opposing Decisions On Anomalies In The Computer Network BehaviorElectronics (Switzerland), 11, 22 (2022)
13293 View0.887Khan J.; Elfakharany R.; Saleem H.; Pathan M.; Shahzad E.; Dhou S.; Aloul F.Can Machine Learning Enhance Intrusion Detection To Safeguard Smart City Networks From Multi-Step Cyberattacks?Smart Cities, 8, 1 (2025)
55376 View0.878Čech P.; Ponce D.; Mikulecký P.; Žváčková A.; Mls K.; Otčenášková T.; Tučník P.The Effect Of Generating Synthetic Data In Smart City Network SystemsSN Computer Science, 6, 2 (2025)
36913 View0.872Girubagari N.; Ravi T.N.Methods Of Anomaly Detection For The Prevention And Detection Of Cyber AttacksInternational Journal of Intelligent Engineering Informatics, 11, 4 (2024)
36055 View0.871Ngo V.-D.; Vuong T.-C.; Van Luong T.; Tran H.Machine Learning-Based Intrusion Detection: Feature Selection Versus Feature ExtractionCluster Computing, 27, 3 (2024)
58081 View0.87Sangaiah A.K.; Javadpour A.; Pinto P.Towards Data Security Assessments Using An Ids Security Model For Cyber-Physical Smart CitiesInformation Sciences, 648 (2023)
814 View0.867Basheer L.; Ranjana P.A Comparative Study Of Various Intrusion Detections In Smart Cities Using Machine Learning2022 International Conference on IoT and Blockchain Technology, ICIBT 2022 (2022)
19918 View0.866Garcia-Font, V; Garrigues, C; Rifà-Pous, HDifficulties And Challenges Of Anomaly Detection In Smart Cities: A Laboratory AnalysisSENSORS, 18, 10 (2018)
2187 View0.864Gill K.S.; Dhillon A.A Hybrid Machine Learning Framework For Intrusion Detection System In Smart CitiesEvolving Systems, 15, 6 (2024)
2483 View0.863Nepolo E.; Ngxande M.; Zodi G.-A.L.A Machine Learning-Based Performance Analysis Of Feature Selection Methods For Anomaly Detection For Iot Network SecurityLearning and Analytics in Intelligent Systems, 43 (2025)