Towards data security assessments using an IDS security model for cyber-physical smart cities

被引:9
作者
Sangaiah, Arun Kumar [1 ,4 ]
Javadpour, Amir [2 ,3 ]
Pinto, Pedro [2 ]
机构
[1] Natl Yunlin Univ Sci & Technol, Int Grad Inst AI, Yunlin, Taiwan
[2] Inst Politecn Viana do Castelo, ADiT Lab, Electrotech & Telecommun Dept, P-4900347 Porto, Portugal
[3] Harbin Inst Technol, Dept Comp Sci & Technol Cyberspace Secur, Shenzhen, Peoples R China
[4] Lebanese Amer Univ, Dept Elect & Comp Engn, Byblos, Lebanon
关键词
Smart operation systems; INTERACT; Smart cities; Intrusion detection system; Multilayer perceptron; KDD99;
D O I
10.1016/j.ins.2023.119530
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Technology has enabled many devices to exchange huge amounts of data and communicate with each other as Edge Intelligence in Smart Cities (EISC), as a result of rapid technological advancements. When dealing with personal data, it is paramount to ensure that it is not disclosed and that there is no disclosure of any confidential information. In recent decades, academics and industry have spent considerable time and energy discussing security and privacy. Other systems, known as intrusion detection systems, are required to breach firewalls, antivirus software, and other security equipment to provide complete system security in smart operation systems. There are three aspects to an intrusion detection system: the intrusion detection method, the architecture, and the intrusion response method. In this study, we combined linear correlation feature selection methods and cross-information. The database used in this article is KDD99. This paper examines applying two feature selection methods in predicting attacks in intrusion detection systems based on INTERACT and A multilayer perceptron (MLP). Since the number of records associated with each attack type differs, one of our suggestions is to continue using data balancing techniques. As a result, the number of records associated with each type of network status becomes closer together. The results in the categories can also be improved using information synthesis methods, such as majority voting.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Extracting Rules from Autonomous-Vehicle-Involved Crashes by Applying Decision Tree and Association Rule Methods
    Ashraf, Md Tanvir
    Dey, Kakan
    Mishra, Sabyasachee
    Rahman, Md Tawhidur
    [J]. TRANSPORTATION RESEARCH RECORD, 2021, 2675 (11) : 522 - 533
  • [2] Federated intelligence of anomaly detection agent in IoTMD-enabled Diabetes Management Control System
    Astillo, Philip Virgil
    Duguma, Daniel Gerbi
    Park, Hoonyong
    Kim, Jiyoon
    Kim, Bonam
    You, Ilsun
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 128 : 395 - 405
  • [3] SmcHD1, containing a structural-maintenance-of-chromosomes hinge domain, has a critical role in X inactivation
    Blewitt, Marnie E.
    Gendrel, Anne-Valerie
    Pang, Zhenyi
    Sparrow, Duncan B.
    Whitelaw, Nadia
    Craig, Jeffrey M.
    Apedaile, Anwyn
    Hilton, Douglas J.
    Dunwoodie, Sally L.
    Brockdorff, Neil
    Kay, Graham F.
    Whitelaw, Emma
    [J]. NATURE GENETICS, 2008, 40 (05) : 663 - 669
  • [4] Random forests
    Breiman, L
    [J]. MACHINE LEARNING, 2001, 45 (01) : 5 - 32
  • [5] SVM-based Detection of False Data Injection in Intelligent Transportation System
    Cabelin, Joe Diether
    Alpano, Paul Vincent
    Pedrasa, Jhoanna Rhodette
    [J]. 35TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2021), 2021, : 279 - 284
  • [6] Di Pietro R, 2008, ADV INFORM SECUR, V38, P17
  • [8] Anomaly detection in autonomous electric vehicles using AI techniques: A comprehensive survey
    Dixit, Palak
    Bhattacharya, Pronaya
    Tanwar, Sudeep
    Gupta, Rajesh
    [J]. EXPERT SYSTEMS, 2022, 39 (05)
  • [9] Dutta N., 2022, Cyber Security: Issues and Current Trends, P101
  • [10] Eid HF, 2013, COMM COM INF SC, V381, P240