Towards data security assessments using an IDS security model for cyber-physical smart cities

被引:9
作者
Sangaiah, Arun Kumar [1 ,4 ]
Javadpour, Amir [2 ,3 ]
Pinto, Pedro [2 ]
机构
[1] Natl Yunlin Univ Sci & Technol, Int Grad Inst AI, Yunlin, Taiwan
[2] Inst Politecn Viana do Castelo, ADiT Lab, Electrotech & Telecommun Dept, P-4900347 Porto, Portugal
[3] Harbin Inst Technol, Dept Comp Sci & Technol Cyberspace Secur, Shenzhen, Peoples R China
[4] Lebanese Amer Univ, Dept Elect & Comp Engn, Byblos, Lebanon
关键词
Smart operation systems; INTERACT; Smart cities; Intrusion detection system; Multilayer perceptron; KDD99;
D O I
10.1016/j.ins.2023.119530
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Technology has enabled many devices to exchange huge amounts of data and communicate with each other as Edge Intelligence in Smart Cities (EISC), as a result of rapid technological advancements. When dealing with personal data, it is paramount to ensure that it is not disclosed and that there is no disclosure of any confidential information. In recent decades, academics and industry have spent considerable time and energy discussing security and privacy. Other systems, known as intrusion detection systems, are required to breach firewalls, antivirus software, and other security equipment to provide complete system security in smart operation systems. There are three aspects to an intrusion detection system: the intrusion detection method, the architecture, and the intrusion response method. In this study, we combined linear correlation feature selection methods and cross-information. The database used in this article is KDD99. This paper examines applying two feature selection methods in predicting attacks in intrusion detection systems based on INTERACT and A multilayer perceptron (MLP). Since the number of records associated with each attack type differs, one of our suggestions is to continue using data balancing techniques. As a result, the number of records associated with each type of network status becomes closer together. The results in the categories can also be improved using information synthesis methods, such as majority voting.
引用
收藏
页数:17
相关论文
共 50 条
  • [11] An effective intrusion detection approach using SVM with naive Bayes feature embedding
    Gu, Jie
    Lu, Shan
    [J]. COMPUTERS & SECURITY, 2021, 103
  • [12] Himthani Puneet, 2022, Proceedings of Third International Conference on Sustainable Computing: SUSCOM 2021. Advances in Intelligent Systems and Computing (1404), P97, DOI 10.1007/978-981-16-4538-9_10
  • [13] Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System
    Husnain, Muhammad
    Hayat, Khizar
    Cambiaso, Enrico
    Fayyaz, Ubaid U.
    Mongelli, Maurizio
    Akram, Habiba
    Ghazanfar Abbas, Syed
    Shah, Ghalib A.
    [J]. SENSORS, 2022, 22 (02)
  • [14] Jadhav K. P., 2022, P INT C REC TRENDS C, P527
  • [15] Jasim AD., 2022, Iraqi Journal for Computer Science and Mathematics, V3, P83
  • [16] Javadpour A., 2022, IEEE T IND INFORM
  • [17] DMAIDPS: a distributed multi-agent intrusion detection and prevention system for cloud IoT environments
    Javadpour, Amir
    Pinto, Pedro
    Ja'fari, Forough
    Zhang, Weizhe
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (01): : 367 - 384
  • [18] Feature Selection and Intrusion Detection in Cloud Environment based on Machine Learning Algorithms
    Javadpour, Amir
    Abharian, Sanaz Kazemi
    Wang, Guojun
    [J]. 2017 15TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 16TH IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC 2017), 2017, : 1417 - 1421
  • [19] An Enhanced Multi-Stage Deep Learning Framework for Detecting Malicious Activities From Autonomous Vehicles
    Khan, Izhar Ahmed
    Moustafa, Nour
    Pi, Dechang
    Haider, Waqas
    Li, Bentian
    Jolfaei, Alireza
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (12) : 25469 - 25478
  • [20] Building a Fuzzy Classifier Based on Whale Optimization Algorithm to Detect Network Intrusions
    Koryshev, Nikolay
    Hodashinsky, Ilya
    Shelupanov, Alexander
    [J]. SYMMETRY-BASEL, 2021, 13 (07):