Towards a Hybrid Machine Learning Model for Intelligent Cyber Threat Identification in Smart City Environments

被引:13
作者
Al-Taleb, Najla [1 ]
Saqib, Nazar Abbas [2 ]
机构
[1] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Dept Comp Sci, POB 1982, Dammam 31441, Saudi Arabia
[2] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Dept Networks & Commun, SAUDI ARAMCO Cybersecur Chair, POB 1982, Dammam 31441, Saudi Arabia
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 04期
关键词
cyber threat intelligence; privacy; smart city; machine learning; deep learning; CNN; QRNN; NEURAL-NETWORKS; INTERNET; THINGS; CYBERSECURITY; CHALLENGES; SECURITY; PRIVACY;
D O I
10.3390/app12041863
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The concept of a smart city requires the integration of information and communication technologies and devices over a network for the better provision of services to citizens. As a result, the quality of living is improved by continuous analyses of data to improve service delivery by governments and other organizations. Due to the presence of extensive devices and data flow over networks, the probability of cyber attacks and intrusion detection has increased. The monitoring of this huge amount of data traffic is very difficult, though machine learning algorithms have huge potential to support this task. In this study, we compared different machine learning models used for cyber threat classification. Our comparison was focused on the analyzed cyber threats, algorithms, and performance of these models. We have identified that real-time classification, accuracy, and false-positive rates are still the major issues in the performance of existing models. Accordingly, we have proposed a hybrid deep learning (DL) model for cyber threat intelligence (CTI) to improve threat classification performance. Our model was based on a convolutional neural network (CNN) and quasi-recurrent neural network (QRNN). The use of QRNN not only resulted in improved accuracy but also enabled real-time classification. The model was tested on BoT-IoT and TON_IoT datasets, and the results showed that the proposed model outperformed the other models. Due to this improved performance, we emphasize that the application of this model in the real-time environment of a smart system network will help in reducing threats in a reasonable time.
引用
收藏
页数:16
相关论文
共 60 条
[1]   Identifying cyber threats to mobile-loT applications in edge computing paradigm [J].
Abawajy, Jemal ;
Huda, Shamsul ;
Sharmeen, Shaila ;
Hassan, Mohammad Mehedi ;
Almogren, Ahmad .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 89 :525-538
[2]  
Abu S., 2018, INDONES J ELECT ENG, V10, P371
[3]   Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers' Strategies [J].
Ahmad, Farhan ;
Adnane, Asma ;
Franqueira, Virginia N. L. ;
Kurugollu, Fatih ;
Liu, Lu .
SENSORS, 2018, 18 (11)
[4]  
Al Obaidan F., 2021, Handbook of Research on Advancing Cybersecurity for Digital Transformation, P203
[5]   Proactive Threat Detection for Connected Cars Using Recursive Bayesian Estimation [J].
al-Khateeb, Haider ;
Epiphaniou, Gregory ;
Reviczky, Adam ;
Karadimas, Petros ;
Heidari, Hadi .
IEEE SENSORS JOURNAL, 2018, 18 (12) :4822-4831
[6]   Cybersecurity for Smart Cities: A Brief Review [J].
Alibasic, Armin ;
Al Junaibi, Reem ;
Aung, Zeyar ;
Woon, Wei Lee ;
Omar, Mohammad Atif .
DATA ANALYTICS FOR RENEWABLE ENERGY INTEGRATION (DARE 2016), 2017, 10097 :22-30
[7]  
Alsamiri J, 2019, INT J ADV COMPUT SC, V10, P627
[8]   The Value of Intelligent Cybersecurity Strategies for Dubai Smart City [J].
AlZaabi, Khulood Ali Jumah AlJarman .
SMART TECHNOLOGIES AND INNOVATION FOR A SUSTAINABLE FUTURE, 2019, :421-445
[9]  
Behzadan V., 2018, 2018 IEEE International Smart Cities Conference (ISC2), P1
[10]   A Survey of Deep Learning Methods for Cyber Security [J].
Berman, Daniel S. ;
Buczak, Anna L. ;
Chavis, Jeffrey S. ;
Corbett, Cherita L. .
INFORMATION, 2019, 10 (04)