A Machine Learning Approach for Intrusion Detection in Smart Cities

被引:4
作者
Elsaeidy, Asmaa [1 ]
Munasinghe, Kumudu S. [1 ]
Sharma, Dharmendra [1 ]
Jamalipour, Abbas [2 ]
机构
[1] Univ Canberra, Fac Sci & Technol, Canberra, ACT 2601, Australia
[2] Univ Sydney, Sch Elect & Informat Engn, Sydney, NSW 2006, Australia
来源
2019 IEEE 90TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-FALL) | 2019年
关键词
Smart city; distributed Denial of Service; intrusion detection; smart water plant; deep learning;
D O I
10.1109/vtcfall.2019.8891281
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the recent years smart cities have been emerged as promising paradigm for a transition toward providing effective and real time smart services. Despite the great potential it brings to citizens' life, security and privacy issues still need to be addressed. Due to technology advances, large amount of data is produced, where machine learning methods are applied to learn meaningful patterns. In this paper a machine learning-based framework is proposed for detecting distributed Denial of Service (DDoS) attacks in smart cities. The proposed framework applies restricted Boltzmann machines to learn high-level features from raw data and on top of these learned features, a feed forward neural network model is trained for attack detection. The performance of the proposed framework is verified using a smart city dataset collected from a smart water plant. The results show the effectiveness of the proposed framework in detecting DDoS attacks.
引用
收藏
页数:5
相关论文
共 15 条
  • [1] Improved computation of beliefs based on confusion matrix for combining multiple classifiers
    Chen, L
    Tang, HL
    [J]. ELECTRONICS LETTERS, 2004, 40 (04) : 238 - 239
  • [2] Elsaeidy A., 2017, SMART CITY CYBER SEC
  • [3] Network anomaly detection with the restricted Boltzmann machine
    Fiore, Ugo
    Palmieri, Francesco
    Castiglione, Aniello
    De Santis, Alfredo
    [J]. NEUROCOMPUTING, 2013, 122 : 13 - 23
  • [4] Hinton G. E., 2012, Momentum, P599, DOI DOI 10.1007/978-3-642-35289-832
  • [5] Hurst W., 2017, INT J ADV SECUR, V10, P114
  • [6] Data clustering: 50 years beyond K-means
    Jain, Anil K.
    [J]. PATTERN RECOGNITION LETTERS, 2010, 31 (08) : 651 - 666
  • [7] Javaid A., 2016, P 9 EAI INT C BIOINS, V3, P2, DOI [DOI 10.4108/EAI.3-12-2015.2262516, 10.4108/eai.3-12-2015.2262516]
  • [8] Lau F, 2000, IEEE SYS MAN CYBERN, P2275, DOI 10.1109/ICSMC.2000.886455
  • [9] Smart water grid: the future water management platform
    Lee, Seung Won
    Sarp, Sarper
    Jeon, Dong Jin
    Kim, Joon Ha
    [J]. DESALINATION AND WATER TREATMENT, 2015, 55 (02) : 339 - 346
  • [10] Optimal Power Allocation Method and Outage Probability Analysis in AP-Assisted Inter-Vehicular Communications
    Li, Zhaoxun
    Hu, Hanying
    Li, Jing
    Zhao, Yang
    [J]. 2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 5, 2010, : 102 - 106