Affiliation:
1. Department of Computer Science, College of Computer, Qassim University, Buraydah 51452, Saudi Arabia
Abstract
Internet of Things technology opens the horizon to a broader scope of intelligent applications in smart cities. However, the massive amount of traffic exchanged among devices may cause security risks, especially when devices are compromised or vulnerable to cyberattack. An intrusion detection system is the most powerful tool to detect unauthorized attempts to access smart systems. It identifies malicious and benign traffic by analyzing network traffic. In most cases, only a fraction of network traffic can be considered malicious. As a result, it is difficult for an intrusion detection system to detect attacks at high detection rates while maintaining a low false alarm rate. This work proposes an integrated framework to detect suspicious traffic to address secure data communication in smart cities. This paper presents an approach to developing an intrusion detection system to detect various attack types. It can be carried out by implementing a Principal Component Analysis method that eliminates redundancy and reduces system dimensionality. Furthermore, the proposed model shows how to improve intrusion detection system performance by implementing an ensemble model.
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference31 articles.
1. Big data privacy preserving in multi-access edge computing for heterogeneous internet of things;Du;IEEE Commun. Mag.,2018
2. Dynamic ensemble classification for credit scoring using soft probability;Feng;Appl. Soft Comput.,2018
3. Decision tree techniques applied on NSL-KDD data and its comparison with various feature selection techniques;Hota;Adv. Comput. Netw. Inform.,2014
4. A GA-LR wrapper approach for feature selection in network intrusion detection;Khammassi;Comput. Secur.,2017
5. Extremely randomized trees;Geurts;Mach. Learn.,2006
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献