Knowledge Agora



Similar Articles

Title Dynamic Adaptation Attack Detection Model for a Distributed Multi-Access Edge Computing Smart City
ID_Doc 38290
Authors Alotaibi, NS; Ahmed, HI; Kamel, SOM
Title Dynamic Adaptation Attack Detection Model for a Distributed Multi-Access Edge Computing Smart City
Year 2023
Published Sensors, 23, 16
Abstract The internet of things (IoT) technology presents an intelligent way to improve our lives and contributes to many fields such as industry, communications, agriculture, etc. Unfortunately, IoT networks are exposed to many attacks that may destroy the entire network and consume network resources. This paper aims to propose intelligent process automation and an auto-configured intelligent automation detection model (IADM) to detect and prevent malicious network traffic and behaviors/events at distributed multi-access edge computing in an IoT-based smart city. The proposed model consists of two phases. The first phase relies on the intelligent process automation (IPA) technique and contains five modules named, specifically, dataset collection and pre-processing module, intelligent automation detection module, analysis module, detection rules and action module, and database module. In the first phase, each module composes an intelligent connecting module to give feedback reports about each module and send information to the next modules. Therefore, any change in each process can be easily detected and labeled as an intrusion. The intelligent connection module (ICM) may reduce the search time, increase the speed, and increase the security level. The second phase is the dynamic adaptation of the attack detection model based on reinforcement one-shot learning. The first phase is based on a multi-classification technique using Random Forest Trees (RFT), k-Nearest Neighbor (K-NN), J48, AdaBoost, and Bagging. The second phase can learn the new changed behaviors based on reinforced learning to detect zero-day attacks and malicious events in IoT-based smart cities. The experiments are implemented using a UNSW-NB 15 dataset. The proposed model achieves high accuracy rates using RFT, K-NN, and AdaBoost of approximately 98.8%. It is noted that the accuracy rate of the J48 classifier achieves 85.51%, which is lower than the others. Subsequently, the accuracy rates of AdaBoost and Bagging based on J48 are 98.9% and 91.41%, respectively. Additionally, the error rates of RFT, K-NN, and AdaBoost are very low. Similarly, the proposed model achieves high precision, recall, and F1-measure high rates using RFT, K-NN, AdaBoost, and Bagging. The second phase depends on creating an auto-adaptive model through the dynamic adaptation of the attack detection model based on reinforcement one-shot learning using a small number of instances to conserve the memory of any smart device in an IoT network. The proposed auto-adaptive model may reduce false rates of reporting by the intrusion detection system (IDS). It can detect any change in the behaviors of smart devices quickly and easily. The IADM can improve the performance rates for IDS by maintaining the memory consumption, time consumption, and speed of the detection process.
PDF https://www.mdpi.com/1424-8220/23/16/7135/pdf?version=1691827752

Similar Articles

ID Score Article
45810 Rashid, MM; Kamruzzaman, J; Hassan, MM; Imam, T; Gordon, S Cyberattacks Detection in IoT-Based Smart City Applications Using Machine Learning Techniques(2020)International Journal Of Environmental Research And Public Health, 17, 24
42628 Ali, H; Elzeki, OM; Elmougy, S Smart Attacks Learning Machine Advisor System for Protecting Smart Cities from Smart Threats(2022)Applied Sciences-Basel, 12, 13
37333 Almasri, MM; Alajlan, AM A novel-cascaded ANFIS-based deep reinforcement learning for the detection of attack in cloud IoT-based smart city applications(2023)Concurrency And Computation-Practice & Experience, 35.0, 22
37068 Aljamal, M; Mughaid, A; Al Shboul, B; Bani-Salameh, H; Alzubi, S; Abualigah, L Optimizing risk mitigation: A simulation-based model for detecting fake IoT clients in smart city environments(2024)
37472 Shafiq, M; Tian, ZH; Sun, YB; Du, XJ; Guizani, M Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city(2020)
38618 Shitharth, S; Alshareef, AM; Khadidos, AO; Alyoubi, KH; Khadidos, AO; Uddin, M A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security(2023)Scientific Reports, 13, 1
Scroll