Towards data security assessments using an IDS security model for cyber-physical smart cities

被引:6
|
作者
Sangaiah, Arun Kumar [1 ,4 ]
Javadpour, Amir [2 ,3 ]
Pinto, Pedro [2 ]
机构
[1] Natl Yunlin Univ Sci & Technol, Int Grad Inst AI, Yunlin, Taiwan
[2] Inst Politecn Viana do Castelo, ADiT Lab, Electrotech & Telecommun Dept, P-4900347 Porto, Portugal
[3] Harbin Inst Technol, Dept Comp Sci & Technol Cyberspace Secur, Shenzhen, Peoples R China
[4] Lebanese Amer Univ, Dept Elect & Comp Engn, Byblos, Lebanon
关键词
Smart operation systems; INTERACT; Smart cities; Intrusion detection system; Multilayer perceptron; KDD99;
D O I
10.1016/j.ins.2023.119530
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Technology has enabled many devices to exchange huge amounts of data and communicate with each other as Edge Intelligence in Smart Cities (EISC), as a result of rapid technological advancements. When dealing with personal data, it is paramount to ensure that it is not disclosed and that there is no disclosure of any confidential information. In recent decades, academics and industry have spent considerable time and energy discussing security and privacy. Other systems, known as intrusion detection systems, are required to breach firewalls, antivirus software, and other security equipment to provide complete system security in smart operation systems. There are three aspects to an intrusion detection system: the intrusion detection method, the architecture, and the intrusion response method. In this study, we combined linear correlation feature selection methods and cross-information. The database used in this article is KDD99. This paper examines applying two feature selection methods in predicting attacks in intrusion detection systems based on INTERACT and A multilayer perceptron (MLP). Since the number of records associated with each attack type differs, one of our suggestions is to continue using data balancing techniques. As a result, the number of records associated with each type of network status becomes closer together. The results in the categories can also be improved using information synthesis methods, such as majority voting.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Towards a Security Cost Model for Cyber-Physical Systems
    Ivkic, Igor
    Mauthe, Andreas
    Tauber, Markus
    [J]. 2019 16TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2019,
  • [2] Cyber-Physical Security of a Smart Grid Infrastructure
    Mo, Yilin
    Kim, Tiffany Hyun-Jin
    Brancik, Kenneth
    Dickinson, Dona
    Lee, Heejo
    Perrig, Adrian
    Sinopoli, Bruno
    [J]. PROCEEDINGS OF THE IEEE, 2012, 100 (01) : 195 - 209
  • [3] Security and Privacy for Smart Cyber-Physical Systems
    Ma, Liran
    Huo, Yan
    Hu, Chunqiang
    Li, Wei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [4] Computational Intelligence in Security of Digital Twins Big Graphic Data in Cyber-physical Systems of Smart Cities
    Lv, Zhihan
    Chen, Dongliang
    Feng, Hailin
    Singh, Amit Kumar
    Wei, Wei
    Lv, Haibin
    [J]. ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS, 2022, 13 (04)
  • [5] Preliminary Studies of the Security of the Cyber-Physical Smart Grids
    Rabelo, Luis
    Ballestas, Andres
    Ibrahim, Bibi
    Valdez, Javier
    [J]. APPLIED INFORMATICS (ICAI 2021), 2021, 1455 : 449 - 461
  • [6] Cyber-Physical Security and Privacy in the Electric Smart Grid
    [J]. 1600, Morgan and Claypool Publishers (09):
  • [7] Intelligent Security Measures for Smart Cyber-Physical Systems
    Shafique, Muhammad
    Khalid, Faiq
    Rehman, Semeen
    [J]. 2018 21ST EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD 2018), 2018, : 280 - 287
  • [8] Guest Editorial Smart Grid Cyber-Physical Security
    Zhang, Yan
    Yau, David
    Zonouz, Saman
    Jin, Dong
    Qiu, Meikang
    Erol-Kantarci, Melike
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (05) : 2409 - 2410
  • [9] Towards an Integrated Model for Safety and Security Requirements of Cyber-Physical Systems
    Brunner, Michael
    Huber, Michael
    Sauerwein, Clemens
    Breu, Ruth
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2017, : 334 - 340
  • [10] Cyber Security Risks in Emerging South African Smart Cities: Towards a Cyber Security Framework
    Cornelius, Francois Paul
    Rensburg, Shandre Kim Jansen van
    Kader, Sarika
    [J]. PERSPECTIVES ON GLOBAL DEVELOPMENT AND TECHNOLOGY, 2023, 22 (1-2) : 107 - 141