Cyberattacks Detection in IoT-Based Smart City Applications Using Machine Learning Techniques

In recent years, the widespread deployment of the Internet of Things (IoT) applications has contributed to the development of smart cities. A smart city utilizes IoT-enabled technologies, communications and applications to maximize operational efficiency and enhance both the service providers’ quality of services and people’s wellbeing and quality of life. With the growth of smart city networks, however, comes the increased risk of cybersecurity threats and attacks. IoT devices within a smart city network are connected to sensors linked to large cloud servers and are exposed to malicious attacks and threats. Thus, it is important to devise approaches to prevent such attacks and protect IoT devices from failure. In this paper, we explore an attack and anomaly detection technique based on machine learning algorithms (LR, SVM, DT, RF, ANN and KNN) to defend against and mitigate IoT cybersecurity threats in a smart city. Contrary to existing works that have focused on single classifiers, we also explore ensemble methods such as bagging, boosting and stacking to enhance the performance of the detection system. Additionally, we consider an integration of feature selection, cross-validation and multi-class classification for the discussed domain, which has not been well considered in the existing literature. Experimental results with the recent attack dataset demonstrate that the proposed technique can effectively identify cyberattacks and the stacking ensemble model outperforms comparable models in terms of accuracy, precision, recall and F1-Score, implying the promise of stacking in this domain.

[1]  Yogesh Kumar Dwivedi,et al.  Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework , 2020, Information systems frontiers : a journal of research and innovation.

[2]  David H. Wolpert,et al.  Stacked generalization , 1992, Neural Networks.

[3]  Laurence T. Yang,et al.  Defending ON–OFF Attacks Using Light Probing Messages in Smart Sensors for Industrial Communication Systems , 2018, IEEE Transactions on Industrial Informatics.

[4]  Andreas Spanias,et al.  A brief survey of machine learning methods and their sensor and IoT applications , 2017, 2017 8th International Conference on Information, Intelligence, Systems & Applications (IISA).

[5]  Georgios Kambourakis,et al.  Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset , 2016, IEEE Communications Surveys & Tutorials.

[6]  Ali Alqazzaz,et al.  AD-IoT: Anomaly Detection of IoT Cyberattacks in Smart City Using Machine Learning , 2019, 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC).

[7]  Tommaso Melodia,et al.  Securing the Internet of Things: New Perspectives and Research Challenges , 2018, ArXiv.

[8]  Marc-Oliver Pahl,et al.  All Eyes on You: Distributed Multi-Dimensional IoT Microservice Anomaly Detection , 2018, 2018 14th International Conference on Network and Service Management (CNSM).

[9]  David A. Landgrebe,et al.  A survey of decision tree classifier methodology , 1991, IEEE Trans. Syst. Man Cybern..

[10]  M. A. Jabbar,et al.  Cluster Based Ensemble Classification for Intrusion Detection System , 2017, ICMLC.

[11]  Amit P. Sheth,et al.  Machine learning for Internet of Things data analysis: A survey , 2017, Digit. Commun. Networks.

[12]  M. M. A. Hashem,et al.  Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches , 2019, Internet Things.

[13]  Georges Kaddoum,et al.  Securing Fog-to-Things Environment Using Intrusion Detection System Based On Ensemble Learning , 2019, 2019 IEEE Wireless Communications and Networking Conference (WCNC).

[14]  Azzedine Boukerche,et al.  Sensing, communication and security planes: A new challenge for a smart city system design , 2018, Comput. Networks.

[15]  Tan Yigitcanlar,et al.  The Sustainability of Artificial Intelligence: An Urbanistic Viewpoint from the Lens of Smart and Sustainable Cities , 2020, Sustainability.

[16]  Ravindra C. Thool,et al.  Intrusion Detection System Using Bagging Ensemble Method of Machine Learning , 2015, 2015 International Conference on Computing Communication Control and Automation.

[17]  Youssef B. Mahdy,et al.  Behavior-based features model for malware detection , 2016, Journal of Computer Virology and Hacking Techniques.

[18]  Sara Paiva,et al.  Enabling technologies and sustainable smart cities , 2020, Sustainable Cities and Society.

[19]  Jill Slay,et al.  The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set , 2016, Inf. Secur. J. A Glob. Perspect..

[20]  Leo Breiman,et al.  Bagging Predictors , 1996, Machine Learning.

[21]  Sean Carlisto de Alvarenga,et al.  A survey of intrusion detection in Internet of Things , 2017, J. Netw. Comput. Appl..

[22]  Philip S. Yu,et al.  A Framework for Clustering Evolving Data Streams , 2003, VLDB.

[23]  Ali A. Ghorbani,et al.  Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization , 2018, ICISSP.

[24]  Elena Sitnikova,et al.  Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset , 2018, Future Gener. Comput. Syst..

[25]  Joarder Kamruzzaman,et al.  Robust Malware Defense in Industrial IoT Applications Using Machine Learning With Selective Adversarial Samples , 2020, IEEE Transactions on Industry Applications.

[26]  Yoav Freund,et al.  Experiments with a New Boosting Algorithm , 1996, ICML.

[27]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[28]  Joarder Kamruzzaman,et al.  The Co-Evolution of Cloud and IoT Applications , 2019, Advances in Wireless Technologies and Telecommunication.

[29]  A. K. M. Najmul Islam,et al.  Toward a Sustainable Cybersecurity Ecosystem , 2020, Comput..

[30]  Yi Zhou,et al.  Understanding the Mirai Botnet , 2017, USENIX Security Symposium.

[31]  Sebastian Raschka,et al.  Python Machine Learning , 2015 .

[32]  Federico Cugurullo Exposing smart cities and eco-cities: Frankenstein urbanism and the sustainability challenges of the experimental city , 2017 .

[33]  Alan Davy,et al.  Resource aware placement of IoT application modules in Fog-Cloud Computing Paradigm , 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM).

[34]  Ernest Foo,et al.  Improving performance of intrusion detection system using ensemble methods and feature selection , 2018, ACSW.

[35]  Michal Choras,et al.  A scalable distributed machine learning approach for attack detection in edge computing environments , 2018, J. Parallel Distributed Comput..

[36]  Hongming Zhou,et al.  Extreme Learning Machine for Regression and Multiclass Classification , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[37]  Rajkumar Buyya,et al.  HealthFog: An Ensemble Deep Learning based Smart Healthcare System for Automatic Diagnosis of Heart Diseases in Integrated IoT and Fog Computing Environments , 2019, Future Gener. Comput. Syst..

[38]  Md. Rafiqul Islam,et al.  Hybrids of support vector machine wrapper and filter based framework for malware detection , 2016, Future Gener. Comput. Syst..

[39]  Marc-Oliver Pahl,et al.  Graph-based IoT microservice security , 2018, NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium.

[40]  M. Yar,et al.  Book Review: Cybercrime and Society , 2006 .

[41]  Ragib Hasan,et al.  Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things , 2015, 2015 IEEE World Congress on Services.

[42]  Genya Ishigaki,et al.  Fog Computing: Towards Minimizing Delay in the Internet of Things , 2017, 2017 IEEE International Conference on Edge Computing (EDGE).

[43]  Saharon Rosset,et al.  KDD-cup 99: knowledge discovery in a charitable organization's donor database , 2000, SKDD.

[44]  Naveen K. Chilamkurti,et al.  Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..

[45]  Nour Moustafa,et al.  Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic , 2017 .

[46]  Oleksandr Makeyev,et al.  Neural network with ensembles , 2010, The 2010 International Joint Conference on Neural Networks (IJCNN).

[47]  Joarder Kamruzzaman,et al.  A novel Ensemble of Hybrid Intrusion Detection System for Detecting Internet of Things Attacks , 2019, Electronics.

[48]  Amit Kumar Dewangan,et al.  An Ensemble Model for Classification of Attacks with Feature Selection based on KDD99 and NSL-KDD Data Set , 2014 .

[49]  Xin-She Yang,et al.  A New Metaheuristic Bat-Inspired Algorithm , 2010, NICSO.

[50]  Yaser Jararweh,et al.  Trustworthy and sustainable smart city services at the edge , 2020 .

[51]  Mousa Al-Akhras,et al.  WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks , 2016, J. Sensors.

[52]  Faisal Muhammad Shah,et al.  An ensemble framework of anomaly detection using hybridized feature selection approach (HFSA) , 2015, 2015 SAI Intelligent Systems Conference (IntelliSys).

[53]  Federico Cugurullo Urban Artificial Intelligence: From Automation to Autonomy in the Smart City , 2020, Frontiers in Sustainable Cities.

[54]  Naveen K. Chilamkurti,et al.  Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing , 2018, IEEE Communications Magazine.

[55]  K. P. Soman,et al.  Deep Learning Approach for Intelligent Intrusion Detection System , 2019, IEEE Access.

[56]  J. Ross Quinlan,et al.  Induction of Decision Trees , 1986, Machine Learning.

[57]  Ali Dehghantanha,et al.  A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks , 2019, IEEE Transactions on Emerging Topics in Computing.

[58]  P. Bahr,et al.  Sampling: Theory and Applications , 2020, Applied and Numerical Harmonic Analysis.