Cyber security in smart cities: A review of deep learning-based applications and case studies

Abstract On the one hand, smart cities have brought about various changes, aiming to revolutionize people's lives. On the other hand, while smart cities bring better life experiences and great convenience to people's lives, there are more hidden dangers of cyber security, including information leakage and malicious cyber attacks. The current cyber security development cannot keep up with the eager adoption of global smart city technologies so correct design based on deep learning methods is essential to protect smart city cyber. This paper summarizes the knowledge and interpretation of Smart Cities (SC), Cyber Security (CS), and Deep Learning (DL) concepts as well as discussed existing related work on IoT security in smart cities. Specifically, we briefly reviewed several deep learning models, including Boltzmann machines, restricted Boltzmann machines, deep belief networks, recurrent neural networks, convolutional neural networks, and generative adversarial networks. Then we introduced cyber security applications and use cases based on deep learning technology in smart cities. Finally, we describe the future development trend of smart city cyber security.

[1]  Mashrur Chowdhury,et al.  Long Short-Term Memory Neural Network-Based Attack Detection Model for In-Vehicle Network Security , 2020, IEEE Sensors Letters.

[2]  Mesut Uğurlu,et al.  A Survey on Deep Learning Based Intrusion Detection System , 2019, 2019 4th International Conference on Computer Science and Engineering (UBMK).

[3]  Manoj Kumar Singh,et al.  Moving towards smart cities: Solutions that lead to the Smart City Transformation Framework , 2020 .

[4]  Zewen Li,et al.  A Survey of Convolutional Neural Networks: Analysis, Applications, and Prospects , 2020, IEEE Transactions on Neural Networks and Learning Systems.

[5]  Weishi Li,et al.  An Internet of Vehicles Intrusion Detection System Based on a Convolutional Neural Network , 2019, 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom).

[6]  Jingyu Wang,et al.  Intelligent VNFs Selection Based on Traffic Identification in Vehicular Cloud Networks , 2019, IEEE Transactions on Vehicular Technology.

[7]  Chaham Alalouch,et al.  Towards smart sustainable cities: A review of the role digital citizen participation could play in advancing social sustainability , 2019, Sustainable Cities and Society.

[8]  Kaushik Roy,et al.  Towards spike-based machine intelligence with neuromorphic computing , 2019, Nature.

[9]  Claudio Del Pero,et al.  Smart buildings features and key performance indicators: A review , 2020 .

[10]  Jin Wang,et al.  Smart energy systems: A critical review on design and operation optimization , 2020, Sustainable Cities and Society.

[11]  M. Efthymiopoulos Cyber-security in smart cities: the case of Dubai , 2016 .

[12]  Jong Hyuk Park,et al.  A deep learning-based IoT-oriented infrastructure for secure smart City , 2020 .

[13]  Naveen K. Chilamkurti,et al.  Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..

[14]  Md Zahangir Alom,et al.  Network intrusion detection for cyber security using unsupervised deep learning approaches , 2017, 2017 IEEE National Aerospace and Electronics Conference (NAECON).

[15]  Nirwan Ansari,et al.  Cyber Security Game for Intelligent Transportation Systems , 2019, IEEE Network.

[16]  Abdul Razaque,et al.  Deep recurrent neural network for IoT intrusion detection system , 2020, Simul. Model. Pract. Theory.

[17]  A. Rasekh,et al.  Smart water networks and cyber security , 2016 .

[18]  Xusheng Xiao,et al.  An Image-Inspired and CNN-Based Android Malware Detection Approach , 2019, 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE).

[19]  João Paulo Papa,et al.  Deep Boltzmann machines for robust fingerprint spoofing attack detection , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).

[20]  Mark Stamp,et al.  Convolutional neural networks for image spam detection , 2020, Inf. Secur. J. A Glob. Perspect..

[21]  Andreas Hotho,et al.  Flow-based Network Traffic Generation using Generative Adversarial Networks , 2018, Comput. Secur..

[22]  Yu Zhang,et al.  Very deep convolutional networks for end-to-end speech recognition , 2016, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[23]  Mahdi Jafari Siavoshani,et al.  Deep packet: a novel approach for encrypted traffic classification using deep learning , 2017, Soft Computing.

[24]  Sung-Bae Cho,et al.  Malware Detection Using Deep Transferred Generative Adversarial Networks , 2017, ICONIP.

[25]  Lior Rokach,et al.  Dynamic Malware Analysis in the Modern Era—A State of the Art Survey , 2019, ACM Comput. Surv..

[26]  Daniel Gibert,et al.  Using convolutional neural networks for classification of malware represented as images , 2018, Journal of Computer Virology and Hacking Techniques.

[27]  Ying-Chang Liang,et al.  Federated Learning in Mobile Edge Networks: A Comprehensive Survey , 2020, IEEE Communications Surveys & Tutorials.

[28]  D. Gasper,et al.  Human security thinking in practice: ‘personal security’, ‘citizen security' and comprehensive mappings , 2015 .

[29]  Mingguo Zhao,et al.  A system hierarchy for brain-inspired computing , 2020, Nature.

[30]  Isra Al-Turaiki,et al.  Mitigating Email Phishing Attacks using Convolutional Neural Networks , 2020, 2020 3rd International Conference on Computer Applications & Information Security (ICCAIS).

[31]  Yu Zhang,et al.  Automatic Mobile Application Traffic Identification by Convolutional Neural Networks , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[32]  Ali A. Ghorbani,et al.  Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization , 2018, ICISSP.

[33]  Xiran Zhang,et al.  Network intrusion detection using generative adversarial networks. , 2020 .

[34]  Tarek M. Taha,et al.  Network intrusion detection for cyber security on neuromorphic computing system , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).

[35]  Jürgen Schmidhuber,et al.  Long Short-Term Memory , 1997, Neural Computation.

[36]  Ji Feng,et al.  Deep forest , 2017, IJCAI.

[37]  V. Mojtahed Big Data for Fraud Detection , 2019, Computational Social Sciences.

[38]  Vadlamani Ravi,et al.  WiP: Generative Adversarial Network for Oversampling Data in Credit Card Fraud Detection , 2019, ICISS.

[39]  King Lun Choy,et al.  Design and application of Internet of things-based warehouse management system for smart logistics , 2018, Int. J. Prod. Res..

[40]  Daniel S. Berman,et al.  A Survey of Deep Learning Methods for Cyber Security , 2019, Inf..

[41]  Sagar Sabhadiya,et al.  Android Malware Detection using Deep Learning , 2019, 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI).

[42]  Yoshua Bengio,et al.  Generative Adversarial Nets , 2014, NIPS.

[43]  Florian Skopik,et al.  A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing , 2016, Comput. Secur..

[44]  Yunyun Xie,et al.  A Review of Cyber-Attack Methods in Cyber-Physical Power System , 2019, 2019 IEEE 8th International Conference on Advanced Power System Automation and Protection (APAP).

[45]  Hossam Faris,et al.  Fraud Detection Model Based on Multi-Verse Features Extraction Approach for Smart City Applications , 2019, Smart Cities Cybersecurity and Privacy.

[46]  Xiaojiang Du,et al.  Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city , 2020, Future Gener. Comput. Syst..

[47]  Andreas Kamilaris,et al.  Deep learning in agriculture: A survey , 2018, Comput. Electron. Agric..

[48]  Yannis Charalabidis,et al.  IoT and AI for Smart Government: A Research Agenda , 2019, Gov. Inf. Q..

[49]  Gautam Srivastava,et al.  Ensemble sparse representation-based cyber threat hunting for security of smart cities , 2020, Comput. Electr. Eng..

[50]  Mansour Ahmadi,et al.  Microsoft Malware Classification Challenge , 2018, ArXiv.

[51]  K. P. Soman,et al.  Deep Learning Approach for Intelligent Intrusion Detection System , 2019, IEEE Access.

[52]  Bin Deng,et al.  Scalable Digital Neuromorphic Architecture for Large-Scale Biophysically Meaningful Neural Network With Multi-Compartment Neurons , 2020, IEEE Transactions on Neural Networks and Learning Systems.

[53]  Yang Yi,et al.  Enabling Sustainable Cyber Physical Security Systems through Neuromorphic Computing , 2018, IEEE Transactions on Sustainable Computing.

[54]  Xinming Ou,et al.  Cyber-physical-social interdependencies and organizational resilience: A review of water, transportation, and cyber infrastructure systems and processes , 2020 .

[55]  Gian Luca Marcialis,et al.  LivDet 2013 Fingerprint Liveness Detection Competition 2013 , 2013, 2013 International Conference on Biometrics (ICB).

[56]  Xiaosong Zhang,et al.  An Improved Convolutional Neural Network Model for Intrusion Detection in Networks , 2019, 2019 Cybersecurity and Cyberforensics Conference (CCC).

[57]  Danning Zhang,et al.  Assessment of coordinated development between social economy and ecological environment: Case study of resource-based cities in Northeastern China , 2020 .

[58]  Xiaobo Zhang,et al.  A Model Based on Convolutional Neural Network for Online Transaction Fraud Detection , 2018, Secur. Commun. Networks.

[59]  Xue-wen Chen,et al.  Big Data Deep Learning: Challenges and Perspectives , 2014, IEEE Access.

[60]  Mounir Ghogho,et al.  Deep Recurrent Neural Network for Intrusion Detection in SDN-based Networks , 2018, 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft).

[61]  Rong Wang,et al.  Real-Time Network Intrusion Detection System Based on Deep Learning , 2019, 2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS).

[62]  Abdelouahid Derhab,et al.  Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues , 2020, Knowl. Based Syst..

[63]  R. Balasubramanian,et al.  Personal exposure to airborne particles in transport micro-environments and potential health impacts: A tale of two cities , 2020 .

[64]  A. Taufiq Asyhari,et al.  Scalable machine learning-based intrusion detection system for IoT-enabled smart cities , 2020 .

[65]  Muhammad Tariq,et al.  Secure and resilient demand side management engine using machine learning for IoT-enabled smart grid , 2020 .

[66]  Zsolt Szabó Cybersecurity Issues in Industrial Control Systems , 2018, 2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY).

[67]  Mohamed Amine Ferrag,et al.  Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study , 2020, J. Inf. Secur. Appl..

[68]  P. S. Sastry,et al.  An Overview of Restricted Boltzmann Machines , 2019, Journal of the Indian Institute of Science.

[69]  Rashmi Umesh Arora,et al.  Financial sector development and smart cities: The Indian case , 2018, Sustainable Cities and Society.

[70]  Ali A. Ghorbani,et al.  Toward developing a systematic approach to generate benchmark datasets for intrusion detection , 2012, Comput. Secur..

[71]  Girija Chetty,et al.  Deep Learning Based Spam Detection System , 2019, 2019 International Conference on Machine Learning and Data Engineering (iCMLDE).

[72]  Dong Liu,et al.  Byte-level malware classification based on markov images and deep learning , 2020, Comput. Secur..

[73]  K. P. Soman,et al.  Detecting Android malware using Long Short-term Memory (LSTM) , 2018, J. Intell. Fuzzy Syst..

[74]  Zhi-Ting Zhu,et al.  A research framework of smart education , 2016, Smart Learning Environments.

[75]  Justine Bedford,et al.  Organizational Vulnerability to Insider Threat - What Do Australian Experts Say? , 2016, HCI.

[76]  Burak Kantarci,et al.  A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities , 2019, Sustainable Cities and Society.

[77]  Nour Moustafa,et al.  UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).

[78]  M. A. Novotny,et al.  An evaluation of the performance of Restricted Boltzmann Machines as a model for anomaly network intrusion detection , 2018, Comput. Networks.

[79]  Hui Han,et al.  Borderline-SMOTE: A New Over-Sampling Method in Imbalanced Data Sets Learning , 2005, ICIC.

[80]  Rashid Mehmood,et al.  A Fog-Augmented Machine Learning based SMS Spam Detection and Classification System , 2020, 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC).

[81]  Oluwarotimi Williams Samuel,et al.  Adaptive context aware decision computing paradigm for intensive health care delivery in smart cities—A case analysis , 2017, Sustainable Cities and Society.

[82]  Yu Xue,et al.  Generative adversarial network based telecom fraud detection at the receiving bank , 2018, Neural Networks.

[83]  Konrad Rieck,et al.  DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.

[84]  Kuan-Ching Li,et al.  An intrusion detection approach based on improved deep belief network , 2020, Applied Intelligence.

[85]  Wei-Fa Zheng,et al.  Intrusion Detection Based on Convolutional Neural Network , 2020, 2020 International Conference on Computer Engineering and Application (ICCEA).

[86]  Avi Ostfeld,et al.  Protecting Water Infrastructure From Cyber and Physical Threats: Using Multimodal Data Fusion and Adaptive Deep Learning to Monitor Critical Systems , 2019, IEEE Signal Processing Magazine.

[87]  Ali A. Ghorbani,et al.  Characterization of Tor Traffic using Time based Features , 2017, ICISSP.

[88]  Razvan Pascanu,et al.  On the difficulty of training recurrent neural networks , 2012, ICML.

[89]  Shymalagowri Selvaganapathy,et al.  Deep belief network based detection and categorization of malicious URLs , 2018, Inf. Secur. J. A Glob. Perspect..

[90]  Ping Wang,et al.  Using convolutional neural networks to network intrusion detection for cyber threats , 2018, 2018 IEEE International Conference on Applied System Invention (ICASI).

[91]  Geoffrey E. Hinton,et al.  Deep Learning , 2015, Nature.

[92]  Jiankun Hu,et al.  Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling , 2017, J. Netw. Comput. Appl..

[93]  Alireza Jolfaei,et al.  Ransomware Triage Using Deep Learning: Twitter as a Case Study , 2019, 2019 Cybersecurity and Cyberforensics Conference (CCC).

[94]  Abdelouahid Derhab,et al.  MalDozer: Automatic framework for android malware detection using deep learning , 2018, Digit. Investig..

[95]  Yee Whye Teh,et al.  A Fast Learning Algorithm for Deep Belief Nets , 2006, Neural Computation.

[96]  Yang Wang,et al.  Evaluating Scalability Bottlenecks by Workload Extrapolation , 2018, 2018 IEEE 26th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS).

[97]  Arun Kumar Sangaiah,et al.  A real-time and ubiquitous network attack detection based on deep belief network and support vector machine , 2020, IEEE/CAA Journal of Automatica Sinica.

[98]  Sungroh Yoon,et al.  How Generative Adversarial Networks and Their Variants Work , 2017, ACM Comput. Surv..

[99]  Catherine D. Schuman,et al.  A Survey of Neuromorphic Computing and Neural Networks in Hardware , 2017, ArXiv.