Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Developing an Integrated Framework for Securing Internet of Things traffics in Smart Cities Using Machine Learning Techniques

Version 1 : Received: 12 July 2023 / Approved: 12 July 2023 / Online: 13 July 2023 (12:31:56 CEST)

A peer-reviewed article of this Preprint also exists.

Alhanaya, M.; Al-Shqeerat, K. Developing an Integrated Framework for Securing Internet of Things Traffic in Smart Cities Using Machine Learning Techniques. Appl. Sci. 2023, 13, 9476. Alhanaya, M.; Al-Shqeerat, K. Developing an Integrated Framework for Securing Internet of Things Traffic in Smart Cities Using Machine Learning Techniques. Appl. Sci. 2023, 13, 9476.

Abstract

The Internet of Things technology opens the horizon for a broader scope of intelligent applications in smart cities. However, the massive amount of traffic exchanged among devices may cause security risks, significantly when devices are compromised or vulnerable to cyber-attack. An intrusion detection system is the most powerful tool to detect unauthorized attempts to access smart systems. It identifies malicious and benign traffic by analyzing network traffic. In most cases, only a fraction of network traffic can be considered malicious. As a result, it is difficult for an intrusion detection system to detect attacks at high detection rates while maintaining a low false alarm rate. This work proposes an integrated framework to detect suspicious traffic to address secure data communication in smart cities. This paper presents an approach to developing an intrusion detection system to detect various attack types. It can be done by implementing a Principal Component Analysis method that eliminates redundancy and reduces system dimensionality. Furthermore, the proposed model shows how to improve intrusion detection system performance by implementing an ensemble model.

Keywords

Internet of Things; Machine learning; Intrusion detection system; Ensemble classifier; Principal Component Analysis

Subject

Computer Science and Mathematics, Computer Science

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.