Smart Attacks Learning Machine Advisor System for Protecting Smart Cities from Smart Threats
Abstract
:1. Introduction
- Smart Infrastructure, including city facilities with embedded smart technology, e.g., buildings, streets, energy, and water networks, smart grids, and sensors, etc.
- Smart individuals, including strategies for motivating individuals to be more creative and receptive to new ideas.
- Smart Mobility: Transportation networks with increased embedded systems for genuine management and surveillance.
- Smart Services: Using technology and ICT to provide services throughout the city in education, safety, surveillance, health, and tourism, etc.
- Smart Governance: The formation of smart governments in metropolitan areas, facilitated by technology service engagement, delivery, and participation.
- Smart Economy: Using technological advancement to help companies grow, create jobs, and expand their communities.
- Smart Environment: Using information and communication technologies, and innovation to safeguard and to manage resources (emission control, pollution monitoring sensors, systems for waste management, and recycling, etc.).
- Smart Living: Urban development that increases sustainability and life quality.
- Layer (1) Natural Environment: This refers to all of the natural characteristics in the city’s location (sea, rivers, forests, landscape, and lakes, etc.).
- Layer (2) Hard Infrastructure (non-ICT-based): All of the recognized urban characteristics are included in this layer as a result of human activity, and are required for city functioning (water-energy-waste, roads, buildings, bridges, and utilities, etc.)
- Layer (3) Hard Infrastructure (ICT-based): this refers to all smart gear that is used to provide SSC services (servers, supercomputers, networks, sensors, and data centers, etc.)
- Layer (4) Services: A plethora of intelligent city services, categorized according to worldwide urban key performance indicators and grouped into the six aspects of smart cities.
- Layer (5) Soft Infrastructure: the endpoint that consumes the services.
- Developing a multi-level hybrid system capable of detecting intrusions based on six-flow characteristics that a standard Software-Defined Networking (SDN) controller can readily collect.
- Grouping multi-level homogenous classifiers hierarchically based on Machine Learning.
- Evaluating the suggested system’s efficacy using standard datasets (NSL-KDD, KDDCUP99) that contain a collection of special attacks not included in the training set.
- Gains in accuracy are up to 95% compared to well-known state-of-the-art supervised Machine Learning methods employing similar datasets and flow-based features.
2. Related Work
3. Smart City
- Ensure everyone has access to affordable, safe, and appropriate housing and services, and improve slums.
- Ensure everyone has access to sustainable, accessible, cheap, and safe transportation systems, focusing on road safety and vulnerable populations such as the elderly, persons with disabilities, children, and women.
- All nations should be able to design and manage human settlements in a participatory, integrated, and sustainable manner.
- Enhance global efforts to conserve and to protect the world’s heritage.
- Assist LDCs in creating sustainable and resilient structures with local resources, including financial and technical assistance.
- Smart Mobility includes integration with ICT, providing clean and non-motorized options.
- Smart People: This includes a society that encourages creativity, inclusion, and smart education.
- Smart Living: This is achieved by providing a healthy, safe, and happy life.
- Smart Economy: This is achieved by encouraging innovation, entrepreneurship, productivity, and interconnection.
- Smart Government: The government should have a transparent policy, open data, and provide e-governance.
- Smart Environment: This includes environments that have green buildings, energy, and planning.
- Sustainability: The ability to help a city reach ecological balance while maintaining and operating the city.
- Smartness: Aspirations to improve the city’s citizens’ environmental, economic, and social situations.
- Quality of life: Nowadays, we can assert that an urban citizen’s financial and emotional well-being reflects an increase in their quality of life, with citizens catalyzing urban growth; these solutions seek to enhance educational opportunities, housing quality, health conditions, and social cohesion.
- Urbanization: Distinctive urbanism is centered on economic, technical, infrastructural, and governance elements of the transition from a rural to an urban environment.
4. Classification
- Naïve Bayesian
- Support Vector Machines (SVMs)
- Artificial Neural Networks (ANN)
- Ensemble Approach
- Decision Tree (DT)
Model | Advantages | Disadvantage |
---|---|---|
Ensemble approach | • Enhances precision and stability. • Reduced variance, contributing to the avoidance of overfitting problems. | • Complexity of computation. • Difficult to interpret if the model is large. • Requires fine-tuning of various parameters. |
NB Classifier | • It performs well with textual data. • It is simple to build. • It is quick when compared to other methods. | • A fundamental assumption regarding the data distribution’s shape. • Due to a lack of data, a frequentist must estimate a probability value for all potential values in the feature space. |
SVM | • SVMs may be used to describe decision boundaries that are not linear. • When linear separation is required, it performs comparably to logistic regression. • SVM is resistant to overfitting concerns. | • A vast number of dimensions contribute to the results’ lack of transparency. • Selecting an effective kernel function is difficult (prone to overfitting/training difficulties). • Memory complexity. |
DT | • Decision trees are a rapid approach for both learning and prediction. • They are well-suited for handling qualitative (categorical) data. • They work best with decision boundaries parallel to the feature axis. | • Problems with diagonal decision boundaries. • Easy to overfit. • Extremely sensitive to tiny data perturbations. • Out-of-sample prediction issues. |
ANN | • Recognize complicated connections between dependent and independent variables with ease. • Capable of dealing with noisy data. | • Local minima. • Overfitting. • The processing of an ANN network is difficult to understand and takes a long time. |
ELM | • Fewer optimization restrictions. • Increased efficiency. • Simple implementation. | Poorly conditioned hidden layer output matrices lead to low robustness. |
5. Research Methodology
5.1. The Proposed System
5.2. ELM
- I.
- Initialize the weights of the inputs I and the offset of the hidden layer at random;
- II.
- Determine the hidden layer H’s output weight; and
- III.
- Calculate the output weight from the hidden layer to the output layer β.
5.3. ELM Hyperparameters
- The number of nodes for our hidden layer, i.e., hiddenSize (L);
- Input weight W; and
- bias ‘b’;
- Activation functions.
- ▪
- Sine Function: It accepts a real number and returns another real value that ranges between 1 and −1.
- ▪
- Hard Limit Function: It is a value-assigning limiting function with a threshold. A value of 0 or 1 is assigned to each neuron location. When it reaches the threshold, it returns 1; otherwise, it returns 0.
- ▪
- Triangular Bias Function: The limit of triangular inclination may function as a neuronal exchange. This limit defines the yield of a layer based on its known data.
- ▪
- Radial Bias Function: It is a function proportional to the distance to the origin.
- ▪
- Sigmoid Function: It’s a ‘S’-shaped activation function with the formula F(x) = 1/1 + exp(−x), with values ranging from 0 to 1.
6. Experimental Results and Discussion
6.1. PC Properties
6.2. Dataset Characteristics
- Probe—Before initiating an attack, the attacker acquires knowledge regarding the various faults in the target system.
- Denial of Service (DoS) attack—Once an attacker tries to use computational resources to increase bandwidth or to overwhelm a device service, legitimate users are barred from accessing it.
- User to root attacks (U2R)—After gaining access to a local target host, an attacker attempts to get super or root permissions on the device.
- Remote to user attacks (R2L)—An attacker tries to get into a victim’s system or network without a legitimate account.
6.3. Performance Measures
6.4. Visualization
7. Comparative Analysis and Discussion
8. Conclusions and Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Gavalas, D.; Nicopolitidis, P.; Kameas, A.; Goumopoulos, C.; Bellavista, P.; Lambrinos, L.; Guo, B. Smart Cities: Recent Trends, Methodologies, and Applications. Wirel. Commun. Mob. Comput. 2017, 2017, 7090963. [Google Scholar] [CrossRef] [Green Version]
- Elzeki, O.; Sarhan, S.; Abdelfatah, M.; Salem, H.; Shams, M. Biomedical Healthcare System for Orthopedic Patients Based on Machine Learning. J. Eng. Appl. Sci. 2021, 16, 616–622. [Google Scholar]
- Anthopoulos, L.G. The Rise of the Smart City. In Understanding Smart Cities: A Tool for Smart Government or an Industrial Trick? Springer: Cham, Switzerland, 2017; pp. 5–45. [Google Scholar]
- ITU-T FG-SCC: Setting the Framework for an ICT Architecture of a Smart Sustainable City. Focus Group Technical Specifications. Available online: http://www.itu.int/en/ITU-T/focusgroups/ssc/Documents/website/web-fg-ssc-0345-r5-ssc_architecture.docx. (accessed on 10 March 2022).
- Nagothu, D.; Xu, R.; Nikouei, S.Y.; Chen, Y. A Microservice-enabled Architecture for Smart Surveillance using Blockchain Technology. In Proceedings of the 2018 IEEE International Smart Cities Conference, ISC2 2018, Kansas City, MO, USA, 16–19 September 2018; pp. 1–4. [Google Scholar] [CrossRef] [Green Version]
- Gao, J.; Chai, S.; Zhang, B.; Xia, Y. Research on Network Intrusion Detection Based on Incremental Extreme Learning Machine and Adaptive Principal Component Analysis. Energies 2019, 12, 1223. [Google Scholar] [CrossRef] [Green Version]
- Markit, I.H. The Internet of Things: A movement, not a market. IHS Markit 2017, 1, 1. [Google Scholar]
- Steinberg, J. Official (ISC)2 Guide to the CISSP-ISSMP CBK; CISSP: Clearwater, FL, USA, 2015. [Google Scholar]
- El-Hasnony, I.M.; Elzeki, O.M.; Alshehri, A.; Salem, H. Multi-Label Active Learning-Based Machine Learning Model for Heart Disease Prediction. Sensors 2022, 22, 1184. [Google Scholar] [CrossRef]
- Jiang, S.; Song, X.; Wang, H.; Han, J.-J.; Li, Q.-H. A clustering-based method for unsupervised intrusion detections. Pattern Recognit. Lett. 2006, 27, 802–810. [Google Scholar] [CrossRef]
- Antonakakis, M.; April, T.; Bailey, M.; Bernhard, M.; Bursztein, E.; Cochran, J.; Durumeric, Z.; Halderman, J.A.; Invernizzi, L.; Kallitsis, M.; et al. Understanding the Mirai Botnet. In Proceedings of the 26th USENIX Security Symposium, Vancouver, BC, Canada, 16–18 August 2017. [Google Scholar]
- Santos, J.; Leroux, P.; Wauters, T.; Volckaert, B.; De Turck, F. Anomaly Detection for Smart City Applications over 5G Low Power Wide Area Networks. In Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS 2018, Taipei, Taiwan, 23–27 April 2018. [Google Scholar]
- Zhang, L.; Wang, X.; Jiang, Y.; Yang, M.; Mak, T.; Singh, A.K. Effectiveness of HT-assisted sinkhole and blackhole denial of service attacks targeting mesh networks-on-chip. J. Syst. Arch. 2018, 89, 84–94. [Google Scholar] [CrossRef] [Green Version]
- Tavallaee, M.; Bagheri, E.; Lu, W.; Ghorbani, A.A. A Detailed Analysis of the KDD CUP 99 Data Set. In Proceedings of the IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2009, Ottawa, ON, Canada, 8–10 July 2009. [Google Scholar]
- Tang, T.A.; Mhamdi, L.; McLernon, D.; Zaidi, S.A.R.; Ghogho, M. Deep Learning Approach for Network Intrusion Detection in Software Defined Networking. In Proceedings of the 2016 International Conference on Wireless Networks and Mobile Communications, WINCOM 2016: Green Communications and Networking, Fez, Morocco, 26–29 October 2016. [Google Scholar]
- Rawat, S.; Srinivasan, A.; Ravi, V.; Ghosh, U. Intrusion detection systems using classical machine learning techniques vs integrated unsupervised feature learning and deep neural network. Internet Technol. Lett. 2022, 5, e232. [Google Scholar] [CrossRef]
- Wang, B.; Sun, Y.; Yuan, C.; Xu, X. LESLA: A Smart Solution for SDN-Enabled MMTC E-Health Monitoring System. In Proceedings of the 8th ACM MobiHoc 2018 Workshop on Pervasive Wireless Healthcare Workshop, Mo-bileHealth 2018, Los Angeles, CA, USA, 25–26 June 2018. [Google Scholar]
- Dey, S.K.; Rahman, M.M.; Uddin, M.R. Detection of Flow Based Anomaly in Openflow Controller: Machine Learning Approach in Software Defined Networking. In Proceedings of the 4th International Conference on Electrical Engineering and Information and Communication Technology, iCEEiCT 2018, Dhaka, Bangladesh, 13–15 September 2018. [Google Scholar]
- Latah, M.; Toker, L. Towards an efficient anomaly-based intrusion detection for software-defined networks. IET Netw. 2018, 7, 453–459. [Google Scholar] [CrossRef] [Green Version]
- Tang, T.A.; Mhamdi, L.; McLernon, D.; Zaidi, S.A.R.; Ghogho, M. Deep Recurrent Neural Network for Intrusion Detection in SDN-Based Networks. In Proceedings of the 2018 4th IEEE Conference on Network Softwarization and Workshops, NetSoft 2018, Montreal, QC, Canada, 25–29 June 2018. [Google Scholar]
- Latah, M.; Toker, L. An efficient flow-based multi-level hybrid intrusion detection system for Software-Defined Networks. CCF Trans. Netw. 2020, 3, 261–271. [Google Scholar] [CrossRef]
- Zheng, D.; Hong, Z.; Wang, N.; Chen, P. An Improved LDA-Based ELM Classification for Intrusion Detection Algorithm in IoT Application. Sensors 2020, 20, 1706. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Al-Yaseen, W.L.; Othman, Z.A.; Nazri, M.Z.A. Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system. Expert Syst. Appl. 2017, 67, 296–303. [Google Scholar] [CrossRef]
- Rani, M. Gagandeep Effective network intrusion detection by addressing class imbalance with deep neural networks multimedia tools and applications. Multimed. Tools Appl. 2022, 81, 8499–8518. [Google Scholar] [CrossRef]
- Imrana, Y.; Xiang, Y.; Ali, L.; Abdul-Rauf, Z. A bidirectional LSTM deep learning approach for intrusion detection. Expert Syst. Appl. 2021, 185, 115524. [Google Scholar] [CrossRef]
- Chen, L.; Gao, S.; Liu, B. An improved density peaks clustering algorithm based on grid screening and mutual neighborhood degree for network anomaly detection. Sci. Rep. 2022, 12, 1409. [Google Scholar] [CrossRef]
- Ramadan, R.A.; Emara, A.-H.; Al-Sarem, M.; Elhamahmy, M. Internet of Drones Intrusion Detection Using Deep Learning. Electronics 2021, 10, 2633. [Google Scholar] [CrossRef]
- Chung, Y.Y.; Wahid, N. A hybrid network intrusion detection system using simplified swarm optimization (SSO). Appl. Soft Comput. 2012, 12, 3014–3022. [Google Scholar] [CrossRef]
- Ambusaidi, M.A.; He, X.; Tan, Z.; Nanda, P.; Lu, L.F.; Nagar, U.T. A Novel Feature Selection Approach for Intrusion Detection Data Classification. In Proceedings of the 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, Beijing, China, 24–26 September 2014. [Google Scholar]
- Khalvati, L.; Keshtgary, M.; Rikhtegar, N. Intrusion Detection based on a Novel Hybrid Learning Approach. J. AI Data Min. 2018, 6, 157–162. [Google Scholar] [CrossRef]
- Mohammadi, S.; Mirvaziri, H.; Ghazizadeh-Ahsaee, M.; Karimipour, H. Cyber intrusion detection by combined feature selection algorithm. J. Inf. Secur. Appl. 2018, 44, 80–88. [Google Scholar] [CrossRef]
- Alazzam, H.; Sharieh, A.; Sabri, K.E. A feature selection algorithm for intrusion detection system based on Pigeon Inspired Optimizer. Expert Syst. Appl. 2020, 148, 113249. [Google Scholar] [CrossRef]
- Jo, J.H.; Sharma, P.K.; Sicato, J.C.S.; Park, J.H. Emerging Technologies for Sustainable Smart City Network Security: Issues, Challenges, and Countermeasures. J. Inf. Process. Syst. 2019, 15, 765–784. [Google Scholar] [CrossRef]
- Xu, J.; Palanisamy, B.; Ludwig, H.; Wang, Q. Zenith: Utility-Aware Resource Allocation for Edge Computing. In Proceedings of the 2017 IEEE 1st International Conference on Edge Computing, EDGE 2017, Honolulu, HI, USA, 25–30 June 2017. [Google Scholar]
- Arasteh, H.; Hosseinnezhad, V.; Loia, V.; Tommasetti, A.; Troisi, O.; Shafie-Khah, M.; Siano, P. Iot-Based Smart Cities: A Survey. In Proceedings of the EEEIC 2016-International Conference on Environment and Electrical Engineering, Florence, Italy, 7–10 June 2016. [Google Scholar]
- Mohanty, S.P.; Choppali, U.; Kougianos, E. Everything you wanted to know about smart cities: The Internet of things is the backbone. IEEE Consum. Electron. Mag. 2016, 5, 60–70. [Google Scholar] [CrossRef]
- Rahman, A.; Asyhari, A.T.; Leong, L.; Satrya, G.; Tao, M.H.; Zolkipli, M. Scalable machine learning-based intrusion detection system for IoT-enabled smart cities. Sustain. Cities Soc. 2020, 61, 102324. [Google Scholar] [CrossRef]
- Namratha, M.; Prajwala, T.R. A Comprehensive Overview of Clustering Algorithms in Pattern Recognition. IOSR J. Comput. Eng. 2012, 4, 23–30. [Google Scholar] [CrossRef]
- Salem, H.; El-Hasnony, I.M.; Kabeel, A.; El-Said, E.M.; Elzeki, O.M. Deep Learning model and Classification Explainability of Renewable energy-driven Membrane Desalination System using Evaporative Cooler. Alex. Eng. J. 2022, 61, 10007–10024. [Google Scholar] [CrossRef]
- Caruana, R.; Niculescu-Mizil, A. An Empirical Comparison of Supervised Learning Algorithms. In Proceedings of the ACM International Conference Proceeding Series, Santa Barbara, CA, USA, 23–27 October 2006. [Google Scholar]
- Johnson, J.M.; Khoshgoftaar, T.M. Survey on deep learning with class imbalance. J. Big Data 2019, 6, 27. [Google Scholar] [CrossRef]
- Liu, T.; Qi, A.; Hou, Y.; Chang, X. Method for Network Anomaly Detection Based on Bayesian Statistical Model with Time Slicing. In Proceedings of the World Congress on Intelligent Control and Automation (WCICA), Chongqing, China, 25–27 June 2008. [Google Scholar]
- Vapnik, V.N. The Nature of Statistical Learning Theory. Technometrics 1997, 38, 409. [Google Scholar]
- Kabir, E.; Hu, J.; Wang, H.; Zhuo, G. A novel statistical technique for intrusion detection systems. Futur. Gener. Comput. Syst. 2018, 79, 303–318. [Google Scholar] [CrossRef] [Green Version]
- Fernandes, G.; Rodrigues, J.J.; Carvalho, L.F.; Al-Muhtadi, J.F.; Proença, M.L. A comprehensive survey on network anomaly detection. Telecommun. Syst. 2019, 70, 447–489. [Google Scholar] [CrossRef]
- Brown, J.; Anwar, M.; Dozier, G. An Evolutionary General Regression Neural Network Classifier for Intrusion Detection. In Proceedings of the 2016 25th International Conference on Computer Communications and Networks, ICCCN 2016, Waikoloa, HI, USA, 1–4 August 2016. [Google Scholar]
- Aburomman, A.; Reaz, M.B.I. A novel SVM-kNN-PSO ensemble method for intrusion detection system. Appl. Soft Comput. 2016, 38, 360–372. [Google Scholar] [CrossRef]
- Bukhtoyarov, V.; Zhukov, V. Ensemble-Distributed Approach in Classification Problem Solution for Intrusion Detection Systems. In International Conference on Intelligent Data Engineering and Automated Learning, Proceedings of the Intelligent Data Engineering and Automated Learning–IDEAL 2014, 15th International Conference, Salamanca, Spain, 10–12 September 2014; Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Springer: Cham, Switzerland, 2014. [Google Scholar]
- Safavian, S.; Landgrebe, D. A survey of decision tree classifier methodology. IEEE Trans. Syst. Man Cybern. 1991, 21, 660–674. [Google Scholar] [CrossRef] [Green Version]
- Kowsari, K.; Meimandi, J.K.; Heidarysafa, M.; Mendu, S.; Barnes, L.; Brown, D. Text Classification Algorithms: A Survey. Information, Switzerland. Information 2019, 10, 150. [Google Scholar] [CrossRef] [Green Version]
- Huang, G.-B.; Zhu, Q.-Y.; Siew, C.-K. Extreme learning machine: Theory and applications. Neurocomputing 2006, 70, 489–501. [Google Scholar] [CrossRef]
- Zhang, K.; Hu, Z.; Zhan, Y.; Wang, X.; Guo, K. A Smart Grid AMI Intrusion Detection Strategy Based on Extreme Learning Machine. Energies 2020, 13, 4907. [Google Scholar] [CrossRef]
- Pradhan, A.K.; Das, K.; Mishra, D.; Mishra, S. Exploration of Hyperparameter in Extreme Learning Machine for Brain MRI Datasets. In Intelligent and Cloud Computing; Smart Innovation, Systems and Technologies; Springer: Singapore, 2021. [Google Scholar]
- Hafiz, F.; Swain, A.; Naik, C.; Abecrombie, S.; Eaton, A. Identification of power quality events: Selection of optimum base wavelet and machine learning algorithm. IET Sci. Meas. Technol. 2019, 13, 260–271. [Google Scholar] [CrossRef]
- UCI Machine Learning Repository KDD Cup 1999 Data. 1999. Available online: http//kdd.ics.uci.edu/databases/kddcup99/kddcup99.html (accessed on 15 February 2022).
- Thomas, C.; Balakrishnan, N. Performance Enhancement of Intrusion Detection Systems Using Advances in Sensor Fusion. In Proceedings of the 11th International Conference on Information Fusion, FUSION 2008, Cologne, Germany, 30 June–3 July 2008. [Google Scholar]
- Mahmoud, A.; Shams, M.Y.; Elzeki, O.M.; Awad, N.A. Using Semantic Web Technologies to Improve the Extract Transform Load Model. Comput. Mater. Contin. 2021, 68, 2711–2726. [Google Scholar] [CrossRef]
- Kumar, D.A.; Venugopalan, S.R. A Novel Algorithm for Network Anomaly Detection Using Adaptive Machine Learning. In Progress in Advanced Computing and Intelligent Engineering; Advances in Intelligent Systems and Computing; Springer: Singapore, 2018. [Google Scholar]
- Salem, H.; Negm, K.R.; Shams, M.Y.; Elzeki, O.M. Recognition of Ocular Disease Based Optimized VGG-Net Models. In Medical Informatics and Bioimaging Using Artificial Intelligence; Studies in Computational Intelligence; Springer: Cham, Switzerland, 2016. [Google Scholar]
- Salem, H.; Attiya, G.; El-Fishawy, N. Intelligent decision support system for breast cancer diagnosis by gene expression profiles. In Proceedings of the National Radio Science Conference, NRSC, Alexandria, Egypt, 23–25 February 2016. [Google Scholar]
- Shams, M.Y.; Elzeki, O.M.; Elaraby, M.E.; Hikal, N.A. Signature Recognition Based on Support Vector Machine and Deep Convolutional Neural Networks for Multi-Region of Interest. J. Theor. Appl. Inf. Technol. 2020, 98, 3887–3897. [Google Scholar]
Study | Technique | Dataset | Accuracy (%) |
---|---|---|---|
Tang et al. [15] | Simple DNN | NSL-KDD | 75.75 |
Rawat et al. [16] | DNN | NSL-KDD | 75.9 |
Wang et al. [17] | Semi-Supervised Approach | NSL-KDD | 77.26 |
Dey et al. [18] | Random Forest | NSL-KDD | 81.95 |
Latah and Toker [19] | Decision Tree | NSL-KDD | 88.74 |
Tang et al. [20] | GRU-RNN | NSL-KDD | 89 |
Latah and Toker [21] | KNN, ELM, and HELM | NSL-KDD | 84.29 |
Gao et al. [6] | A-PCA-I-ELM | NSL-KDD | 81.22 |
Zheng et al. [22] | ILECA | NSL-KDD | 92.35 |
Al-Yaseen et al. [23] | SVM and ELM | KDDCUP99 | 95.75 |
Rani [24] | Classifier-level DNN | NSL-KDD | 85.56 |
Imrana et al. [25] | LSTM, BiDLSTM | KDDCUP99 | 87.26, 91.36 |
Chen et al. [26] | DPC-GS-MND | KDDCUP99 | 96.83 |
Ramadan et al. [27] | LSTM-RNN | KDDCUP99 | 91 |
Chung and Wahid [28] | Simplified Swarm Optimization | KDDCUP99 | 93.3 |
Ambusaidi et al. [29] | Least Squares SVM | KDDCUP99 | 92.8 |
Khalvati et al. [30] | SVM | KDDCUP99 | 94.8 |
Mohammadi et al. [31] | FGLCC, FGLCC-CFA | KDDCUP99 | 92.59, 95.05 |
Alazzam et al. [32] | Sigmoid _PIO, Cosine_PIO | KDDCUP99 | 94.7, 96 |
Variable Name | Available Values | Best-Value |
---|---|---|
hiddenSize. | 1, …, inf | 2000 |
Activation Function | Sine, Sigmoid, RBF, Triangular Bias, Hard Limit | Sigmoid |
Cost parameter | 1, …, inf |
Attack Category | Attacks (37) |
---|---|
DoS | Back, Edstrom, Smurf, Worm, Mailbomb, Apache2, Land, Pod, Process table, Mailbomb Neptune Teardrop |
Probe | IPsweep, Mscan, vPortsweep, SaintI, Satan, Nmap |
R2L | Ftp_write, Sendmail, Snmpgetattack, Xsnoop, Waremaster, Snmpguess, imap, Httptunnel, Named, Phf, Xlock, Multihop Guess_password |
U2R | Xterm, Sqiattack, Buffer_overflow, Loadmodule, Ps, Perl, Rootkit |
A. # | Attribute Name | A. # | Attribute Name | A. # | Attribute Name |
---|---|---|---|---|---|
A1 | Duration | A15 | Su attempted | A29 | Same srv rate |
A2 | Protocol type | A16 | Num root | A30 | Diff srv rate |
A3 | Service | A17 | Num file creations | A31 | Srv diff host rate |
A4 | Flag | A18 | Num shells | A32 | Dst host count |
A5 | Source bytes | A19 | Num access files | A33 | Dst host srv count |
A6 | Destination bytes | A20 | Num outbound cmds | A34 | Dst host same srv rate |
A7 | Land | A21 | Is host login | A35 | Dst host diff srv rate |
A8 | Wrong fragment | A22 | Is guest login | A36 | Dst host same src port rate |
A9 | Urgent | A23 | Count | A37 | Dst host srv diff host rate |
A10 | Hot | A24 | Srv count | A38 | Dst host serror rate |
A11 | Number failed logins | A25 | Serror rate | A39 | Dst host srv serror rate |
A12 | Logged in | A26 | Srv serror rate | A40 | Dst host rerror rate |
A13 | Num compromised | A27 | Rerror rate | A41 | Dst host srv rerror rate |
A14 | Root shell | A28 | Srv rerror rate | A42 | Class label |
Performance Metric | Description | Formula |
---|---|---|
Detection Rate/Precision | The proportion of true positives among projected positives (or) proportion of test data flagged as an attack that is an attack. | TP/(TP + FP) |
Accuracy | To establish the total accuracy, take a measurement. It is the percentage of accurately predicted values over the whole dataset. | TP + TN/(TP + FP+ FN +TN) |
False Alarm Rate | The false-positive rate (FPR), also known as the false alarm rate (FAR), is the percentage of legitimate packets mistakenly identified as malicious. | FP/(FP + TN) |
True Positive Rate Sensitivity/Recall | The proportion of attack classes successfully detected (or) the percentage of true positives projected as positives. | TP/(TP + FN) |
Method | Accuracy (%) | False Alarm Rate (%) | Precision (%) | Recall (%) | F1-Score (%) |
---|---|---|---|---|---|
Simple DNN [15] | 75.75 | 3.21 | 92.50 | 59.95 | 74.13 |
Semi-Supervised Approach [17] | 77.26 | N.A | N.A | N.A | N.A |
Random Forest [18] | 81.95 | N.A | N.A | N.A | N.A |
Decision Tree [19] | 88.74 | 3.99 | 83.24 | 96.5 | 89.38 |
GRU-RNN [20] | 89 | N.A | 89 | 89.5 | 89.2 |
KNN, ELM, and HELM [21] | 84.29 | 6.3 | 94.18 | 77.18 | 84.83 |
DNN [16] | 75.9 | N.A | N.A | N.A | N.A |
Classifier-level DNN [24] | 85.56 | N.A | 97.09 | 76.94 | 85.85 |
LSTM [25] | 87.26 | 4.03 | 90.34 | 87.26 | 88.03 |
BiDLSTM [25] | 91.36 | 0.88 | 92.81 | 91.36 | 91.67 |
ILECA [22] | 92.35 | N.A | N.A | N.A | N.A |
A-PCA-I-ELM [6] | 81.22 | N.A | 96.1 | N.A | N.A |
Proposed System(SALMA) | 95.04 | 2.48 | 92.05 | 79.59 | 85.37 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ali, H.; Elzeki, O.M.; Elmougy, S. Smart Attacks Learning Machine Advisor System for Protecting Smart Cities from Smart Threats. Appl. Sci. 2022, 12, 6473. https://doi.org/10.3390/app12136473
Ali H, Elzeki OM, Elmougy S. Smart Attacks Learning Machine Advisor System for Protecting Smart Cities from Smart Threats. Applied Sciences. 2022; 12(13):6473. https://doi.org/10.3390/app12136473
Chicago/Turabian StyleAli, Hussein, Omar M. Elzeki, and Samir Elmougy. 2022. "Smart Attacks Learning Machine Advisor System for Protecting Smart Cities from Smart Threats" Applied Sciences 12, no. 13: 6473. https://doi.org/10.3390/app12136473
APA StyleAli, H., Elzeki, O. M., & Elmougy, S. (2022). Smart Attacks Learning Machine Advisor System for Protecting Smart Cities from Smart Threats. Applied Sciences, 12(13), 6473. https://doi.org/10.3390/app12136473