Can Machine Learning Enhance Intrusion Detection to Safeguard Smart City Networks from Multi-Step Cyberattacks?
Abstract
:Highlights
- Using machine learning was found to be effective in identifying and classifying multi-step network intrusion cyberattacks.
- Extreme Gradient Boosting (XGB) was identified as the top-performing machine learning model due to its high accuracy and computational efficiency, making it an ideal choice for an edge-based intrusion detection system (IDS).
- Identifying and classifying multi-step cyberattacks through advanced IDS help protect smart cities’ systems from unauthorized access, ensuring the stability, security, and reliability of essential services.
- Given the dynamic nature of smart cities, where multiple systems work in tandem and data flow in real-time, this research highlights the importance of developing real-time intrusion detection systems that are able to detect intrusions as soon as they arise, enabling quick actions to isolate and mitigate risks before they can cause widespread damage.
Abstract
1. Introduction
2. Literature Review
2.1. Integrated Machine Learning and Deep Learning-Based Models
2.2. Machine Learning-Based Models
2.3. Deep Learning-Based Models
2.4. Additional Methods
3. Datasets and Methods
3.1. Dataset
- Total, size, minimum, maximum, mean, standard deviation and average size of the packet.
- Minimum, maximum, mean, standard deviation and total time between two packets sent.
- Number of flow bytes and packets per second.
- Number of times PSH and URG flags were set.
- Total bytes used for headers.
- Minimum, maximum, mean, standard deviation and variance length of a packet.
- Number of packets with FIN, SYN, RST, PUSH, ACK, URG, CWE and ECE.
- Average number of packets and bytes in a sub flow.
- Download and upload ratio.
- Total number of bytes sent in an initial window.
- Count of packets with at least 1 byte of TCP data payload in the forward direction.
- Minimum, maximum, mean and standard deviation time of a flow-changing state between active and idle.
- Multi-Step Attack Scenario A
- Multi-Step Attack Scenario B
3.2. Data Preprocessing Methods
3.3. Machine Learning Methods
3.4. Feature Selection and Dimensionality Reduction
3.5. Model Selection
3.6. Evaluation Metrics
4. Implementation and Results
4.1. Implementation and Experimental Setup
4.2. Data Preprocessing and Feature Selection
4.3. Principal Component Analysis (PCA)
4.4. Machine Learning
4.4.1. Decision Tree
4.4.2. KNN
4.4.3. NB
4.4.4. SVM with RBF Kernel
4.4.5. SVM with Linear Kernel
4.4.6. LGBM
4.4.7. XGB
4.4.8. RF
5. Discussion
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Almseidin, M.; Al-Sawwa, J.; Alkasassbeh, M. Generating a benchmark cyber multi-step attacks dataset for intrusion detection. J. Intell. Fuzzy Syst. 2022, 43, 3679–3694. [Google Scholar] [CrossRef]
- Mao, B.; Liu, J.; Lai, Y.; Sun, M. MIF: A multi-step attack scenario reconstruction and attack chains extraction method based on multi-information fusion. Comput. Netw. 2021, 198, 108340. [Google Scholar] [CrossRef]
- Anand, R.; Jain, M.; Jain, L.; Narwal, B.; Jaiswal, A. Application of an Intrusion Detection System in Smart Cities: A Review. In Proceedings of the 2022 4th International Conference on Artificial Intelligence and Speech Technology (AIST), Delhi, India, 9–10 December 2022; pp. 1–6. [Google Scholar] [CrossRef]
- Almseidin, M.; Al-Sawwa, J.; Alkasassbeh, M. Multi-Step Cyber-Attack Dataset (MSCAD for Intrusion Detection); IEEE Dataport; IEEE: Piscataway, NJ, USA, 2022. [Google Scholar] [CrossRef]
- Dhanya, K.; Vajipayajula, S.; Srinivasan, K.; Tibrewal, A.; Kumar, T.G. Detection of Network Attacks using Machine Learning and Deep Learning Models. Procedia Comput. Sci. 2023, 218, 57–66. [Google Scholar] [CrossRef]
- Dalal, S.; Manoharan, P.; Lilhore, U.K.; Seth, B.; Alsekait, D.M.; Simaiya, S.; Hamdi, M.; Raahemifar, K. Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment. J. Cloud Comput. 2023, 12, 14. [Google Scholar] [CrossRef]
- Taher, K.A.; Jisan, B.M.Y.; Rahman, M. Network intrusion detection using supervised machine learning technique with feature selection. In Proceedings of the 2019 International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), Dhaka, Bangladesh, 10–12 January 2019. [Google Scholar] [CrossRef]
- Pelletier, Z.; Abualkibash, M. Evaluating the CIC IDS-2017 Dataset Using Machine Learning Methods and Creating Multiple Predictive Models in the Statistical Computing Language R. Int. Res. J. Adv. Eng. Sci. 2020, 5, 187–191. [Google Scholar]
- Gan, B.; Chen, Y.; Dong, Q.; Guo, J.; Wang, R. A convolutional neural network intrusion detection method based on data imbalance. J. Supercomput. 2022, 78, 19401–19434. [Google Scholar] [CrossRef]
- Maseer, Z.K.; Kadhim, Q.K.; Al-Bander, B.; Yusof, R.; Saif, A. Meta-analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges. IET Netw. 2024, 13, 339–376. [Google Scholar] [CrossRef]
- Qaddoura, R.; Al-Zoubi, A.M.; Almomani, I.; Faris, H. A Multi-Stage Classification Approach for IoT Intrusion Detection Based on Clustering with Oversampling. Appl. Sci. 2021, 11, 3022. [Google Scholar] [CrossRef]
- Ingale, S.; Paraye, M.; Ambawade, D. Enhancing Multi-Step Attack Prediction using Hidden Markov Model and Naive Bayes. In Proceedings of the 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India, 2–4 July 2020; pp. 36–44. [Google Scholar]
- Saheed, Y.K.; Abiodun, A.I.; Misra, S.; Holone, M.K.; Colomo-Palacios, R. A machine learning-based intrusion detection for detecting internet of things network attacks. Alex. Eng. J. 2022, 61, 9395–9409. [Google Scholar] [CrossRef]
- Chen, Y.-W.; Sheu, J.-P.; Kuo, Y.-C.; Van Cuong, N. Design and Implementation of IoT DDoS Attacks Detection System based on Machine Learning. In Proceedings of the 2020 European Conference on Networks and Communications (EuCNC), Dubrovnik, Croatia, 15–18 June 2020; pp. 122–127. [Google Scholar]
- Hamza, A.; Hammam, F.; Abouzeid, M.; Ahmed, M.A.; Dhou, S.; Aloul, F. Malicious URL and Intrusion Detection using Machine Learning. In Proceedings of the 2024 International Conference on Information Networking (ICOIN), Ho Chi Minh City, Vietnam, 17–19 January 2024; pp. 795–800. [Google Scholar]
- Prachi, H.M.; Malhotra, H.; Sharma, P. Intrusion Detection using Machine Learning and Feature Selection. Int. J. Comput. Netw. Inf. Secur. 2019, 11, 43–52. [Google Scholar] [CrossRef]
- Yulianto, A.; Sukarno, P.; Suwastika, N.A. Improving AdaBoost-based Intrusion Detection System (IDS) Performance on CIC IDS 2017 Dataset. J. Phys. Conf. Ser. 2019, 1192, 012018. [Google Scholar] [CrossRef]
- Chaturvedi, P. A Comparative Approach for Host Based Intrusion Detection Using Naiyve Bayes and KNN Algorithm. Int. J. Innov. Res. Comput. Sci. Technol. 2024, 12, 87–90. [Google Scholar] [CrossRef]
- Hammad, M.; El-Medany, W.; Ismail, Y. Intrusion Detection System using Feature Selection with Clustering and Classification Machine Learning Algorithms on the UNSW-NB15 dataset. In Proceedings of the 2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT), Sakheer, Bahrain, 20–21 December 2020; pp. 1–6. [Google Scholar]
- An Effective Intrusion Detection Approach Using SVM with Naïve Bayes Feature Embedding|Elsevier Enhanced Reader. Available online: https://www.sciencedirect.com/science/article/abs/pii/S0167404820304314 (accessed on 29 April 2023).
- Zhou, P.; Zhou, G.; Wu, D.; Fei, M. Detecting multi-stage attacks using sequence-to-sequence model. Comput. Secur. 2021, 105, 102203. [Google Scholar] [CrossRef]
- Ben Fredj, O. An NLP-inspired method to predict multi-step cyberattacks. In Proceedings of the 2022 15th International Conference on Security of Information and Networks (SIN), Sousse, Tunisia, 11–13 November 2022; pp. 1–6. [Google Scholar]
- Sohail, S.; Fan, Z.; Gu, X.; Sabrina, F. Multi-tiered Artificial Neural Networks model for intrusion detection in smart homes. Intell. Syst. Appl. 2022, 16, 200152. [Google Scholar] [CrossRef]
- Abdullah, M.Z.; Jassim, A.K.; Hummadi, F.N.; Al Khalidy, M.M.M. New strategies for improving network security against cyber attack based on intelligent algorithms. J. Eng. Sustain. Dev. 2024, 28, 342–354. [Google Scholar] [CrossRef]
- Thamilarasu, G.; Chawla, S. Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things. Sensors 2019, 19, 1977. [Google Scholar] [CrossRef] [PubMed]
- Vinayakumar, R.; Alazab, M.; Soman, K.P.; Poornachandran, P.; Al-Nemrat, A.; Venkatraman, S. Deep Learning Approach for Intelligent Intrusion Detection System. IEEE Access 2019, 7, 41525–41550. [Google Scholar] [CrossRef]
- Faker, O.; Dogdu, E. Intrusion Detection Using Big Data and Deep Learning Techniques. In Proceedings of the 2019 ACM Southeast Conference, Kennesaw, GA, USA, 18–20 April 2019. [Google Scholar] [CrossRef]
- Xiao, Y.; Xing, C.; Zhang, T.; Zhao, Z. An Intrusion Detection Model Based on Feature Reduction and Convolutional Neural Networks. IEEE Access 2019, 7, 42210–42219. [Google Scholar] [CrossRef]
- Ahmad, Z.; Khan, A.S.; Nisar, K.; Haider, I.; Hassan, R.; Haque, M.R.; Tarmizi, S.; Rodrigues, J.J.P.C. Anomaly Detection Using Deep Neural Network for IoT Architecture. Appl. Sci. 2021, 11, 7050. [Google Scholar] [CrossRef]
- Khan, F.A.; Gumaei, A.; Derhab, A.; Hussain, A. TSDL: A Two-Stage Deep Learning Model for Efficient Network Intrusion Detection. IEEE Access 2019, 7, 30373–30385. [Google Scholar] [CrossRef]
- Li, Y.; Qin, T.; Huang, Y.; Lan, J.; Liang, Z.; Geng, T. HDFEF: A hierarchical and dynamic feature extraction framework for intrusion detection systems. Comput. Secur. 2022, 121, 102842. [Google Scholar] [CrossRef]
- Sen, O.; Eze, C.; Ulbig, A.; Monti, A. On Holistic Multi-Step Cyberattack Detection via a Graph-Based Correlation Approach. In Proceedings of the 2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Singapore, 25–28 October 2022; pp. 380–386. [Google Scholar]
- Angelini, M.; Bonomi, S.; Lenti, S.; Santucci, G.; Taggi, S. MAD: A visual analytics solution for Multi-step cyber Attacks Detection. J. Comput. Lang. 2019, 52, 10–24. [Google Scholar] [CrossRef]
- Shawly, T.; Khayat, M.; Elghariani, A.; Ghafoor, A. Evaluation of HMM-Based Network Intrusion Detection System for Multiple Multi-Stage Attacks. IEEE Netw. 2020, 34, 240–248. [Google Scholar] [CrossRef]
- Wang, X.; Gong, X.; Yu, L.; Liu, J. MAAC: Novel Alert Correlation Method to Detect Multi-step Attack. In Proceedings of the 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Shenyang, China, 20–22 October 2021; pp. 726–733. [Google Scholar]
- Zhang, X.; Wu, T.; Zheng, Q.; Zhai, L.; Hu, H.; Yin, W.; Zeng, Y.; Cheng, C. Multi-Step Attack Detection Based on Pre-Trained Hidden Markov Models. Sensors 2022, 22, 2874. [Google Scholar] [CrossRef]
- He, H.; Bai, Y.; Garcia, E.A.; Li, S.; Li, S. ADASYN: Adaptive synthetic sampling approach for imbalanced learning. In Proceedings of the 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence), Hong Kong, China, 1–8 June 2008; pp. 1322–1328. [Google Scholar] [CrossRef]
- Rokach, L.; Maimon, O. Decision Trees. In Data Mining and Knowledge Discovery Handbook; Maimon, O., Rokach, L., Eds.; Springer: Boston, MA, USA, 2005; pp. 165–192. [Google Scholar]
- Mucherino, A.; Papajorgji, P.J.; Pardalos, P.M. k-Nearest Neighbor Classification. In Data Mining in Agriculture; Mucherino, A., Papajorgji, P.J., Pardalos, P.M., Eds.; Springer: New York, NY, USA, 2009; pp. 83–106. [Google Scholar] [CrossRef]
- Webb, G.I. Naïve Bayes. In Encyclopedia of Machine Learning [Internet]; Sammut, C., Webb, G.I., Eds.; Springer: Boston, MA, USA, 2010; pp. 713–714. [Google Scholar] [CrossRef]
- Cristianini, N.; Ricci, E. Support VEctor Machines. In Encyclopedia of Algorithms; Kao, M.-Y., Ed.; Springer: Boston, MA, USA, 2008; pp. 928–932. [Google Scholar] [CrossRef]
- Ke, G.; Meng, Q.; Finley, T.; Wang, T.; Chen, W.; Ma, W.; Ye, Q.; Liu, T.-Y. LightGBM: A Highly Efficient Gradient Boosting Decision Tree. In Advances in Neural Information Processing Systems; Curran Associates, Inc.: Red Hook, NY, USA, 2017; Available online: https://proceedings.neurips.cc/paper_files/paper/2017/hash/6449f44a102fde848669bdd9eb6b76fa-Abstract.html (accessed on 1 January 2025).
- XGBoost|Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Available online: https://dl.acm.org/doi/10.1145/2939672.2939785 (accessed on 1 January 2025).
- Breiman, L. Random forests. Mach. Learn. 2001, 45, 5–32. [Google Scholar] [CrossRef]
- Alshamkhany, M.; Alshamkhany, W.; Mansour, M.; Khan, M.; Dhou, S.; Aloul, F. Botnet Attack Detection using Machine Learning. In Proceedings of the 2020 14th International Conference on Innovations in Information Technology (IIT), Al Ain, United Arab Emirates, 17–18 November 2020; pp. 203–208. [Google Scholar] [CrossRef]
- Al Ali, S.; Suleiman, A.; Hallal, G.; Alseiari, S.; Ma, Y.; Dhou, S.; Aloul, F. Android Malware Detection Using Machine Learning. In Proceedings of the 2024 IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS), Bali, Indonesia, 28–30 November 2024; pp. 79–84. [Google Scholar] [CrossRef]
- Machine Learning Pipeline. Available online: https://c3.ai/glossary/machine-learning/machine-learning-pipeline/ (accessed on 6 May 2024).
Paper | Datasets | Technique | Best Results |
---|---|---|---|
Dhanya et al. [5] | UNSW-NB15 | DT, RF, Adaboost, XGB and KNN | Accuracy of 99.05% |
Dalal et al. [6] | Multi-Step Cyber-Attack Dataset (MSCAD) | Highly Boosted Neural Network | Accuracy of 99.72% |
Taher et al. [7] | NSL-KDD | SVM and ANN | ANN accuracy of 94.02% |
Pelletier and Abualkibash [8] | CIC IDS 2017 | ANN, RF | RF was best model with accuracy of 96.4% |
Gan et al. [9] | NSL-KDD | Data imbalance-based CNN-IDMDI | Average accuracy of 98.73% for binary intrusion detection, average accuracy of 94.55% for multi-class intrusion detection. |
Maseer et al. [10] | IoTID 20 | CNN-MLP | Highest accuracy of 98.1% |
Qaddoura et al. [11] | IoTID 20 | Clustering with reduction stage, oversampling and classification by Single Hidden Layer Feed-Forward Neural Network (SLFN) | G-mean of 0.9453 for SLFN-SVM-SMOTE. Highest accuracy of 94.81% for SMOTE |
Paper | Datasets | Technique | Best Results |
---|---|---|---|
Ingale et al. [12] | KDDCUP’99 | Hidden Markov Model (HMM) and NB | Accuracy of 97.87% for HMMs |
Saheed et al. [13] | UNSWNB-15 | XGB, Cat Boost, KNN, SVM, Quadratic Discriminant Analysis (QDA) and NB | Accuracy of 99.99%, F1 measure of 99.99%, and Mathew Correlation Coefficient (MCC) of 99.97% |
Chen et al. [14] | Private Dataset | DT | Highest accuracy was 99.98% and highest F1 measure was also 99.98% |
Hamza et al. [15] | Network Intrusion Dataset | DT, NB, SVM, KNN | DT had accuracy of 95.09% and F1 score of 98% |
Malhotra and Sharma [16] | NSL-KDD | BayesNet, NB, Logistics, Random tree, RF, J48, Bagging, PART, OneR, ZeroR, Logistic | RF has accuracy of 99.91% and low false alarm rate of 0.001 |
Yulianto et al. [17] | CIC IDS 2017 | AdaBoost with SMOTE and PCA | Accuracy of 81.83%, F1 score of 90.01% |
Chaturvedi [18] | MSCAD | KNN, NB | Highest accuracy for KNN was 99.6% |
Hammad et al. [19] | UNSW-NB15 | NB, RF, J48, ZeroR, K-means and Expectation Maximization (EM) | RF was best model with accuracy of 97.6% and FPR of 0.03 |
Gu and Lu [20] | UNSW-NB15 and CICIDS2017 | SVM, NB feature embedding | Highest accuracy for SVM was 98.92% |
Paper | Datasets | Technique | Best Results |
---|---|---|---|
Zhou et al. [21] | DARPA2000. ISCXIDS2012, CIC-IDS2017 and CSE-CIC-IDS2018 | sequence-to-sequence (seq2seq) model (uses LSTM) | Highest F1 score was 0.999 |
Fredj [22] | SMIA2012 | Natural Language Processing (NLP) | Accuracy of 98% |
Sohail et al. [23] | IoTID 20 | ANN | 99.9% accuracy for label classification |
Abdullah et al. [24] | MSCAD | ABDL, MLP, BNM, RF | Highest accuracy of 99.71% by ABDL |
Thamilarasu et al. [25] | - | Sequential Deep learning model (linear stack of DNN layers) | F1 scores for all scenarios were greater than or equal to 97% |
Vinayakumar et al. [26] | KDDCUP’99, NSL-KDD | DNN | DNN topologies showed training accuracy between 95% to 99% |
Faker and Dogdu [27] | UNSW NB15, CICIDS2017 | K-means clustering, DNN, RF, Gradient Boosting Tree (GBT) | DNN showed the highest accuracy of 99.56% |
Xiao et al. [28] | KDDCUP’99 | Convolutional Neural Network (CNN) | AC, DR (TPR), and FAR canreach 94.0%, 93.0%, and 0.5% |
Ahmad et al. [29] | IoT-Botnet 2020 | DNN, CNN, RNN | DNN showed the highest detection accuracy of 99.010% and an FAR of 3.9% |
Khan et al. [30] | KDD99 and UNSW-NB15 | Two-stage Deep Learning model (TSDL) | Highest accuracy of 99.931% |
Paper | Datasets | Technique | Best Results |
---|---|---|---|
Mao et al. [2] | DARPA1999/DARPA 2000 and CICIDS2017 | Multi-information fusion (MIF) and CTnet | Accuracy of 99% |
Li et al. [31] | CSE-CIC-IDS2018, CIC-IDS2017 and UNSW-NB15 | Hierarchical and Dynamic Feature Extraction Framework (HDFEF) | Recall value of 99.96% and F1 score of 99.84% |
Sen et al. [32] | - | Graph-Based Correlation | Predicted risk and actual occurrence of one class of 96% |
Angelini et al. [33] | Private data from the ACEA organization | On-line correlation | Developed a visual analytics environment |
Shawly et al. [34] | DARPA 2000 | Multi-HMM based detection architecture (MulHMMs) | Detection accuracy for MulHMMs is better than that of generic architecture |
Wang et al. [35] | DARPA 2000 LLDOS 1.0, UNB ISCX IDS 2012 and NDSec | Multi-Step Attack Alert Correlation (MAAC) | Reduced duplicated alerts by 90%, had a path detection rate of 100%, and a false path rate of 0 |
Zhang et al. [36] | DARPA 2000, DEFCON21 CTF and ISCXIDS 2012 | MSA detection based on HMM | Proposed model had higher accuracy, precision, recall and F1 score than Baum–Welch, K-means, and TL |
Type of Attack | Number of Records |
---|---|
Web Crawling | 28 |
Port Scan | 11,081 |
Brute Force Attack | 88,502 |
HTTP DDoS | 641 |
ICMP Flood | 45 |
Normal Traffic | 28,502 |
Type of Attack | Number of Samples |
---|---|
Web Crawling | 59,188 |
Port Scan | 59,192 |
Brute Force Attack | 59,188 |
HTTP DDoS | 59,207 |
ICMP Flood | 59,182 |
Normal Traffic | 59,162 |
Model | Number of PCA Components Chosen | Best Values of Hyperparameters | Training F1 Score | Testing F1 Score |
---|---|---|---|---|
DT | 20 | Min samples split: 10 Max depth: 20 Criterion: gini | 97% | 80% |
KNN | 25 | N_neighbors: 2 | 98% | 82% |
Naive Bayes | 20 | Var_smoothing: 1 × 10−8 | 54% | 45% |
SVM (Linear) | 25 | tol: 1 × 10−5 | 80% | 50% |
SVM (RBF) | 20 | C: 10, gamma: 0.1 | 90% | 54% |
LGB | 20 | Learning rate: 0.1, boosting: gbdt | 97% | 81% |
XGB | 20 | Learning rate: 0.1, Booster: gbtree | 97% | 80% |
RF | 25 | Criterion: entropy, Min_samples_split: 15 | 96% | 80% |
Metric | DT | KNN | Naïve Bayes | SVM (Linear) | SVM (RBF) | LGB | XGB | RF |
---|---|---|---|---|---|---|---|---|
Mean F1 Score (CV) | 74% | 96% | 50% | 73% | 86% | 96% | 99% | 99% |
Accuracy | 100% | 99% | 76% | 88% | 93% | 100% | 100% | 100% |
Precision | 83% | 81% | 38% | 55% | 54% | 78% | 93% | 91% |
Recall | 83% | 84% | 54% | 76% | 86% | 85% | 85% | 83% |
F1 Score | 83% | 82% | 29% | 52% | 58% | 81% | 88% | 86% |
AUC | 91% | 92% | 74% | 86% | 92% | 90% | 93% | 91% |
Work | Best Model | Accuracy (%) | Precision (%) | Recall (%) | F1 Score (%) | AUC (%) |
---|---|---|---|---|---|---|
Mao et al. [2] | CTnet | 99 | 97 | 95 | 96 | - |
Dhanya et al. [5] | DT | 99.05 | 99 | 99 | 99 | - |
Dalal et al. [6] | Extremely Boosted Neural Network | 99.72 | - | - | - | - |
Pelletier et al. [8] | RF | 96.4 | - | - | - | - |
Gan et al. [9] | CNN-IDMDI | 98.73 | 98.75 | 98.73 | 98.74 | - |
Qaddoura et al. [11] | SLFN | 98.42 | 98.79 | 99.94 | - | - |
Ingale et al. [12] | Service-Based HMM | 97.87 | - | - | - | - |
Saheed et al. [13] | XGB | 99.99 | 100 | - | 99.99 | - |
Chen et al. [14] | DT | 99.98 | 99.98 | 99.98 | 99.98 | - |
Hamza et al. [15] | DT | 95.09 | 79–100 | 78–100 | 78–100 | - |
Yulianto et al. [17] | AdaBoost | 81.83 | 81.83 | 100 | 90.01 | - |
Hammad et al. [19] | RF | 97.6 | 97.6 | 97.6 | 97.6 | - |
Zhou et al. [21] | LSTM | - | - | - | 99.9 | - |
Fredj [22] | LSTM | 98.18 | 98 | - | 98 | - |
Sohail et al. [23] | ANN | 99.9 | 99.0 | 99.8 | 99.4 | - |
Thamilarasu et al. [25] | DL | - | 95 | 97 | 97 | - |
Khan et al. [30] | TSDL | 99.93 | - | - | - | - |
Li et al. [31] | HDFEF | 99.73 | 99.73 | 99.96 | 99.84 | 99.83 |
Wang et al. [35] | Logistic regression | 90.56 | - | - | 90.47 | 98 |
Proposed Work | XGB | 100 | 93 | 85 | 88 | 93 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Khan, J.; Elfakharany, R.; Saleem, H.; Pathan, M.; Shahzad, E.; Dhou, S.; Aloul, F. Can Machine Learning Enhance Intrusion Detection to Safeguard Smart City Networks from Multi-Step Cyberattacks? Smart Cities 2025, 8, 13. https://doi.org/10.3390/smartcities8010013
Khan J, Elfakharany R, Saleem H, Pathan M, Shahzad E, Dhou S, Aloul F. Can Machine Learning Enhance Intrusion Detection to Safeguard Smart City Networks from Multi-Step Cyberattacks? Smart Cities. 2025; 8(1):13. https://doi.org/10.3390/smartcities8010013
Chicago/Turabian StyleKhan, Jowaria, Rana Elfakharany, Hiba Saleem, Mahira Pathan, Emaan Shahzad, Salam Dhou, and Fadi Aloul. 2025. "Can Machine Learning Enhance Intrusion Detection to Safeguard Smart City Networks from Multi-Step Cyberattacks?" Smart Cities 8, no. 1: 13. https://doi.org/10.3390/smartcities8010013
APA StyleKhan, J., Elfakharany, R., Saleem, H., Pathan, M., Shahzad, E., Dhou, S., & Aloul, F. (2025). Can Machine Learning Enhance Intrusion Detection to Safeguard Smart City Networks from Multi-Step Cyberattacks? Smart Cities, 8(1), 13. https://doi.org/10.3390/smartcities8010013