EconPapers    
Economics at your fingertips  
 

Cyberattacks Detection in IoT-Based Smart City Applications Using Machine Learning Techniques

Md Mamunur Rashid, Joarder Kamruzzaman, Mohammad Mehedi Hassan, Tasadduq Imam and Steven Gordon
Additional contact information
Md Mamunur Rashid: School of Engineering and Technology, CQUniversity, Rockhampton North, QLD 4701, Australia
Joarder Kamruzzaman: School of Engineering, Information Technology and Physical Sciences, Federation University Australia, Gippsland Campus, Churchill, VIC 3842, Australia
Mohammad Mehedi Hassan: Information Systems Department, College of Computer and Information Sciences, King Saud University, Riyadh 11543, Saudi Arabia
Tasadduq Imam: School of Business and Law, CQUniversity, Melbourne Campus, Melbourne, VIC 3000, Australia
Steven Gordon: School of Engineering and Technology, CQUniversity, Rockhampton North, QLD 4701, Australia

IJERPH, 2020, vol. 17, issue 24, 1-21

Abstract: In recent years, the widespread deployment of the Internet of Things (IoT) applications has contributed to the development of smart cities. A smart city utilizes IoT-enabled technologies, communications and applications to maximize operational efficiency and enhance both the service providers’ quality of services and people’s wellbeing and quality of life. With the growth of smart city networks, however, comes the increased risk of cybersecurity threats and attacks. IoT devices within a smart city network are connected to sensors linked to large cloud servers and are exposed to malicious attacks and threats. Thus, it is important to devise approaches to prevent such attacks and protect IoT devices from failure. In this paper, we explore an attack and anomaly detection technique based on machine learning algorithms (LR, SVM, DT, RF, ANN and KNN) to defend against and mitigate IoT cybersecurity threats in a smart city. Contrary to existing works that have focused on single classifiers, we also explore ensemble methods such as bagging, boosting and stacking to enhance the performance of the detection system. Additionally, we consider an integration of feature selection, cross-validation and multi-class classification for the discussed domain, which has not been well considered in the existing literature. Experimental results with the recent attack dataset demonstrate that the proposed technique can effectively identify cyberattacks and the stacking ensemble model outperforms comparable models in terms of accuracy, precision, recall and F1-Score, implying the promise of stacking in this domain.

Keywords: smart city; Internet of Things; cybersecurity; anomaly detection; machine learning (search for similar items in EconPapers)
JEL-codes: I I1 I3 Q Q5 (search for similar items in EconPapers)
Date: 2020
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (1)

Downloads: (external link)
https://www.mdpi.com/1660-4601/17/24/9347/pdf (application/pdf)
https://www.mdpi.com/1660-4601/17/24/9347/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jijerp:v:17:y:2020:i:24:p:9347-:d:461739

Access Statistics for this article

IJERPH is currently edited by Ms. Jenna Liu

More articles in IJERPH from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jijerp:v:17:y:2020:i:24:p:9347-:d:461739