Volume 14 , Issue 2 , PP: 311-322, 2024 | Cite this article as | XML | Html | PDF | Full Length Article
Bashar Ahmed Khalaf 1 * , Siti Hajar Othman 2 , Shukor Abd Razak 3 , Alexandros Konios 4
Doi: https://doi.org/10.54216/JCIM.140222
Due to the increasing digitization of city processes, there has been a significant shift in how cities are governed and how people make their living. However, several types of attacks could target smart cities, and Flooding Attacks (FA) are the most dangerous type. It is also a major issue for many people and programs using the Internet nowadays. Security in smart cities refers to preventative measures necessary to shield the city and its residents from direct or indirect harm by attackers who try to crash the system and deny legitimate users the use of the services. Smart city security, in contrast to standard security mechanisms, necessitates new and creative approaches to protecting the systems and applications while considering characteristics like resource limitations, distributed architecture nature, and geographic distribution. Smart cities are vulnerable to several particular issues, including faulty communication, insufficient data, and privilege protection. Therefore, a hybrid CRNN model that consists of Convolutional Neural Network (CNN) and Recurrent Neural Network (RNN) algorithms is employed for the detection of Flood Attacks based on the classification of traffic data. Subsequently, the performance of the CRNN is tested and evaluated using the CIC-Bell-DNS-EXF-2021 dataset. The obtained accuracy results of the proposed CRNN model achieved in FA detection is 99.2%.
Flooding Attack , Smart Cities , CNN , LSTM
[1] Darch Abed Dawar, A. (2024). Enhancing Wireless Security and Privacy: A 2-Way Identity Authentication Method for 5G Networks. International Journal of Mathematics, Statistics, and Computer Science, 2, 183–198. https://doi.org/10.59543/ijmscs.v2i.9073
[2] A. Sharifi, et al., “ Smart cities and sustainable development goals (SDGs): A systematic literature review of co-benefits and trade-offs,” Cities, vol. 146, 104659, 2024.
[3] C. S. Lai, et al., “ A review of technical standards for smart cities,” Clean Technologies, vol. 2, no. 2, pp. 290-310, 2020.
[4] Chandraleka, J. Selvaraj, P. "Energy-Efficient Smart Farming with IoT-Fog- Based Dual Power Management System," Journal of Journal of Cognitive Human-Computer Interaction, vol. 5, no. 1, pp. 32-41, 2023. DOI: https://doi.org/10.54216/JCHCI.050103
[5] F. Al‐Turjman, H. Zahmatkesh and R. Shahroze, “An overview of security and privacy in smart cities,” IoT communications, Transactions on Emerging Telecommunications Technologies, vol. 33, no. 3, e3677, 2022.
[6] Jain, A. "Establishing IoT Cyber Hygiene Frameworks with Continuous Monitoring and Risk Assessment in Smart City Infrastructures," Journal of International Journal of Wireless and Ad Hoc Communication, vol. 7, no. 2, pp. 41-55, 2023. DOI: https://doi.org/10.54216/IJWAC.070203
[7] S. Ali and Y. Li, “Learning multilevel auto-encoders for DDoS attack detection in smart grid network,” IEEE Access, vol. 7, pp. 108647-108659, 2019.
[8] P. Rizwan, K. Suresh and M. R. Babu, “Real-time smart traffic management system for smart cities by using Internet of Things and big data,” In 2016 international conference on emerging technological trends (ICETT), IEEE, pp. 1-7, 2016.
[9] I., S. "A comparison study Big Data Analytics Methods for Selecting Suitable Method," Journal of International Journal of Advances in Applied Computational Intelligence, vol. 4, no. 2, pp. 08-14, 2023. DOI: https://doi.org/10.54216/IJAACI.040201
[10] K. Ma, et al., “An iot-based fog computing model,”. Sensors, vol. 19, no. 12, 2783, 2019.
[11] J. M. Abd Elaziz, L. Abualigah and I. Attiya “Advanced optimization technique for scheduling IoT tasks in cloud-fog computing environments,” Future Generation Computer Systems, vol, 124, pp.142-154, 2021.
[12] L. Wang and Y. Liu, “A DDoS attack detection method based on information entropy and deep learning in SDN,” In 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), IEEE, vol. 1, pp. 1084-1088, 2020.
[13] U. Sabeel, et al., “Evaluation of deep learning in detecting unknown network attacks,” In 2019 International Conference on Smart Applications, Communications and Networking (SmartNets), IEEE, pp. 1-6, 2019.
[14] J. Chen, H. Huang and H. Chen, “Informer: irregular traffic detection for containerized microservices RPC in the real world,” In Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, pp. 389-394, 2019.
[15] K. B. Virupakshar, et al., “Distributed denial of service (DDoS) attacks detection system for OpenStack-based private cloud,” Procedia Computer Science, vol. 167, pp. 2297-2307, 2020.
[16] C. Li, et al., “Detection and defense of DDoS attack–based on deep learning in OpenFlow‐based SDN,” International Journal of Communication Systems, vol. 31, no. 5, e3497, 2018.
[17] B. A. Khalaf, et al., “A simulation study of syn flood attack in cloud computing environment,” AUS journal, vol. 26, no. 1, pp.188-197, 2017.
[18] Haider, S., et al., “A deep CNN ensemble framework for efficient DDoS attack detection in software defined networks,” IEEE Access, vol. 8, pp. 53972-53983.
[19] M. Z. Hasan, K. Z. Hasan and A. Sattar, “Burst header packet flood detection in optical burst switching network using deep learning model,” Procedia computer science, vol. 143, pp. 970-977, 2018.
[20] J. Chen, et al., “DAD-MCNN: DDoS attack detection via multi-channel CNN,” In Proceedings of the 2019 11th International Conference on Machine Learning and Computing, pp. 484-488, 2019.
[21] S. Gamage and J. Samarabandu, “Deep learning methods in network intrusion detection: A survey and an objective comparison,” Journal of Network and Computer Applications, vol. 169, p.102767, 2020.
[22] I. Goodfellow, Y. Bengio, A. Courville, “Deep learning, MIT Press, Cambridge Google services resume after massive gmail,” youtube outage, 2016. Avilable on: https:// www.livemint.com/technology/apps/google-services-youtubegmail-google-drive-face-outage-11607947475759.html. 18 Apr 2021, Accessed on: 2021.
[23] S. Hochreiter and J. Schmidhuber, Long short-term memory, “Neural computation, vol. 9, no. 8, 1735-1780, 1997.
[24] A. Özgür and H. Erdem, “A review of KDD99 dataset usage in intrusion detection and machine learning between 2010 and 2015,” PeerJ Preprints, 2016.
[25] B. A. Khalaf, et al., “Comprehensive review of artificial intelligence and statistical approaches in distributed denial of service attack and defense methods,” IEEE Access, vol. 7, pp. 51691-51713, 2019.
[26] M. Bakro, et al., “Building a Cloud-IDS by Hybrid Bio-Inspired Feature Selection Algorithms Along with Random Forest Model,” IEEE Access, 2024.
[27] H. Zhao, , L. Han and W. Wang, “Detection of COVID-19-related Malicious Domain Names Based on Feature Fusion,” In 2023 26th International Conference on Computer Supported Cooperative Work in Design (CSCWD, IEEE, pp. 1251-1256, 2023.
[28] S. Wang, et al., “KRTunnel: DNS channel detector for mobile devices,” Computers & Security, vol, 120, p. 102818, 2022.