Next Article in Journal
Prediction of Electron Beam Welding Penetration Depth Using Machine Learning-Enhanced Computational Fluid Dynamics Modelling
Previous Article in Journal
A Smartphone-Based Detection System for Tomato Leaf Disease Using EfficientNetV2B2 and Its Explainability with Artificial Intelligence (AI)
Previous Article in Special Issue
An Intelligent Water Monitoring IoT System for Ecological Environment and Smart Cities
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Communication

A Novel Hybrid Convolutional Neural Network- and Gated Recurrent Unit-Based Paradigm for IoT Network Traffic Attack Detection in Smart Cities

1
Department of Computer Science and Information Engineering, Asia University, Taichung 413, Taiwan
2
Center for Advanced Information Technology, Kyung Hee University, 26 Kyungheedae-ro, Dongdaemun-gu, Seoul 02447, Republic of Korea
3
Symbiosis Centre for Information Technology (SCIT), Symbiosis International University, Pune 412115, India
4
School of Computing, Skyline University College, Sharjah P.O. Box 1797, United Arab Emirates
5
Department of Electrical and Computer Engineering, Lebanese American University, Beirut 1102, Lebanon
6
Department of Electronic Engineering and Computer Science, School of Science and Technology, Hong Kong Metropolitan University (HKMU), Hong Kong
7
Ronin Institute, Montclair, NJ 07043, USA
8
Department of Business Administration, Asia University, Taichung 413, Taiwan
9
Center for Interdisciplinary Research, University of Petroleum and Energy Studies (UPES), Dehradun 248007, India
10
Chandigarh University, Chandigarh 140413, India
11
School of Computing, Ulster University, Londonderry BT48 7JL, UK
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(21), 8686; https://doi.org/10.3390/s23218686
Submission received: 3 October 2023 / Revised: 20 October 2023 / Accepted: 20 October 2023 / Published: 24 October 2023

Abstract

:
Internet of Things (IoT) devices within smart cities, require innovative detection methods. This paper addresses this critical challenge by introducing a deep learning-based approach for the detection of network traffic attacks in IoT ecosystems. Leveraging the Kaggle dataset, our model integrates Convolutional Neural Networks (CNNs) and Gated Recurrent Units (GRUs) to capture both spatial and sequential features in network traffic data. We trained and evaluated our model over ten epochs, achieving an impressive overall accuracy rate of 99%. The classification report reveals the model’s proficiency in distinguishing various attack categories, including ‘Normal’, ‘DoS’ (Denial of Service), ‘Probe’, ‘U2R’ (User to Root), and ‘Sybil’. Additionally, the confusion matrix offers valuable insights into the model’s performance across these attack types. In terms of overall accuracy, our model achieves an impressive accuracy rate of 99% across all attack categories. The weighted- average F1-score is also 99%, showcasing the model’s robust performance in classifying network traffic attacks in IoT devices for smart cities. This advanced architecture exhibits the potential to fortify IoT device security in the complex landscape of smart cities, effectively contributing to the safeguarding of critical infrastructure

1. Introduction

The growth of “smart cities” is largely dependent on the IoT. Improved efficiency, sustainability, and quality of life are the results of the IoT technology that allows for the connectivity and communication of numerous objects and systems inside a city [1,2,3,4,5]. Connecting and managing household appliances and public lighting is only one example of how the IoT may be used to improve urban infrastructure and provide better services for residents. The medical applications of IoT-based systems include remote patient monitoring, effective ambulance services, and enhanced healthcare delivery [6,7,8]. The IoT facilitates the development of smart cities by easing the flow of information across disparate systems and simplifying the coordination of disparate services and devices. However, there are issues with trust and transparency that need to be resolved in order for IoT to be successfully implemented in smart cities [9]. As a whole, the IoT is essential to the growth of smart cities, as it presents a plethora of prospects for both technological advancement and environmentally responsible city planning [10,11].
The need for IoT security in smart cities is of paramount importance due to the potential risks and vulnerabilities associated with interconnected devices and systems [12,13,14]. As the adoption of the IoT in smart cities continues to grow, it is crucial to address the security challenges that arise. However, the adoption of IoT security measures in smart cities is still lagging behind [12]. Limited financial resources for investments in new physical and IoT infrastructure pose a challenge in implementing robust security measures [12]. The interconnected nature of IoT devices and systems increases the attack surface, making them susceptible to cyber threats and unauthorised access. Without adequate security measures, smart cities can be vulnerable to various risks, including data breaches, privacy violations, and the disruption of critical services. Therefore, it is essential to prioritise IoT security in smart cities to safeguard sensitive data, protect privacy, and ensure the reliable and secure operation of critical infrastructure [12,15]. Implementing strong authentication protocols, encryption mechanisms, and regular security audits can help mitigate the risks associated with the IoT in smart cities. Additionally, collaboration between stakeholders, including government bodies, technology providers, and citizens, is crucial to establish comprehensive security frameworks and guidelines for IoT deployment in smart cities [16].
In this context, we propsed a hybrid deep learning approach for the detection of cyber attack traffic in smart cities with respect to IoT. Following are our contributions: 
  • Integration of Convolutional Neural Networks (CNNs) and Gated Recurrent Units (GRUs) to capture both spatial and sequential features in network traffic data, enhancing the model’s ability to identify attacks.
  • Achieved an impressive overall accuracy rate of 99% after ten training epochs, demonstrating the effectiveness of the proposed approach.
  • Proficiency in distinguishing various attack categories, including ‘Normal’, ‘DoS’ (Denial of Service), ‘Probe’, ‘U2R’ (User to Root), and ’Sybil’, as shown in the classification report.
The rest of the paper is organised as follows: Section 2, presents the related work and the details about our proposed work are presented in Section 3. The analysis of our propsed work is presented in Section 4. Finally, Section 5 concludes the paper.

2. Related Work

There are a number of tried-and-true methods for detecting attacks in the IoT, all of which are aimed at keeping the network safe from harm. Several Studies [17,18] proposes a multiclass classification approach that fits this description. The MQTT-IoT protocol is frequently used for inter-device communication; therefore, authors are investigating ways to identify attacks against it. In order to categorise network traffic and spot hostile actions, the suggested technique utilises an intrusion detection system (IDS) that makes use of machine learning methods [17,19]. The IDS is able to identify suspicious activity by comparing network packets against a baseline of known good behaviour [17,20,21]. With this method, IoT devices can be monitored and alerted in real time, which improves their security and allows for faster responses and resolutions to security events [17,22]. The findings of [17] aid in the creation of efficient attack detection techniques in IoT settings, which in turn protects IoT devices and networks from harm. Though useful, there are a number of obstacles in the application of machine learning to detect attacks in the IoT.
Based on the provided references, below are some limitations of traditional methods for attack detection in the IoT:
  • Traditional approaches may not be able to keep up with the immense size and ever-changing nature of IoT networks, in which many devices produce vast volumes of data in near real-time [23].
  • Traditional solutions are less effective against changing attack tactics since they depend on static rules or signatures to identify threats [24].
  • Traditional approaches may produce a high number of false positives, which results in unwanted notifications and extra work for security staff [24].
  • Sensor readings, network traffic, and device information are just a few examples of the many types of data that are generated by IoT networks. It is possible that conventional approaches will have difficulty analysing and comprehending such varied data [25].
  • The low processing capabilities of many IoT devices make it difficult to deploy resource-intensive classical detection techniques [23].
  • Delays in identifying and reacting to assaults caused by using traditional approaches might be disastrous in IoT settings, in which prompt action is required [23].
  • Traditional approaches may only be able to detect anomalies that fit established attack patterns, making it difficult to identify innovative or complex attacks [26].
Table 1 present a comparative analysis of some the latest research papers. Also, Authors in [27,28,29] presents a detailed review of the application of deep learning in IoT environment. In addition to that, Refs. [30,31] presents a framework for IoT environment. From Table 1, it is clear that researchers are exploring the use of machine learning and deep learning techniques that can adapt to dynamic IoT environments, handle diverse data types, and provide more accurate and timely detection of cyber attacks [23,32].
DeepPower was proposed by Ding et al. [38] as a non-intrusive method for detecting active malware infections in IoT devices by analysing power side-channel data using deep learning. Using supervised machine learning techniques like Decision Tree, Fowdur et al. [39] explored the detection of dangerous traffic in IoT networks. In order to identify fraudulent packets in IoT settings, researchers have turned to deep learning models like LSTM and CNN. Taken together, these publications show that deep learning has promise as a method for identifying harmful behaviour in IoT systems.

3. Proposed Approch

3.1. Loss Function

In this research, we use the Cross-Entropy Loss function as a central part of our model’s optimisation. This loss function is crucial in determining the extent to which an attack categorization on network data deviates from the actual labels. Our model learns to discriminate between “Normal” and other types of attacks by minimising this loss during the course of training. Our deep learning-based solution to detecting attacks on networks carrying data from Internet of Things devices in the context of smart cities is underpinned by the Cross-Entropy Loss function. The loss function is calculated by the following equation [40]:
l ( x , y ) = L = { l 1 , , l N }
l n = c = 1 C w c log e x p ( x n , c ) i = 1 C e x p ( x n , i )
where ‘x’ is the input, ‘y’ is the target, ‘w’ is the weight, ‘C’ is the number of classes, and ‘N’ spans the batch dimension.

3.2. Optimiser

In this research, the Adam optimizer [41,42] played a significant role in our learning process. Adaptive Moment Estimation, or Adam for short, is a widely used and very effective optimisation approach for deep learning models. Because it is a hybrid of the RMSprop and Momentum optimisers, it can update model parameters quickly and accurately using gradients. Adam is well-suited for tasks like network traffic assault detection in IoT devices inside smart cities because of its dynamically adjustable learning rates for each parameter during training. As a consequence of this flexibility, the optimizer is better equipped to deal with dynamic loss landscapes, leading to quicker convergence and higher overall model performance. Using the Adam optimizer was critical in honing our deep learning architecture and improving the model’s sensitivity to assaults in network traffic. Adam’s algorithm is presented in Algorithm 1 [41,42].
Algorithm 1: Adam algorithm
Sensors 23 08686 i001

3.3. Model Architecture

The architecture of our network traffic attack detection model is presented in Figure 1. This model is a deep learning architecture that combines Convolutional Neural Networks (CNNs) and Gated Recurrent Units (GRUs) to effectively detect different types of network traffic attacks within the context of IoT devices in smart cities.
The model consists of several layers that are organised sequentially, as follows:
  • The initial layer, labelled ‘DeepLearning’, represents the overall architecture.
  • The first layer is a 1D convolutional layer (‘Conv1d’) with a depth of 32 and is designed to extract features from the input data. This layer has 1344 parameters.
  • The ‘ReLU’ activation layer follows the convolutional layer, introducing non-linearity to the model.
  • Next is a ‘MaxPool1d’ layer, which performs max-pooling to downsample the data and reduce its spatial dimensions.
  • This is followed by another convolutional layer (‘Conv1d’) which has a depth of 128, further extracting hierarchical features from the data. This layer has 4224 parameters.
  • Again, a ‘ReLU’ activation layer introduces non-linearity.
  • Subsequently, a ‘MaxPool1d’ layer performs max-pooling.
  • This is followed by the ‘GRU’ (Gated Recurrent Unit) layer, which has 128 units. GRUs are recurrent layers that can capture sequential patterns in the data.
  • The ‘Flatten’ layer reshapes the output from the previous layers into a flat vector.
  • Two fully connected (‘Linear’) layers follow, one with 64 and other with 5 output units. These layers have 8256 and 325 parameters, respectively.
  • ‘ReLU’ activation is applied to the first fully connected layer, introducing non-linearity.
  • A ‘Dropout’ layer is included for regularization, which helps prevent overfitting.
  • Finally, the last ‘Linear’ layer produces the model’s output with 5 units, corresponding to the different attack categories.
This model has a total of 14,165 parameters, all of which are trainable. It combines convolutional and recurrent layers to capture both spatial and sequential features in the network traffic data, making it well-suited for the task of network traffic attack detection in IoT devices for smart cities. The model’s architecture, as depicted in Figure 1, demonstrates its depth and complexity in effectively handling the task.

4. Results and Disscussion

4.1. Data Representation

In order to construct a reliable prostate cancer detection model, we performed a thorough examination of the dataset after data preprocessing (Figure 2). This allowed us to better understand the correlations between the various variables and the target variable. Box plots, a robust visualisation tool, were used for this purpose.

4.2. Accuracy and Loss Curves

In this study, we conducted experiments using a Kaggle dataset to train and evaluate our CNN- and GRU-based models for the detection of network traffic attacks in IoT devices within smart cities. Our training process consisted of 10 epochs, during which we monitored the performance of our model, as represented in Figure 3. The figures below illustrate the changes in training loss, training accuracy, test loss, and test accuracy over these epochs.
As the model learnt from the data, the training loss and training accuracy both decreased from their respective values during the first epoch (0.152987 and 95.42%). To evaluate the models’ capacity to generalise, we assessed both the test loss and test accuracy simultaneously. During the initial iteration, we saw a loss of 0.063867 and an accuracy of 97.51% in our tests. Both test loss and test accuracy increased during the course of training, proving that our models are capable of identifying malicious network data. Training loss reduced steadily over all 10 epochs, demonstrating that our models improved their ability to reflect the data. Our models did not suffer from overfitting the training data, as shown by a reduction in the test loss and an improvement in the test accuracy. These findings demonstrate the promise of CNN and GRU models for protecting IoT devices in smart cities from cyberattacks.

4.3. Classification Report

In our research, we used our CNN and GRU models to identify four distinct types of network traffic attacks in the context of the IoT deployed in smart cities. The model’s effectiveness against various types of attacks is summarised in the Classification Report (Figure 4). DoS, Probe, U2R, and Sybil attacks were considered.
For each attack category, we computed three key metrics: precision, recall, and F1-score. Precision measures the accuracy of positive predictions, recall gauges the model’s ability to identify true positive cases, and the F1-score is the harmonic mean of precision and recall. These metrics provide insights into the model’s effectiveness in correctly classifying different attack types. The “support” column in the classification report represents the number of instances in each class, indicating the distribution of attack types in the dataset.
Our model’s performance varies across attack categories. It excels in distinguishing Normal and DoS attacks, with exceptionally high precision, recall, and F1-scores of 0.99 and 1.00. For Probe attacks, our model exhibits a commendable performance with an F1-score of 0.99. However, it faces challenges in classifying U2R attacks, where the F1-score drops to 0.50 due to limited support (only 10 instances). Notably, the model’s ability to detect Sybil attacks is characterised by a reasonable F1-score of 0.77, emphasising its capability to identify this specific type of attack.
In terms of overall accuracy, our model achieves an impressive accuracy rate of 99% across all attack categories. The macro-average F1-score and weighted-average F1-score are 0.85 and 0.99, respectively, showcasing the model’s robust performance in classifying network traffic attacks in IoT devices for smart cities. These results demonstrate the effectiveness of our approach in improving the security of smart city IoT networks by accurately detecting various attack types.

4.4. Confussion Matrix

In our network traffic attack detection model, the confusion matrix is a valuable tool that provides a detailed breakdown of the model’s performance in classifying the different attack categories:, namely “Normal”, “DoS”, “Probe”, “U2R”, and “Sybil”. As represented in Figure 5, each row of the matrix corresponds to the true labels, while each column represents the predicted labels.
The confusion matrix illustrates the following key aspects of our model’s performance:
  • For “Normal” attacks, the majority of instances (13,287) are correctly classified as “Normal”, with only a small number of instances (11) mistakenly classified as “DoS” and a few instances (18) misclassified as “Probe”. Additionally, a few “Normal” instances are incorrectly classified as “U2R” and “Sybil”, with 2 and 71 instances, respectively.
  • For “DoS” attacks, the model demonstrates excellent performance, correctly classifying 9199 instances as “DoS”. There are very few false negatives (instances mistakenly classified as something other than “DoS”), with only 25 in total.
  • In the case of ‘Probe’ attacks, the model correctly identifies the majority of instances (2276), with just a couple of instances misclassified as ‘Normal’ and ’U2R’.
  • “U2R” attacks, being a relatively rare class with only 10 instances, have some misclassifications. Four instances are correctly classified, while six are incorrectly classified as “Normal”.
  • “Sybil” attacks are correctly identified for the most part, with 173 instances correctly classified and only 26 instances mistakenly classified as ‘Normal’.

5. Conclusions

The security of connected devices is of critical importance in today’s ever-changing IoT and smart city scene. In this research, we provide a systematic method for dealing with the critical problem of network traffic assaults in IoT ecosystems for smart cities. Our model uses a combination of CNNs and GRUs to identify and categorise a wide variety of attacks. We have shown the efficacy of our methodology via thorough research and assessment, attaining a remarkable overall accuracy of 99%. The model’s ability to differentiate between “Normal”, “DoS”, “Probe”, “U2R”, and “Sybil” attacks was highlighted in the classification report and confusion matrix, providing significant insights into the model’s strengths and areas for development. Incorporating the findings of this study into smart city infrastructure would greatly improve the safety of IoT devices. Our model provides a reliable method for detecting malicious network traffic by combining spatial and sequential feature extraction with the capability of deep learning. Our methodology makes a substantial contribution towards this important goal as the number of smart cities grows and the necessity for robust IoT security measures becomes more pressing. In the future, networked systems will form the basis of smart cities, and it is our goal that this study can pave the way for improvements in security.

Author Contributions

Conceptualization, B.B.G. and A.G.; methodology, A.G. and V.A.; software, K.T.C. and P.C.; validation, B.B.G. and V.A.; formal analysis, A.G.; investigation, K.T.C. and V.A.; resources, K.T.C. and B.B.G.; data curation, A.G.; writing—original draft preparation, A.G., B.B.G. and P.C.; writing—review and editing, B.B.G., P.C. and V.A.; visualization, V.A.; supervision, B.B.G.; project administration, B.B.G., V.A. and K.T.C.; funding acquisition, B.B.G. All authors have read and agreed to the published version of the manuscript.

Funding

This research work is supported by National Science and Technology Council (NSTC), Taiwan Grant No. NSTC112-2221-E-468-008-MY3.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Some or all data, models, or code that support the findings of this study are available upon reasonable request from the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Tiwari, A.; Garg, R. Adaptive Ontology-Based IoT Resource Provisioning in Computing Systems. Int. J. Semant. Web Inf. Syst. 2022, 18, 1–18. [Google Scholar] [CrossRef]
  2. Raj, M.G.; Pani, S.K. Chaotic whale crow optimization algorithm for secure routing in the IoT environment. Int. J. Semant. Web Inf. Syst. 2022, 18, 1–25. [Google Scholar] [CrossRef]
  3. Srivastava, A.M.; Rotte, P.A.; Jain, A.; Prakash, S. Handling data scarcity through data augmentation in training of deep neural networks for 3D data processing. Int. J. Semant. Web Inf. Syst. 2022, 18, 1–16. [Google Scholar] [CrossRef]
  4. Khanam, S.; Tanweer, S.; Khalid, S.S. Future of Internet of Things: Enhancing Cloud-Based IoT Using Artificial Intelligence. Int. J. Cloud Appl. Comput. 2022, 12, 1–23. [Google Scholar]
  5. Kiran, M.A.; Pasupuleti, S.K.; Eswari, R. Efficient Pairing-Free Identity-Based Signcryption Scheme for Cloud-Assisted IoT. Int. J. Cloud Appl. Comput. 2022, 12, 1–15. [Google Scholar]
  6. Rath, M.; Pattanayak, B. Technological improvement in modern health care applications using internet of things (iot) and proposal of novel health care approach. Int. J. Hum. Rights Healthc. 2019, 12, 148–162. [Google Scholar] [CrossRef]
  7. Farahani, B.; Firouzi, F.; Chang, V.; Badaroglu, M.; Constant, N.; Mankodiya, K. Towards fog-driven iot ehealth: Promises and challenges of iot in medicine and healthcare. Future Gener. Comput. Syst. 2018, 78, 659–676. [Google Scholar] [CrossRef]
  8. Kumar, R.; Singh, S.K.; Lobiyal, D.; Chui, K.T.; Santaniello, D.; Rafsanjani, M.K. A Novel Decentralized Group Key Management Scheme for Cloud-Based Vehicular IoT Networks. Int. J. Cloud Appl. Comput. 2022, 12, 1–34. [Google Scholar]
  9. Jacobs, N.; Edwards, P.; Markovic, M.; Cottrill, C.; Salt, K. Who trusts in the smart city? transparency, governance, and the internet of things. Data Policy 2020, 2, E11. [Google Scholar] [CrossRef]
  10. Bibri, S. The iot for smart sustainable cities of the future: An analytical framework for sensor-based big data applications for environmental sustainability. Sustain. Cities Soc. 2018, 38, 230–253. [Google Scholar] [CrossRef]
  11. Suryotrisongko, H.; Ananto, P. The potential of microservice architecture for internet of things (iot) in smart city, a literature review. J. Ilm. Kursor 2017, 9, 9–14. [Google Scholar] [CrossRef]
  12. Janssen, M.; Luthra, S.; Mangla, S.; Rana, N.; Dwivedi, Y. Challenges for adopting and implementing iot in smart cities. Internet Res. 2019, 29, 1589–1616. [Google Scholar] [CrossRef]
  13. Avila-Garzon, C.; Balaguera, M.; Tabares-Morales, V. An Agent-Based Social Simulation for Citizenship Competences and Conflict Resolution Styles. Int. J. Semant. Web Inf. Syst. 2022, 18, 1–23. [Google Scholar] [CrossRef]
  14. Tembhurne, J.V.; Almin, M.M.; Diwan, T. Mc-DNN: Fake news detection using multi-channel deep neural networks. Int. J. Semant. Web Inf. Syst. 2022, 18, 1–20. [Google Scholar] [CrossRef]
  15. Ling, Z.; Hao, Z.J. Intrusion detection using normalized mutual information feature selection and parallel quantum genetic algorithm. Int. J. Semant. Web Inf. Syst. 2022, 18, 1–24. [Google Scholar] [CrossRef]
  16. Boulos, M.; Al-Shorbaji, N. On the internet of things, smart cities and the who healthy cities. Int. J. Health Geogr. 2014, 13, 10. [Google Scholar] [CrossRef]
  17. Alaiz-Moretón, H.; Aveleira-Mata, J.; Ondicol-Garcia, J.; Muñoz-Castañeda, A.; García-Rodríguez, I.; Benavides, C. Multiclass classification procedure for detecting attacks on mqtt-iot protocol. Complexity 2019, 2019, 6516253. [Google Scholar] [CrossRef]
  18. Madhu, S.; Padunnavalappil, S.; Saajlal, P.P.; Vasudevan, V.A.; Mathew, J. Powering up an IoT-enabled smart home: A solar powered smart inverter for sustainable development. Int. J. Softw. Sci. Comput. Intell. 2022, 14, 1–21. [Google Scholar] [CrossRef]
  19. Sharma, R.; Sharma, N. Attacks on resource-constrained IoT devices and security solutions. Int. J. Softw. Sci. Comput. Intell. 2022, 14, 1–21. [Google Scholar] [CrossRef]
  20. Al-Qerem, A.; Alauthman, M.; Almomani, A.; Gupta, B.B. IoT transaction processing through cooperative concurrency control on fog–cloud computing environment. Soft Comput. 2020, 24, 5695–5711. [Google Scholar] [CrossRef]
  21. Battula, S.K.; Naha, R.K.; Kc, U.; Hameed, K.; Garg, S.; Amin, M.B. Mobility-Based Resource Allocation and Provisioning in Fog and Edge Computing Paradigms: Review, Challenges, and Future Directions. In Mobile Edge Computing; Springer: Cham, Switzerland, 2021; pp. 251–279. [Google Scholar]
  22. Gupta, B.B.; Quamara, M. An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols. Concurr. Comput. Pract. Exp. 2020, 32, e4946. [Google Scholar] [CrossRef]
  23. Hussain, F.; Hussain, R.; Hassan, S.; Hossain, E. Machine learning in iot security: Current solutions and future challenges. IEEE Commun. Surv. Tutorials 2020, 22, 1686–1721. [Google Scholar] [CrossRef]
  24. Haji, S.; Ameen, S. Attack and anomaly detection in iot networks using machine learning techniques: A review. Asian J. Res. Comput. Sci. 2021, 9, 30–46. [Google Scholar] [CrossRef]
  25. Vaccari, I.; Chiola, G.; Aiello, M.; Mongelli, M.; Cambiaso, E. Mqttset, a new dataset for machine learning techniques on mqtt. Sensors 2020, 20, 6578. [Google Scholar] [CrossRef] [PubMed]
  26. Xie, L.; Ni, H.; Yang, H.; Zhang, J. A key business node identification model for internet of things security. Secur. Commun. Netw. 2020, 2020, 6654283. [Google Scholar] [CrossRef]
  27. Tayyab, M.; Marjani, M.; Jhanjhi, N.; Hashem, I.A.T.; Usmani, R.S.A.; Qamar, F. A Comprehensive Review on Deep Learning Algorithms: Security and Privacy Issues. Comput. Secur. 2023, 131, 103297. [Google Scholar] [CrossRef]
  28. Deepa, N.; Pham, Q.V.; Nguyen, D.C.; Bhattacharya, S.; Prabadevi, B.; Gadekallu, T.R.; Maddikunta, P.K.R.; Fang, F.; Pathirana, P.N. A survey on blockchain for big data: Approaches, opportunities, and future directions. Future Gener. Comput. Syst. 2022, 131, 209–226. [Google Scholar] [CrossRef]
  29. Maleh, Y.; Shojafar, M.; Alazab, M.; Romdhani, I. Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications; CRC Press: Boca Raton, FL, USA, 2020. [Google Scholar]
  30. Lian, G. Blockchain-Based Secure and Trusted Distributed International Trade Big Data Management System. Mob. Inf. Syst. 2022, 2022, 7585288. [Google Scholar] [CrossRef]
  31. Tayyab, M.; Marjani, M.; Jhanjhi, N.; Hashim, I.A.T.; Almazroi, A.A.; Almazroi, A.A. Cryptographic based secure model on dataset for deep learning algorithms. CMC Comput. Mater. Contin. 2021, 69, 1183–1200. [Google Scholar] [CrossRef]
  32. Ahmed, K.; Tahir, M.; Habaebi, M.; Lau, S.; Ahad, A. Machine learning for authentication and authorization in iot: Taxonomy, challenges and future research direction. Sensors 2021, 21, 5122. [Google Scholar] [CrossRef]
  33. Sharma, B.; Sharma, L.; Lal, C.; Roy, S. Explainable artificial intelligence for intrusion detection in IoT networks: A deep learning based approach. Expert Syst. Appl. 2023, 238, 121751. [Google Scholar] [CrossRef]
  34. Azimjonov, J.; Kim, T. Stochastic gradient descent classifier-based lightweight intrusion detection systems using the efficient feature subsets of datasets. Expert Syst. Appl. 2024, 237, 121493. [Google Scholar] [CrossRef]
  35. Feng, X.; Xia, H.; Xu, S.; Xu, L.; Zhang, R. TSGS: Two-stage security game solution based on deep reinforcement learning for Internet of Things. Expert Syst. Appl. 2023, 234, 120965. [Google Scholar] [CrossRef]
  36. Akshaya, V.; Mandala, V.; Anilkumar, C.; VishnuRaja, P.; Aarthi, R. Security enhancement and attack detection using optimized hybrid deep learning and improved encryption algorithm over Internet of Things. Meas. Sens. 2023, 30, 100917. [Google Scholar]
  37. Muna, R.K.; Hossain, M.I.; Alam, M.G.R.; Hassan, M.M.; Ianni, M.; Fortino, G. Demystifying machine learning models of massive IoT attack detection with Explainable AI for sustainable and secure future smart cities. Internet Things 2023, 24, 100919. [Google Scholar] [CrossRef]
  38. Ding, F.; Li, H.; Luo, F.; Hu, H.; Cheng, L.; Xiao, H.; Ge, R. DeepPower: Non-intrusive and deep learning-based detection of IoT malware using power side channels. In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, New York, NY, USA, 5–9 October 2020; pp. 33–46. [Google Scholar]
  39. Fowdur, H.; Armoogum, S.; Suddul, G.; Armoogum, V. Detecting Malicious IoT Traffic using Supervised Machine Learning Algorithms. In Proceedings of the 2022 IEEE Zooming Innovation in Consumer Technologies Conference (ZINC), Novi Sad, Serbia, 25–26 May 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 209–213. [Google Scholar]
  40. CrossEntropyLoss. Available online: https://pytorch.org/docs/stable/generated/torch.nn.CrossEntropyLoss.html (accessed on 3 October 2023).
  41. Adam. Available online: https://pytorch.org/docs/stable/generated/torch.optim.Adam.html (accessed on 3 October 2023).
  42. Kingma, D.P.; Ba, J. Adam: A method for stochastic optimization. arXiv 2014, arXiv:1412.6980. [Google Scholar]
Figure 1. Model architecture.
Figure 1. Model architecture.
Sensors 23 08686 g001
Figure 2. Data representaiton. (a) Attack map representation; (b) Protocol vs. attack type; (c) Flag vs. attack type; (d) Service vs. attack type; (e) Destination host server count vs. attack type; (f) Destination host server rate vs. attack type; (g) Destination host server port rate vs. attack type; (h) Correlation.
Figure 2. Data representaiton. (a) Attack map representation; (b) Protocol vs. attack type; (c) Flag vs. attack type; (d) Service vs. attack type; (e) Destination host server count vs. attack type; (f) Destination host server rate vs. attack type; (g) Destination host server port rate vs. attack type; (h) Correlation.
Sensors 23 08686 g002aSensors 23 08686 g002bSensors 23 08686 g002c
Figure 3. Loss and accuracy curves. (a) Training and test accuracy. (b) Training and test loss.
Figure 3. Loss and accuracy curves. (a) Training and test accuracy. (b) Training and test loss.
Sensors 23 08686 g003
Figure 4. Classification Report.
Figure 4. Classification Report.
Sensors 23 08686 g004
Figure 5. Confussion Matrix.
Figure 5. Confussion Matrix.
Sensors 23 08686 g005
Table 1. Analysis of recent papers.
Table 1. Analysis of recent papers.
Ref.DatasetMethodAccuracyPrecisionF1Recall
[33]NSL-KDD1D-CNN0.9910.990.99
2D-CNN0.99111
UNSW-NB 151D-CNN0.800.480.060.10
2D-CNN0.810.570.040.07
[34]KDD-CUP-1999Stochastic gradient descent classifier (SGDC)0.99610.97240.97130.9718
BotIoT-2018SGDC0.880.94030.92850.9344
N-BaIoT-2021SGDC0.96910.99790.95130.9089
[35]NAGame TheoryNANANANA
[36]NSL-KDDHybrid-CNN0.920.900.850.81
[37]OTD20XG-Boost0.86111
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Gupta , B.B.; Chui, K.T.; Gaurav , A.; Arya , V.; Chaurasia , P. A Novel Hybrid Convolutional Neural Network- and Gated Recurrent Unit-Based Paradigm for IoT Network Traffic Attack Detection in Smart Cities. Sensors 2023, 23, 8686. https://doi.org/10.3390/s23218686

AMA Style

Gupta  BB, Chui KT, Gaurav  A, Arya  V, Chaurasia  P. A Novel Hybrid Convolutional Neural Network- and Gated Recurrent Unit-Based Paradigm for IoT Network Traffic Attack Detection in Smart Cities. Sensors. 2023; 23(21):8686. https://doi.org/10.3390/s23218686

Chicago/Turabian Style

Gupta , Brij B., Kwok Tai Chui, Akshat Gaurav , Varsha Arya , and Priyanka Chaurasia . 2023. "A Novel Hybrid Convolutional Neural Network- and Gated Recurrent Unit-Based Paradigm for IoT Network Traffic Attack Detection in Smart Cities" Sensors 23, no. 21: 8686. https://doi.org/10.3390/s23218686

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop