Detection of IoT Cyberattacks in Smart Cities using Deep Neural Networks

Zobrazit minimální záznam

dc.contributor.advisor Hájek, Petr
dc.contributor.author Kebede, Zeru Kifle
dc.date.accessioned 2023-08-15T07:58:39Z
dc.date.available 2023-08-15T07:58:39Z
dc.date.issued 2023
dc.date.submitted 2023-04-30
dc.identifier.uri https://hdl.handle.net/10195/81631
dc.description.abstract Nowadays, IoT and smart cities are increasingly becoming popular topics among both researchers and practitioners. IoT applications are the main backbone for building a smart city. Many governments use IoT applications to provide better services for their citizens, and other non-governmental organizations also use them to provide better services and products for their customers. Moreover, the day-to-day activities of society and device interactions in a smart city are carried out over IoT applications. Conversely, new and intelligent attacks are greatly increasing due to the behavior of these applications. As a result, security becomes one of the most crucial concerns that need to be addressed. To date, several intrusion detection models have been proposed by several researchers for ensuring the security of IoT devices in the smart city. In this thesis, I proposed deep neural network-based models MLP, LSTM, and GRU for detecting binary and muti-class IoT cyber attacks, using an imbalanced big data set. The most recent datasets, UNSW-NB15 and CICIDS 2017, were used for model training and evaluation, which are enhanced by a variety of recently added cyber attacks. The experimental results for the UNSW-NB15 dataset show that the MLP model outperformed other models in terms of recall, precision, F1-score, and FPR (false positive rate) with values of 99.17%, 99.17%, 99.17%, and 0.0037, respectively. Furthermore, the LSTM model achieved a higher accuracy of 99.26%. In the case of conventional and ensemble models, Random Forest outclasses other models with respect to all metrics when trained and evaluated with the UNSW-NB15 dataset. Further, when the dataset CICIDS2017 was used for training and evaluating the Random Forest model, it outperformed other conventional and ensemble methods. Among the deep neural network models, the MLP model classified attacks with the accuracy of 98.10%, precision of 98.20%, F1-score of 98.12%, and FPR of 0.0202, which makes it the best-performing deep learning model. eng
dc.format 83 s.
dc.language.iso eng
dc.publisher Univerzita Pardubice cze
dc.rights Bez omezení
dc.subject IoT eng
dc.subject Cyber Attack eng
dc.subject Smart City eng
dc.subject Attack Detection eng
dc.subject Deep Learning eng
dc.subject Big Data eng
dc.title Detection of IoT Cyberattacks in Smart Cities using Deep Neural Networks eng
dc.type diplomová práce cze
dc.contributor.referee Hub, Miloslav
dc.date.accepted 2023-06-07
dc.description.department Fakulta ekonomicko-správní cze
dc.thesis.degree-discipline Informatics in Public Administration cze
dc.thesis.degree-name Ing.
dc.thesis.degree-grantor Univerzita Pardubice. Fakulta ekonomicko-správní cze
dc.thesis.degree-program Informatics and System Engineering cze
dc.description.defence The student defended master thesis named: Detection of IoT Cyberattacks in Smart Cities using Deep Neural Networks. Aim of thesis is to summarize existing approaches to detecting IoT cyber-attacks, propose a DNN-based model for detecting IoT cyber-attacks, validate the model using datasets relevant to smart cities, and discuss implications of the results for smart cities. Questions and suggestions for defense by supervisor and reviewer Deep learning models detect most cyber-attacks with high accuracy. However, some attacks have proven to be resistant to detection. Try to explain these results. What are the implications of further IoT expansion for cyber-attack detection? The quantitative indicators on page 42 indicate that you give equal weight to False Positive (FP) and False Negative (FN) errors, while the consequences of these errors are very different. How do you deal with this fact? Based on your work, can you formulate any security measures that will reduce the risk of some IoT attacks being successful? The student responded to the commissions questions. eng
dc.identifier.stag 45519
dc.description.grade Dokončená práce s úspěšnou obhajobou cze


Tento záznam se objevuje v následujících kolekcích

Zobrazit minimální záznam

Vyhledávání


Rozšířené hledání

Procházet

Můj účet