Show simple item record
dc.contributor.advisor |
Hájek, Petr |
|
dc.contributor.author |
Kebede, Zeru Kifle
|
|
dc.date.accessioned |
2023-08-15T07:58:39Z |
|
dc.date.available |
2023-08-15T07:58:39Z |
|
dc.date.issued |
2023 |
|
dc.date.submitted |
2023-04-30 |
|
dc.identifier.uri |
https://hdl.handle.net/10195/81631 |
|
dc.description.abstract |
Nowadays, IoT and smart cities are increasingly becoming popular topics among both researchers and practitioners. IoT applications are the main backbone for building a smart city.
Many governments use IoT applications to provide better services for their citizens, and other
non-governmental organizations also use them to provide better services and products for their
customers. Moreover, the day-to-day activities of society and device interactions in a smart
city are carried out over IoT applications. Conversely, new and intelligent attacks are greatly
increasing due to the behavior of these applications. As a result, security becomes one of the
most crucial concerns that need to be addressed. To date, several intrusion detection models
have been proposed by several researchers for ensuring the security of IoT devices in the smart
city. In this thesis, I proposed deep neural network-based models MLP, LSTM, and GRU for
detecting binary and muti-class IoT cyber attacks, using an imbalanced big data set. The most
recent datasets, UNSW-NB15 and CICIDS 2017, were used for model training and evaluation,
which are enhanced by a variety of recently added cyber attacks. The experimental results
for the UNSW-NB15 dataset show that the MLP model outperformed other models in terms
of recall, precision, F1-score, and FPR (false positive rate) with values of 99.17%, 99.17%,
99.17%, and 0.0037, respectively. Furthermore, the LSTM model achieved a higher accuracy
of 99.26%. In the case of conventional and ensemble models, Random Forest outclasses other
models with respect to all metrics when trained and evaluated with the UNSW-NB15 dataset.
Further, when the dataset CICIDS2017 was used for training and evaluating the Random Forest model, it outperformed other conventional and ensemble methods. Among the deep neural
network models, the MLP model classified attacks with the accuracy of 98.10%, precision of
98.20%, F1-score of 98.12%, and FPR of 0.0202, which makes it the best-performing deep
learning model. |
eng |
dc.format |
83 s. |
|
dc.language.iso |
eng |
|
dc.publisher |
Univerzita Pardubice |
cze |
dc.rights |
Bez omezení |
|
dc.subject |
IoT |
eng |
dc.subject |
Cyber Attack |
eng |
dc.subject |
Smart City |
eng |
dc.subject |
Attack Detection |
eng |
dc.subject |
Deep Learning |
eng |
dc.subject |
Big Data |
eng |
dc.title |
Detection of IoT Cyberattacks in Smart Cities using Deep Neural Networks |
eng |
dc.type |
diplomová práce |
cze |
dc.contributor.referee |
Hub, Miloslav |
|
dc.date.accepted |
2023-06-07 |
|
dc.description.department |
Fakulta ekonomicko-správní |
cze |
dc.thesis.degree-discipline |
Informatics in Public Administration |
cze |
dc.thesis.degree-name |
Ing. |
|
dc.thesis.degree-grantor |
Univerzita Pardubice. Fakulta ekonomicko-správní |
cze |
dc.thesis.degree-program |
Informatics and System Engineering |
cze |
dc.description.defence |
The student defended master thesis named: Detection of IoT Cyberattacks in Smart Cities using Deep Neural Networks. Aim of thesis is to summarize existing approaches to detecting IoT cyber-attacks, propose a DNN-based model for detecting IoT cyber-attacks, validate the model using datasets relevant to smart cities, and discuss implications of the results for smart cities.
Questions and suggestions for defense by supervisor and reviewer
Deep learning models detect most cyber-attacks with high accuracy. However, some attacks have proven to be resistant to detection. Try to explain these results.
What are the implications of further IoT expansion for cyber-attack detection?
The quantitative indicators on page 42 indicate that you give equal weight to False Positive (FP) and False Negative (FN) errors, while the consequences of these errors are very different. How do you deal with this fact?
Based on your work, can you formulate any security measures that will reduce the risk of some IoT attacks being successful?
The student responded to the commissions questions. |
eng |
dc.identifier.stag |
45519 |
|
dc.description.grade |
Dokončená práce s úspěšnou obhajobou |
cze |
This item appears in the following Collection(s)
Show simple item record
|
Search DSpace
Browse
-
All of DSpace
-
This Collection
My Account
|