Improved mitigation of cyber threats in iiot for smart cities: A new-era approach and scheme

Semi Park, Kyungho Lee

Research output: Contribution to journalArticlepeer-review

Abstract

Cybersecurity in Industrial Internet of Things (IIoT) has become critical as smart cities are becoming increasingly linked to industrial control systems (ICSs) used in critical infrastructure. Consequently, data-driven security systems for analyzing massive amounts of data generated by smart cities have become essential. A representative method for analyzing large-scale data is the game bot detection approach used in massively multiplayer online role-playing games. We reviewed the literature on bot detection methods to extend the anomaly detection approaches used in bot detection schemes to IIoT fields. Finally, we proposed a process wherein the data envelopment analysis (DEA) model was applied to identify features for efficiently detecting anomalous behavior in smart cities. Experimental results using random forest show that our extracted features based on a game bot can achieve an average F1-score of 0.99903 using 10-fold validation. We confirmed the applicability of the analyzed game-industry methodology to other fields and trained a random forest on the high-efficiency features identified by applying a DEA, obtaining an F1-score of 0.997 using the validation set approach. In this study, an anomaly detection method for analyzing massive smart city data based on a game industry methodology was presented and applied to the ICS dataset.

Original languageEnglish
Article number1976
Pages (from-to)1-17
Number of pages17
JournalSensors
Volume21
Issue number6
DOIs
Publication statusPublished - 2021 Mar 2

Keywords

  • Anomaly detection
  • Cybersecurity
  • Data envelopment analysis
  • Industrial control systems
  • Smart city

ASJC Scopus subject areas

  • Analytical Chemistry
  • Biochemistry
  • Atomic and Molecular Physics, and Optics
  • Instrumentation
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Improved mitigation of cyber threats in iiot for smart cities: A new-era approach and scheme'. Together they form a unique fingerprint.

Cite this