This is an unedited manuscript accepted for publication and provided as an Article in Press for early access at the author’s request. The article will undergo copyediting, typesetting, and galley proof review before final publication. Please be aware that errors may be identified during production that could affect the content. All legal disclaimers of the journal apply.
Shweta Waghmare,
Sandeep Waghmare,
- Assistant Professor, Department of MCA, Thakur Institute of Management Studies, Career Development & Research Mumbai, Maharashtra, India
- Associate Systems Engineer, Department of MCA, Thakur Institute of Management Studies, Career Development & Research Mumbai, Maharashtra, India
Abstract
Smart city infrastructures increasingly rely on interconnected surveillance systems to ensure safety, operational efficiency, and public trust. However, the rapid expansion of IoT-based monitoring technologies has introduced new cyber risks, especially in high-density metropolitan areas. This paper proposes an AI-driven cyber resilience framework targeting smart surveillance infrastructure as a critical smart-living domain, focusing on Mumbai as a case study. Using the CIC-IDS2017 dataset, a machine learning-based intrusion detection model is developed to identify and classify cyber attacks affecting video surveillance networks. The framework integrates real- time anomaly detection, zero-trust access enforcement, and resilience assessment to strengthen security posture against advanced threats. The study highlights common attack vectors and vulnerabilities within smart city surveillance ecosystems and demonstrates improved detection accuracy in identifying malicious network activity. The findings emphasize the need for cybersecurity-aware governance and scalable AI solutions to protect national digital infrastructure.
Keywords: Smart City Security, Cyber Resilience, Artificial Intelligence, Smart Surveillance, Intrusion Detection, Machine Learning, Mumbai, CIC-IDS 2017
Shweta Waghmare, Sandeep Waghmare. AI-Based Cybersecurity Framework for Protecting Smart Surveillance Infrastructure in Mumbai. Journal Of Network security. 2026; 14(01):-.
Shweta Waghmare, Sandeep Waghmare. AI-Based Cybersecurity Framework for Protecting Smart Surveillance Infrastructure in Mumbai. Journal Of Network security. 2026; 14(01):-. Available from: https://journals.stmjournals.com/jons/article=2026/view=241113
References
- Viksit Bharat 2047: Vision for a Developed Nation, accessed on Nov. 24, 2025. [Online]. Available: https://viksitindia.com/
- Press Information Bureau, “Transforming India with AI,” accessed on Nov. 24, 2025. [Online]. Available: https://www.pib.gov.in/PressReleasePage.aspx?PRID=2178092
- Ambimat Electronics, “Zero-Trust IoT Security for Smart Cities,” accessed on Nov. 24, 2025. [Online]. Available: https://ambimat.com/zero-trust-iot-security-for-smart-cities/
- Cybersecurity and Infrastructure Security Agency (CISA), “Cybersecurity Best Practices for Smart Cities,” 2023, accessed on Nov. 24, 2025. [Online]. Available: https://www.cisa.gov/sites/default/files/2023-04/cybersecurity- best-practices-for-smart-cities_508.pdf
- ET Edge Insights, “The human firewall: India’s next frontier in digital security,” accessed on 24, 2025. [Online]. Available: https://etedge-insights.com/technology/cyber- security/the-human-firewall-indias-next-frontier-in-digital- security/
- World Economic Forum, “Building security into India’s digital public infrastructure,” accessed on Nov. 24, 2025. [Online]. Available: https://www.weforum.org/stories/2025/10/security-by-design- india-digital-public-infrastructure/
- ANI News, “Experts Convene in Delhi to Shape India’s Sustainable Urban Development Agenda,” accessed on Nov. 24, [Online]. Available: https://www.aninews.in/news/business/experts-convene-in- delhi-to-shape-indias-sustainable-urban-development- agenda20251120133551
- Cogniteq, “Implementing Zero Trust Architecture in IoT Networks,” accessed on 24, 2025. [Online]. Available: https://www.cogniteq.com/blog/implementing-zero-trust- architecture-iot-networks
- MIDC, IT-ITES Policy 2015, accessed on Nov. 24, 2025. [Online]. Available: https://www.midcindia.org/wp- content/uploads/2021/09/IT-ITES_Policy_2015.pdf
- Cretum Advisory, “Maharashtra IT and ITES Policy,” accessed on Nov. 24, 2025. [Online]. Available: https://cretumadvisory.com/blog/maharashtra-it-and-ites-policy/
- InSec, “Securing India’s Smart Cities – Cybersecurity Challenges and Solutions,” accessed on 24, 2025. [Online]. Available: https://insec.in/cybersecurity-challenges-in-indias- smart-cities/
- Unit 42, Palo Alto Networks, “CVE-2021-28372: Vulnerability in Third-Party Technology Leaving IP Cameras and Surveillance Systems Vulnerable,” accessed on Nov. 24, 2025. [Online]. Available: https://unit42.paloaltonetworks.com/iot- supply-chain-cve-2021-28372/
- PwC India, “Creating cyber secure smart cities,” 2018, accessed on 24, 2025. [Online]. Available: https://www.pwc.in/assets/pdfs/publications/2018/creating- cyber-secure-smart-cities.pdf
- CyberPeace Foundation, “MHA Directs Stronger Cybersecurity in India’s Smart Cities,” accessed on 24, 2025. [Online]. Available: https://www.cyberpeace.org/resources/blogs/mha-directs- stronger-cybersecurity-in-indias-smart-cities
- “Reliability and Resilience of AI-Driven Critical Network Infrastructure Under Cyber-Physical Threats,” arXiv, accessed on 24, 2025. [Online]. Available: https://arxiv.org/pdf/2510.19295
- “Deep Transfer Learning for Intrusion Detection in Industrial Control Networks: A Comprehensive Review,” arXiv, accessed on Nov. 24, 2025. [Online]. Available: https://arxiv.org/html/2304.10550v2
- University of New Brunswick, “Intrusion Detection Evaluation Dataset (CIC-IDS2017),” accessed on 24, 2025. [Online]. Available: https://www.unb.ca/cic/datasets/ids- 2017.html
- “A Framework for Cyber Threat Modeling and Risk Assessment in Smart City Environments,” Frontiers in Computer Science, accessed on Nov. 24, 2025. [Online]. Available: https://frontiersin.org/articles/10.3389/fcomp.2025.164717 9/full
- IEEE Xplore, “A Review of Intrusion Detection for IoT Using Machine Learning,” accessed on 24, 2025. [Online]. Available: https://ieeexplore.ieee.org/document/10803135
- IEEE Xplore, “A Systematic Review of Intrusion Detection Systems in IoT Using ML and DL,” accessed on 24, 2025. [Online]. Available: https://ieeexplore.ieee.org/document/10099142
- IT Butler, “AI-Enhanced Network Monitoring: Real-Time Anomaly Detection Explained,” accessed on Nov. 24, 2025. [Online]. Available: https://itbutler.sa/blog/ai-enhanced- network-monitoring-real-time-anomaly-detection/
- PMC, “An IoT-Enabled Anomaly Detection System for Smart City Surveillance,” accessed on Nov. 24, 2025. [Online]. Available: https://pmc.ncbi.nlm.nih.gov/articles/PMC9966604/
- IEEE Xplore, “Intrusion Detection System (IDS) Classifications Using ML,” accessed on 24, 2025. [Online]. Available: https://ieeexplore.ieee.org/document/10730038/
- MDPI, “Ensemble Learning Framework for Anomaly Detection in Autonomous Driving Systems,” accessed on Nov. 24, 2025. [Online]. Available: https://www.mdpi.com/1424- 8220/25/16/5105
- IEEE Xplore, “Ensemble Learning Methods for Anomaly Intrusion Detection in Smart Grid,” accessed on Nov. 24, 2025. [Online]. Available: https://ieeexplore.ieee.org/document/9491891
- ResearchGate, “Integrating Machine Learning with Zero Trust Principles for Real-Time Threat Detection and Response,” accessed on 24, 2025. [Online]. Available: https://www.researchgate.net/publication/395804705_Integratin g_Machine_Learning_with_Zero_Trust_Principles_for_Real- Time_Threat_Detection_and_Response_MUKUL_MANGLA
- Taylor & Francis Online, “Towards a Framework for Improving Cyber Security Resilience of Critical Infrastructure,” accessed on Nov. 24, 2025. [Online]. Available: https://www.tandfonline.com/doi/full/10.1080/12460125.2025.2 479546
- org, “AI-Driven Routing: Transforming Network Efficiency and Resilience,” accessed on Nov. 24, 2025. [Online]. Available: https://www.preprints.org/manuscript/202502.2005
- IEEE Xplore, “Securing Urban Landscape: Cybersecurity Mechanisms for Resilient Smart Cities,” accessed on Nov. 24, [Online]. Available: https://ieeexplore.ieee.org/iel8/6287639/10820123/10813375.pd f
- IEEE Xplore, “Cyber Resilience in Smart Cities Using Bi- LSTM-Based Intrusion Detection System,” accessed on 24, 2025. [Online]. Available: https://ieeexplore.ieee.org/document/11033050
- PMC, “Evaluation of Machine Learning Techniques for Traffic Flow-Based Intrusion Detection,” accessed on Nov. 24, [Online]. Available: https://pmc.ncbi.nlm.nih.gov/articles/PMC9740321/
- SciTePress, “Network Intrusion Detection: A Comprehensive Analysis of CIC-IDS2017,” accessed on 24, 2025. [Online]. Available: https://www.scitepress.org/Papers/2022/107740/107740.pdf
- IEEE Xplore, “Machine Learning in Network Intrusion Detection: A Cross-Dataset Generalization Study,” accessed on 24, 2025. [Online]. Available: https://ieeexplore.ieee.org/document/10704637
- ResearchGate, “Feature Selection Techniques for Efficient Intrusion Detection Using ML and DL,” accessed on Nov. 24, [Online]. Available: https://www.researchgate.net/publication/390746793_Feature_S election_Techniques_for_Efficient_Intrusion_Detection_Using_ Machine_Learning_and_Deep_Learning
- Sriwijaya University, “Important Features of CICIDS-2017 Dataset for Anomaly Detection,” accessed on Nov. 24, 2025. [Online]. Available: https://repository.unsri.ac.id/59517/1/Article-IJEEI- Important%20Features%20of%20CICIDS-2017%20Dataset.pdf
- ResearchGate, “Top 10 Features of CICIDS2017 Dataset,” accessed on 24, 2025. [Online]. Available: https://www.researchgate.net/figure/This-chart-highlights-the- top-10-features-in-the-CICIDS2017-dataset-based-on- their_fig3_377248675
- Kaggle, “Network Intrusion Dataset (CIC-IDS-2017),” accessed on 24, 2025. [Online]. Available: https://www.kaggle.com/datasets/chethuhn/network-intrusion- dataset
- WhizHack, “How OT Cybersecurity Protects India’s Smart Cities from Emerging Threats,” accessed on Nov. 24, 2025. [Online]. Available: https://whizhack.com/blog/how-ot- cybersecurity-protects-indias-smart-cities-from-emerging-threats
- arXiv, “Securing Tomorrow’s Smart Cities: Investigating Software Security in Internet of Vehicles and Deep Learning Technologies,” accessed on Nov. 24, 2025. [Online]. Available: https://arxiv.org/abs/2407.16410
- IEEE Xplore, “Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research,” accessed on Nov. 24, 2025. [Online]. Available: https://ieeexplore.ieee.org/document/09875264

Journal Of Network security
| Volume | 14 |
| 01 | |
| Received | 26/12/2025 |
| Accepted | 13/02/2026 |
| Published | 27/04/2026 |
| Publication Time | 122 Days |
Login
PlumX Metrics