Enhancing intrusion detection using coati optimization algorithm with deep learning on vehicular Adhoc networks

被引:1
作者
Sarathkumar K. [1 ]
Sudhakar P. [1 ]
Kanmani A.C. [2 ]
机构
[1] Department of Computer Science and Engineering, Annamalai University, Chidambaram
[2] Computer Science and Engineering, PES University, Bangalore
关键词
Coati optimization algorithm; Deep learning; IDS; Intelligent transportation system; VANET;
D O I
10.1007/s41870-024-01827-9
中图分类号
学科分类号
摘要
Vehicular ad hoc networks (VANETs) role a vital play in allowing technology for future cooperative intelligent transportation systems (CITSs). Vehicles in VANETs transmit real-time data on their movement, traffic, and road conditions. Nevertheless, VANETs can vulnerable to cyberattacks, which causes serious conditions or road congestion. Intrusion detection systems (IDSs) depends on the cooperation among vehicles to identify intruders are mostly proposed security solutions for VANETs. Evolving a more efficient and effective IDS for VANETs is vital because of these networks’ unique problems and vulnerabilities. This article develops an enhanced intrusion detection using Coati Optimization Algorithm with Deep Learning (ID-COADL) technique on VANET. The major aim of the ID-COADL technique is to categorize various kinds of intrusions that exist in the VANET to accomplish security using hyperparameter tuned deep learning (DL) model. At the primary stage, the ID-COADL technique employs min–max normalization to scale the input data into uniform data. For intrusion detection, the ID-COADL technique applies deep belief network (DBN) model. Finally, the hyperparameter selection of the DBN model can be performed by the use of COA thereby enhancing the intrusion detection rate. To examine the performance of the ID-COADL system, a wide-ranging simulations were carried out. The extensive result analysis highlighted the enhanced performance of the ID-COADL technique in the detection and classification of intrusions. © Bharati Vidyapeeth's Institute of Computer Applications and Management 2024.
引用
收藏
页码:3009 / 3018
页数:9
相关论文
共 29 条
[1]  
Al-Rimy B.A.S., Maarof M.A., Alazab M., Et al., A pseudo feedback-based annotated TF-IDF technique for dynamic crypto-ransomware pre-encryption boundary delineation and features extraction, IEEE Access, 8, pp. 140586-140598, (2020)
[2]  
Zafar F., Khattak H.A., Aloqaily M., Hussain R., Carpooling in connected and autonomous vehicles: current solutions and future directions, ACM Comput Surv, 54, 10s, pp. 1-36, (2022)
[3]  
Gopi R., Rajesh A., Securing video cloud storage by ERBAC mechanisms in 5g enabled vehicular networks, Clust Comput, 20, 4, pp. 3489-3497, (2017)
[4]  
Chiti F., Fantacci R., Gu Y., Han Z., Content sharing in Internet of Vehicles: two matching-based user-association approaches, Vehicular Communications, 8, pp. 35-44, (2017)
[5]  
Ghaleb F.A., Maarof M.A., Zainal A., Saleh Al-Rimy B.A., Alsaeedi A., Boulila W., Ensemble-based hybrid context-aware misbehavior detection model for vehicular ad hoc network, Remote Sens, 11, 23, (2019)
[6]  
Tayyaba S.K., Khattak H.A., Almogren A., Et al., 5G vehicular network resource management for improving radio access through machine learning, IEEE Access, 8, pp. 6792-6800, (2020)
[7]  
Huang D., Misra S., Verma M., Xue G., PACP: an efficient pseudonymous authentication-based conditional privacy protocol for VANETs, IEEE Trans Intell Transp Syst, 12, 3, pp. 736-746, (2011)
[8]  
Parameshwarappa P.Z.C.Z.C., A Analyzing attack strategies against rule-based Intrusion Detection Systems, In: Proceedings of the Workshop Program of the 19Th International Conference on Distributed Computing and Networking
[9]  
Liang J., Chen J., Zhu Y., Yu R., A novel intrusion detection system for vehicular ad hoc networks (VANETs) based on differences of traffic flow and position, Appl Soft Comput, 75, pp. 712-727, (2019)
[10]  
Ghaleb F.A., Aizaini Maarof M., Zainal A., Al-Rimy B.A.S., Saeed F., Al-Hadhrami T., Hybrid and multifaceted context-aware misbehavior detection model for vehicular ad hoc network, IEEE Access, 7, pp. 159119-159140, (2019)