RETRACTED: Crook node identification system in VANET using CRF based feature selection and data mining classification techniques (Retracted Article)

被引:0
作者
Mahalakshmi, G. [1 ]
Uma, E. [1 ]
机构
[1] Anna Univ, Dept Informat Sci & Technol, Chennai, India
关键词
Vehicular ad-hoc networks; intrusion detection; feature selection; classification; INTRUSION-DETECTION; EFFICIENT;
D O I
10.3233/JIFS-234192
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intelligent Transportation Systems have become integral to daily life, with VANETs (vehicular ad-hoc networks) playing the pivotal role. VANETs, the subsets of MANETs, employ vehicles as nodes to establish intelligent transport systems. However, due to critical applications such as military use, these networks are susceptible to attacks. With features like high mobility, dynamic network topology, and coverage issues, security breaches are a concern. This necessitates a secure routing algorithm to mitigate attacks and ensure message delivery. In our study, we utilize the UNSW-NB15 intrusion detection dataset to develop training and testing models. Our proposed novel intrusion detection system employs a feature selection algorithm that prioritizes significant arriving traffic attributes. This algorithm enhances abnormal activity detection while minimizing associated features. To achieve this, we modify the Conditional Random Field algorithm with fuzzy-based rules, resulting in a more efficient selection of influential and contributing features for detecting attacks such as DoS, Worms, Fuzzers, and Shellcode. Through appropriate feature selection using the modified Conditional Random Field and Support Vector Machine classification system in our experiments, we demonstrate a notable increase in security by reducing the false positive rate. Additionally, our approach excels in detecting accuracy of Fuzzers (98.86%), DoS (98.80%), Worms (34.45%), and Shellcode (89.308%), ultimately enhancing network performance. These findings underscore the effectiveness of our proposed method in enhancing intrusion detection and overall network efficiency.
引用
收藏
页码:5441 / 5453
页数:13
相关论文
共 32 条
  • [1] Amoli T., 2016, INT J DIGITAL CONTEN, V10, P1
  • [2] Intrusion Detection in Enterprise Systems by Combining and Clustering Diverse Monitor Data
    Bohara, Atul
    Thakore, Uttam
    Sanders, William H.
    [J]. SYMPOSIUM AND BOOTCAMP ON THE SCIENCE OF SECURITY, 2016, : 7 - 16
  • [3] Chi Hoi-Ming, 2005, Feature Selection Using Random Probes and Linear Support Vector Machines
  • [4] AN INTRUSION-DETECTION MODEL
    DENNING, DE
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) : 222 - 232
  • [5] Faizal M.A., 2009, ( IJCSIS) International Journal of Computer Science and Information Security, V1
  • [6] Gupta Kapil Kumar, 2010, IEEE Trans. On Dependable and Secure Computing, V7
  • [7] Gupta Kapil Kumar, 2007, 21 INT C ADV INF NET
  • [8] PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs
    Huang, Dijiang
    Misra, Satyajayant
    Verma, Mayank
    Xue, Guoliang
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2011, 12 (03) : 736 - 746
  • [9] Lafferty J.D., 2001, P 18 INT C MACH LEAR, P282
  • [10] Liang Junwei, 2019, IEEE Transactions On Intelligent Transportation Systems