An Ensemble-Based Hybrid Model for the Detection of Attacks in the Internet of Vehicular Things

被引:2
作者
Ullah, Inam [1 ,2 ]
Khalil, Irshad [3 ]
Bai, Xiaoshan [1 ,4 ]
Garg, Sahil [5 ,6 ,7 ]
Kaddoum, Georges [8 ]
Shamim, M. [9 ]
机构
[1] Shenzhen Univ, Coll Mechatron & Control Engn, Shenzhen 518060, Peoples R China
[2] Shenzhen Univ, Coll Comp Sci & Software Engn, Shenzhen 518060, Peoples R China
[3] Gachon Univ, Dept Biomed Engn, Incheon 406799, South Korea
[4] Shenzhen Univ, Natl Engn Lab Big Data Syst Comp Technol, Shenzhen 518060, Peoples R China
[5] Ecole Technol Super, Elect Engn Dept, Montreal, PQ H3C 1K3, Canada
[6] Canadian Univ, Sch Engn Appl Sci & Technol, Dept Comp Engn & Computat Sci CECS, Dubai, U Arab Emirates
[7] Chitkara Univ, Chitkara Inst Engn & Technol, Ctr Res Impact & Outcome, Rajpura 140401, Punjab, India
[8] Ecole Technol Super, Montreal, PQ H3C 1K3, Canada
[9] King Saud Univ, Coll Comp & Informat Sci, Dept Software Engn, Riyadh 12372, Saudi Arabia
基金
中国国家自然科学基金;
关键词
Accuracy; Ensemble learning; Security; Load modeling; Feature extraction; Classification algorithms; Machine learning; Intrusion detection; Training; Privacy; Internet of Vehicles (IoV); intrusion detection system (IDS); ensemble learning; classification; machine learning; attacks; security; NETWORK INTRUSION DETECTION; SYSTEMS;
D O I
10.1109/TITS.2025.3547999
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
The Internet of Vehicles (IoV) enables technology that allows IoV and vehicles to connect everything. IoV has become an essential component of modern life. This exponential growth of IoV technology has introduced significant security and privacy issues, which pose potential threats to different types of attacks and cause different threats to the normal operation of vehicles. To prevent intelligent vehicle accidents and identify malicious attacks within IoV networks, various researchers have focused on machine learning (ML)-based methods to detect attacks. Intrusion detection systems (IDS) are a prominent solution for cyber attacks in IoV using ensemble learning. To achieve higher accuracy and detection rate, designing an improved detection framework using ensemble learning is a challenging task. The design of an ensemble-based IDS depends on two main challenges: selecting base classifiers and their combination methods. Therefore, in this study, we propose a hybrid ML model to detect various attacks in IoV. We have used different ML algorithms to develop an enhanced algorithm that can efficiently detect attacks in IoV networks. To evaluate the performance of the proposed system, we have used two well-known datasets, (CIC-IDS2017) and (UNSW-NB15). The proposed algorithm shows outstanding performance from the performance results, with an average attack detection accuracy of 99.75% and 100% and an F1 score of 99.74% and 100%, respectively, for both datasets. Further performance scores, that is, recall, precision, and F1 score metrics, validate the exceptional effectiveness of the proposed framework.
引用
收藏
页数:14
相关论文
共 73 条
[1]   A survey of intrusion detection systems based on ensemble and hybrid classifiers [J].
Aburomman, Abdulla Amin ;
Reaz, Mamun Bin Ibne .
COMPUTERS & SECURITY, 2017, 65 :135-152
[2]  
Afrin S., 2020, P 15 INT JOINT S ART, P1
[3]   Intrusion Detection Systems for Intra-Vehicle Networks: A Review [J].
Al-Jarrah, Omar Y. ;
Maple, Carsten ;
Dianati, Mehrdad ;
Oxtoby, David ;
Mouzakitis, Alex .
IEEE ACCESS, 2019, 7 :21266-21289
[4]   Comparison of Machine Learning Techniques Applied to Traffic Prediction of Real Wireless Network [J].
Alekseeva, Daria ;
Stepanov, Nikolai ;
Veprev, Albert ;
Sharapova, Alexandra ;
Lohan, Elena Simona ;
Ometov, Aleksandr .
IEEE ACCESS, 2021, 9 :159495-159514
[5]   Intelligent intrusion detection in external communication systems for autonomous vehicles [J].
Alheeti, Khattab M. Ali ;
McDonald-Maier, Klaus .
SYSTEMS SCIENCE & CONTROL ENGINEERING, 2018, 6 (01) :48-56
[6]   ICS-IDS: application of big data analysis in AI-based intrusion detection systems to identify cyberattacks in ICS networks [J].
Ali, Bakht Sher ;
Ullah, Inam ;
Al Shloul, Tamara ;
Khan, Izhar Ahmed ;
Khan, Ijaz ;
Ghadi, Yazeed Yasin ;
Abdusalomov, Akmalbek ;
Nasimov, Rashid ;
Ouahada, Khmaies ;
Hamam, Habib .
JOURNAL OF SUPERCOMPUTING, 2024, 80 (06) :7876-7905
[7]  
Alshammari A., 2018, Wireless Eng. Technol., V9, P79, DOI DOI 10.4236/WET.2018.94007
[8]   Ensemble unsupervised autoencoders and Gaussian mixture model for cyberattack detection [J].
An, Peng ;
Wang, Zhiyuan ;
Zhang, Chunjiong .
INFORMATION PROCESSING & MANAGEMENT, 2022, 59 (02)
[9]   Machine-Learning-Based Efficient and Secure RSU Placement Mechanism for Software-Defined-IoV [J].
Anbalagan, Sudha ;
Bashir, Ali Kashif ;
Raja, Gunasekaran ;
Dhanasekaran, Priyanka ;
Vijayaraghavan, Geetha ;
Tariq, Usman ;
Guizani, Mohsen .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (18) :13950-13957
[10]  
[Anonymous], 2015, ADFA-NB15-Datasets