A Machine Learning-Based Intrusion Detection System for IoT Electric Vehicle Charging Stations (EVCSs)

被引:37
作者
ElKashlan, Mohamed [1 ]
Elsayed, Mahmoud Said [2 ]
Jurcut, Anca Delia [2 ]
Azer, Marianne [3 ]
机构
[1] Nile Univ, Sch Informat Technol & Comp Sci, Cairo 12677, Egypt
[2] Univ Coll Dublin, Sch Comp Sci, Dublin D04V1W8, Ireland
[3] Nile Univ, Natl Telecommun Inst, Cairo 12677, Egypt
关键词
anomaly detection; cyber security; feature selection; Internet of Things (IoT); intrusion detection system (IDS); machine learning; security;
D O I
10.3390/electronics12041044
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The demand for electric vehicles (EVs) is growing rapidly. This requires an ecosystem that meets the user's needs while preserving security. The rich data obtained from electric vehicle stations are powered by the Internet of Things (IoT) ecosystem. This is achieved through us of electric vehicle charging station management systems (EVCSMSs). However, the risks associated with cyber-attacks on IoT systems are also increasing at the same pace. To help in finding malicious traffic, intrusion detection systems (IDSs) play a vital role in traditional IT systems. This paper proposes a classifier algorithm for detecting malicious traffic in the IoT environment using machine learning. The proposed system uses a real IoT dataset derived from real IoT traffic. Multiple classifying algorithms are evaluated. Results were obtained on both binary and multiclass traffic models. Using the proposed algorithm in the IoT-based IDS engine that serves electric vehicle charging stations will bring stability and eliminate a substantial number of cyberattacks that may disturb day-to-day life activities.
引用
收藏
页数:17
相关论文
共 27 条
[1]   Cyber Insurance Against Cyberattacks on Electric Vehicle Charging Stations [J].
Acharya, Samrat ;
Mieth, Robert ;
Konstantinou, Charalambos ;
Karri, Ramesh ;
Dvorkin, Yury .
IEEE TRANSACTIONS ON SMART GRID, 2022, 13 (02) :1529-1541
[2]   A comprehensive deep learning benchmark for IoT IDS [J].
Ahmad, Rasheed ;
Alsmadi, Izzat ;
Alhamdani, Wasim ;
Tawalbeh, Lo'ai .
COMPUTERS & SECURITY, 2022, 114
[3]   An enhanced J48 classification algorithm for the anomaly intrusion detection systems [J].
Aljawarneh, Shadi ;
Yassein, Muneer Bani ;
Aljundi, Mohammed .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5) :10549-10565
[4]   Intrusion Detection System Based on Machine Learning Algorithms: A Review [J].
Amanoul, Sandy Victor ;
Abdulazeez, Adnan Mohsin .
2022 IEEE 18TH INTERNATIONAL COLLOQUIUM ON SIGNAL PROCESSING & APPLICATIONS (CSPA 2022), 2022, :79-84
[5]  
Basnet Manoj, 2020, 2020 2nd International Conference on Smart Power & Internet Energy Systems (SPIES), P408, DOI 10.1109/SPIES48661.2020.9243152
[6]   Exploring the information content of cyber breach reports and the relationship to internal controls [J].
Blakely, Benjamin ;
Kurtenbach, Jim ;
Nowak, Lovila .
INTERNATIONAL JOURNAL OF ACCOUNTING INFORMATION SYSTEMS, 2022, 46
[7]  
Gnanambal S., 2018, International Journal of Advanced Networking and Applications, V9, P3640
[8]   Autonomous vehicles in 5G and beyond: A survey [J].
Hakak, Saqib ;
Gadekallu, Thippa Reddy ;
Maddikunta, Praveen Kumar Reddy ;
Ramu, Swarna Priya ;
Parimala, M. ;
De Alwis, Chamitha ;
Liyanage, Madhusanka .
VEHICULAR COMMUNICATIONS, 2023, 39
[9]  
Handa A., 2022, Handbook of Big Data Analytics and Forensics, P105, DOI 10.1007/978-3-030-74753-4_7
[10]   "Why Should I Trust Your IDS?": An Explainable Deep Learning Framework for Intrusion Detection Systems in Internet of Things Networks [J].
Houda, Zakaria Abou El ;
Brik, Bouziane ;
Khoukhi, Lyes .
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2022, 3 :1164-1176