A Novel Intrusion Detection Method in Train-Ground Communication System

被引:11
作者
Gao, Bing [1 ]
Bu, Bing [1 ]
机构
[1] Beijing Jiaotong Univ, State Key Lab Rail Traff Control & Safety, Beijing 100044, Peoples R China
基金
中国国家自然科学基金;
关键词
Intrusion detection; train-ground communication; Denial of Service; similarity measure; AdaBoost; multi-classification; NETWORKS;
D O I
10.1109/ACCESS.2019.2958198
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
At present, the train-ground communication system based on the wireless communication protocol is a very important component of communication-based train control (CBTC) systems in intelligent transportation. Its information security is worthy of attention. In order to guarantee the security of the train-ground communication system, this paper proposes an improved AdaBoost multi-classification intrusion detection method based on the n-gram model. First, the n-gram model is used to model the state transitions of the IEEE 802.11 protocol. Then, a typical normal behavior set and typical abnormal behavior sets are obtained by learning and they can portray typical behaviors of their respective classes. Furthermore, a similarity measure algorithm is proposed to construct AdaBoost weak classifiers, which improves the classification effect of AdaBoost algorithm. At last, an AdaBoost multi-classification algorithm is presented to detect and identify the attacks. Experiments prove that the algorithm can effectively detect and distinguish attack types in the train-ground communication system.
引用
收藏
页码:178726 / 178743
页数:18
相关论文
共 32 条
[1]  
Abdulhammed R, 2018, INT WIREL COMMUN, P524, DOI 10.1109/IWCMC.2018.8450479
[2]   Wireless Anomaly Detection Based on IEEE 802.11 Behavior Analysis [J].
Alipour, Hamid ;
Al-Nashif, Youssif B. ;
Satam, Pratik ;
Hariri, Salim .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (10) :2158-2170
[3]  
[Anonymous], 2007, KDDCUP1999
[4]  
[Anonymous], IEEE T INTELL TRANSP
[5]  
[Anonymous], 2004, 80211 IEEE
[6]  
[Anonymous], 2016, IEEE Std 802.11-2012 (Revision of IEEE Std 802.11-2007), P1, DOI DOI 10.1109/IEEESTD.2016.7786995
[7]  
[Anonymous], 2011, 80211 IEEE
[8]   MWMOTE-Majority Weighted Minority Oversampling Technique for Imbalanced Data Set Learning [J].
Barua, Sukarna ;
Islam, Md. Monirul ;
Yao, Xin ;
Murase, Kazuyuki .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (02) :405-425
[9]   Real-Time Misbehavior Detection and Mitigation in Cyber-Physical Systems Over WLANs [J].
Cao, Xianghui ;
Liu, Lu ;
Shen, Wenlong ;
Laha, Aurobinda ;
Tang, Jin ;
Cheng, Yu .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (01) :186-197
[10]  
Cardenas Alvaro A., 2008, 2008 28th International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), P495, DOI 10.1109/ICDCS.Workshops.2008.40