A Hybrid Approach for Detecting of Intrusion in Vanet Using Machine Learning with Optimization Approach

Authors

  • Ganga T G, Anuja Beatrice

Keywords:

Intrusion Detection Systems (IDS), Support Vector Machine with Fish Swarm Optimization (SVM-FSO), ANN, KNN, and DNN

Abstract

In recent times, there has been a growing focus among researchers on VANET (Vehicular Ad-hoc Network) and its diverse applications, including the improvement of traffic safety through the collection and distribution of traffic event information. Malfunctions in vehicles significantly affect both human safety and road safety, underscoring the importance of addressing vehicle network security as a crucial challenge. The significance of carefully analyzing the Machine Learning (ML) methods used to improve the security aspects of intrusion detection systems (IDSs) is highlighted by this delicate research focus in VANET. This entails dealing with issues like the computational complexity of machine learning difficulties brought on by the increase in vehicle data. In order to better address the issues raised by rapid development, this research presents a hybrid machine learning approach intended to enhance the efficacy of intrusion detection systems (IDSs). This network's main goals are to improve general privacy and thwart vulnerable attacks. Support Vector Machine with Fish Swarm Optimization (SVM-FSO), a cutting-edge machine learning approach, is used in our suggested system to identify DDoS attacks and provide vehicle information while maintaining anonymity. The CICIDS 2017 IDS dataset is used for the evaluation, and MATLAB is used to implement the unique machine learning technique. When performance evaluation takes into account parameters like latency, network lifetime, throughput, delivery ratio, and drop, the results are better than with other approaches like SVM, ANN, KNN, and DNN.

Downloads

Download data is not yet available.

References

Ullah, Noor & Kong, Xiangjie&Tolba, Amr&Alrashoud, Mubarak & Xia, Feng. (2020). Emergency warning messages dissemination in vehicular social networks: A trust-based scheme. Vehicular Communications.100199. 10.1016/j.vehcom.2019.100199.

Dua, N. Kumar, S. Bawa, Reidd: reliability-aware intelligent data dissemination protocol for broadcast storm problem in vehicular ad hoc networks, Tele commun. Syst. 64 (3) (2017) 439–458

Liu J, Yang W, Zhang J, Yang C. Detecting false messages in vehicular ad hoc networks based on a traffic flow model. International Journal of Distributed Sensor Networks. 2020;16(2).

S. Park and C. C. Zou, "Reliable Traffic Information Propagation in Vehicular Ad-Hoc Networks," 2008 IEEE Sarnoff Symposium, Princeton, NJ, USA, 2008, pp. 1-6

Arshad, M., Ullah, Z., Ahmad, N. et al. A survey of local/cooperative-based malicious information detection techniques in VANETs. J Wireless Com Network 2018, 62 (2018).

Mr. R. Senthil Ganesh. (2019). Watermark Decoding Technique using Machine Learning for Intellectual Property Protection. International Journal of New Practices in Management and Engineering, 8(03), 01 - 09. https://doi.org/10.17762/ijnpme.v8i03.77.

Mohamed TM, Ahmed IZ, Sadek RA. Efficient VANET safety message delivery and authenticity with privacy preservation. PeerJ Comput Sci. 2021 May 4;7:e519

Chen (2010). A Trust-based Message Evaluation and Propagation Framework in Vehicular Ad-Hoc Networks. UWSpace. http://hdl.handle.net/10012/4929

C. Zhang, K. Chen, X. Zeng and X. Xue, "Misbehavior Detection Based on Support Vector Machine and Dempster-Shafer Theory of Evidence in VANETs," in IEEE Access, vol. 6, pp. 59860-59870, 2018

Aslan, M., Sen, S. (2019). Evolving Trust Formula to Evaluate Data Trustworthiness in VANETs Using Genetic Programming. In: Kaufmann, P., Castillo, P. (eds) Applications of Evolutionary

Computation.EvoApplications 2019. Lecture Notes in Computer Science (), vol 11454. Springer, Cham

Mujahid Muhammad, Paul Kearney, Adel Aneiba, Junaid Arshad, Andreas Kunz. RMCCS: RSSI-based Message Consistency Checking Scheme for V2V Communications. In Sabrina De Capitani di Vimercati, PierangelaSamarati, editors, Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021, July 6-8, 2021. pages 722-727, SCITEPRESS

Rassam, Murad&Ghaleb, Fuad&Zainal, Anazida& Maarof, Mohd. (2019). Detecting Bogus Information Attack in Vehicular Ad Hoc Network: A Context-Aware Approach.

Mohannad O. Rawashdeh, Sayel M. Fayyad, Sulieman Abu-Ein, WaleedMomani, ZaidAbulghanam, A. M. Maqableh. (2023). Intelligent Automobiles Diagnostic System. International Journal of Intelligent Systems and Applications in Engineering, 11(4s), 458–465. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2703.

Ghaleb, F.A.; Maarof, M.A.; Zainal, A.; Al-Rimy, B.A.S.; Saeed, F.; Al-Hadhrami, T. Hybrid and Multifaceted Context-Aware Misbehavior Detection Model for Vehicular Ad Hoc Network. IEEE Access 2019, 7, 159119–159140.

Sharshembiev, K.; Yoo, S.M.; Elmahdi, E.; Kim, Y.K.; Jeong, G.H. Fail-Safe Mechanism Using Entropy Based Misbehavior Classification and Detection in Vehicular Ad Hoc Networks. In Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Atlanta, GA, USA, 14–17 July 2019; pp. 123–128

Guo, J.; Li, X.; Liu, Z.; Ma, J.; Yang, C.; Zhang, J.; Wu, D. TROVE: A context-awareness trust model for VANETs using reinforcement learning. IEEE Internet Things J. 2020, 7, 6647–6662.

University of New Brunswick, Canadian Institute for Cybersecurity: Intrusion Detection Evaluation Dataset (CICIDS 2017), Accessed 15 September 2020

R. Azizi, “Empirical study of artificial fish swarm algorithm,” Computer Science, vol. 17, no. 6, pp. 626–641, 2014.

Y. Gao, L. Guan, and T. Wang, “Triaxial accelerometer error coefficients identification with a novel artificial fish swarm algorithm,” Journal of Sensors, vol. 2015, Article ID 509143, 17 pages, 2015.

V Vapnik. The nature of statistical learning theory. New York: Springer-Verlag Press, 2000.

Downloads

Published

24.03.2024

How to Cite

Ganga T G. (2024). A Hybrid Approach for Detecting of Intrusion in Vanet Using Machine Learning with Optimization Approach. International Journal of Intelligent Systems and Applications in Engineering, 12(3), 2914–2924. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5803

Issue

Section

Research Article