Skip to main content
Top
Published in: Journal of Network and Systems Management 1/2022

01-01-2022

AntibotV: A Multilevel Behaviour-Based Framework for Botnets Detection in Vehicular Networks

Authors: Rabah Rahal, Abdelaziz Amara Korba, Nacira Ghoualmi-Zine, Yacine Challal, Mohamed Yacine Ghamri-Doudane

Published in: Journal of Network and Systems Management | Issue 1/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Connected cars offer safety and efficiency for both individuals and fleets of private vehicles and public transportation companies. However, equipping vehicles with information and communication technologies raises privacy and security concerns, which significantly threaten the user’s data and life. Using bot malware, a hacker may compromise a vehicle and control it remotely, for instance, he can disable breaks or start the engine remotely. In this paper, besides in-vehicle attacks existing in the literature, we consider new zero-day bot malware attacks specific to the vehicular context, WSMP-Flood, and Geo-WSMP Flood. Then, we propose AntibotV, a multilevel behaviour-based framework for vehicular botnets detection in vehicular networks. The proposed framework combines two main modules for attack detection, the first one monitors the vehicle’s activity at the network level, whereas the second one monitors the in-vehicle activity. The two intrusion detection modules have been trained on a historical network and in-vehicle communication using decision tree algorithms. The experimental results showed that the proposed framework outperforms existing solutions, it achieves a detection rate higher than 97% and a false positive rate lower than 0.14%.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Lee, E.-K., Gerla, M., Pau, G., Lee, I., Lim, J.-H.: Internet of vehicles: from intelligent grid to autonomous cars and vehicular fogs. Int. J. Distrib. Sens. Netw. 12(9), 1550147716665500 (2016)CrossRef Lee, E.-K., Gerla, M., Pau, G., Lee, I., Lim, J.-H.: Internet of vehicles: from intelligent grid to autonomous cars and vehicular fogs. Int. J. Distrib. Sens. Netw. 12(9), 1550147716665500 (2016)CrossRef
2.
go back to reference Krishnan, H., Bai, F. Holland, G.: Commercial and public use applications. In Vehicular Networking, pp 1–28. Wiley (2010) Krishnan, H., Bai, F. Holland, G.: Commercial and public use applications. In Vehicular Networking, pp 1–28. Wiley (2010)
3.
go back to reference Todorova, M., Stoyanova, T., Stamelina, T.: DDOS attack detection in SDN-based vanet architectures. Master. Appl. Sci. 6, 175 (2016) Todorova, M., Stoyanova, T., Stamelina, T.: DDOS attack detection in SDN-based vanet architectures. Master. Appl. Sci. 6, 175 (2016)
4.
go back to reference Zhou, J., Cao, Z., Dong, X., Vasilakos, A.V.: Security and privacy for cloud-based iot: challenges. IEEE Commun. Mag. 55(1), 26–33 (2017)CrossRef Zhou, J., Cao, Z., Dong, X., Vasilakos, A.V.: Security and privacy for cloud-based iot: challenges. IEEE Commun. Mag. 55(1), 26–33 (2017)CrossRef
5.
go back to reference Tyagi, P., Dembla, D.: Investigating the security threats in vehicular ad hoc networks (vanets): towards security engineering for safer on-road transportation. In: 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2084–2090. IEEE (2014) Tyagi, P., Dembla, D.: Investigating the security threats in vehicular ad hoc networks (vanets): towards security engineering for safer on-road transportation. In: 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2084–2090. IEEE (2014)
6.
go back to reference Liu, J., Zhang, S., Sun, W., Shi, Y.: In-vehicle network attacks and countermeasures: challenges and future directions. IEEE Netw. 31(5), 50–58 (2017)CrossRef Liu, J., Zhang, S., Sun, W., Shi, Y.: In-vehicle network attacks and countermeasures: challenges and future directions. IEEE Netw. 31(5), 50–58 (2017)CrossRef
7.
go back to reference Garip, M.T., Reiher, P., Gerla, M.: Ghost: Concealing vehicular botnet communication in the vanet control channel. In: 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 1–6. IEEE (2016) Garip, M.T., Reiher, P., Gerla, M.: Ghost: Concealing vehicular botnet communication in the vanet control channel. In: 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 1–6. IEEE (2016)
8.
go back to reference Garip, M.T., Lin, J., Reiher, P., Gerla, M.: Shieldnet: an adaptive detection mechanism against vehicular botnets in vanets. In: 2019 IEEE Vehicular Networking Conference (VNC), pp. 1–7. IEEE (2019) Garip, M.T., Lin, J., Reiher, P., Gerla, M.: Shieldnet: an adaptive detection mechanism against vehicular botnets in vanets. In: 2019 IEEE Vehicular Networking Conference (VNC), pp. 1–7. IEEE (2019)
9.
go back to reference Chen, M.-C., Chang, T.-W.: Introduction of vehicular network architectures. In: Telematics Communication Technologies and Vehicular Networks: Wireless Architectures and Applications, pp. 1–14. IGI Global (2010) Chen, M.-C., Chang, T.-W.: Introduction of vehicular network architectures. In: Telematics Communication Technologies and Vehicular Networks: Wireless Architectures and Applications, pp. 1–14. IGI Global (2010)
10.
go back to reference Zhou, J., Dong, X., Cao, Z., Vasilakos, A.V.: Secure and privacy preserving protocol for cloud-based vehicular DTNS. IEEE Trans. Inform. Forensics Secur. 10(6), 1299–1314 (2015)CrossRef Zhou, J., Dong, X., Cao, Z., Vasilakos, A.V.: Secure and privacy preserving protocol for cloud-based vehicular DTNS. IEEE Trans. Inform. Forensics Secur. 10(6), 1299–1314 (2015)CrossRef
11.
go back to reference Kenney, John B.: Dedicated short-range communications (DSRC) standards in the united states. Proc. IEEE 99(7), 1162–1182 (2011)CrossRef Kenney, John B.: Dedicated short-range communications (DSRC) standards in the united states. Proc. IEEE 99(7), 1162–1182 (2011)CrossRef
12.
go back to reference Ahmed, S.M., Ariffin, S.H.S., Fisal, N.: Overview of wireless access in vehicular environment (wave) protocols and standards. Environment 7, 8 (2013) Ahmed, S.M., Ariffin, S.H.S., Fisal, N.: Overview of wireless access in vehicular environment (wave) protocols and standards. Environment 7, 8 (2013)
13.
go back to reference 1609.4-2016 - ieee standard for wireless access in vehicular environments (wave) – multi-channel operation 1609.4-2016 - ieee standard for wireless access in vehicular environments (wave) – multi-channel operation
14.
go back to reference Song, C.: Performance analysis of the IEEE 802.11 p multichannel mac protocol in vehicular ad hoc networks. Sensors 17(12), 2890 (2017)CrossRef Song, C.: Performance analysis of the IEEE 802.11 p multichannel mac protocol in vehicular ad hoc networks. Sensors 17(12), 2890 (2017)CrossRef
15.
go back to reference 1609.2-2016 - ieee standard for wireless access in vehicular environments–security services for applications and management messages 1609.2-2016 - ieee standard for wireless access in vehicular environments–security services for applications and management messages
16.
go back to reference Hedges, C., Perry, F.: Overview and use of sae j2735 message sets for commercial vehicles. Technical report, SAE Technical Paper (2008) Hedges, C., Perry, F.: Overview and use of sae j2735 message sets for commercial vehicles. Technical report, SAE Technical Paper (2008)
21.
go back to reference Corrêa, J., Ciarelli, P.M., Ribeiro, M.R.N., Villaça, R.S.: Ml-based ddos detection and identification using native cloud telemetry macroscopic monitoring. J. Netw. Syst. Manage. 29(2), 1–28 (2021)CrossRef Corrêa, J., Ciarelli, P.M., Ribeiro, M.R.N., Villaça, R.S.: Ml-based ddos detection and identification using native cloud telemetry macroscopic monitoring. J. Netw. Syst. Manage. 29(2), 1–28 (2021)CrossRef
22.
go back to reference Agrawal, Neha, Tapaswi, Shashikala: An DSN-assisted defense mechanism for the shrew DDOS attack in a cloud computing environment. J. Netw. Syst. Manage. 29(2), 1–28 (2021)CrossRef Agrawal, Neha, Tapaswi, Shashikala: An DSN-assisted defense mechanism for the shrew DDOS attack in a cloud computing environment. J. Netw. Syst. Manage. 29(2), 1–28 (2021)CrossRef
23.
go back to reference Alhisnawi, Mohammad, Mahmood, Ahmadi: Detecting and mitigating DDOS attack in named data networking. J. Netw. Syst. Manage. 28, 1343–1365 (2020)CrossRef Alhisnawi, Mohammad, Mahmood, Ahmadi: Detecting and mitigating DDOS attack in named data networking. J. Netw. Syst. Manage. 28, 1343–1365 (2020)CrossRef
24.
go back to reference Rahal, Rabah, Korba, Abdelaziz Amara, Ghoualmi-Zine, Nacira: Towards the development of realistic dos dataset for intelligent transportation systems. Wirel. Personal Commun. 115(2), 1415–1444 (2020)CrossRef Rahal, Rabah, Korba, Abdelaziz Amara, Ghoualmi-Zine, Nacira: Towards the development of realistic dos dataset for intelligent transportation systems. Wirel. Personal Commun. 115(2), 1415–1444 (2020)CrossRef
25.
go back to reference Otoum, Yazan, Nayak, Amiya: As-ids: Anomaly and signature based ids for the internet of things. J. Netw. Syst. Manag. 29(3), 1–26 (2021)CrossRef Otoum, Yazan, Nayak, Amiya: As-ids: Anomaly and signature based ids for the internet of things. J. Netw. Syst. Manag. 29(3), 1–26 (2021)CrossRef
26.
go back to reference Oseni, A., Moustafa, N., Janicke, H., Liu, P., Tari, Z., Vasilakos, A.: Security and privacy for artificial intelligence: opportunities and challenges. arXiv preprint arXiv:2102.04661 (2021) Oseni, A., Moustafa, N., Janicke, H., Liu, P., Tari, Z., Vasilakos, A.: Security and privacy for artificial intelligence: opportunities and challenges. arXiv preprint arXiv:​2102.​04661 (2021)
27.
go back to reference Liu, X., Xie, L., Wang, Y., Zou, J., Xiong, J., Ying, Z., Vasilakos, A.V.: Privacy and security issues in deep learning: a survey. IEEE Access (2020) Liu, X., Xie, L., Wang, Y., Zou, J., Xiong, J., Ying, Z., Vasilakos, A.V.: Privacy and security issues in deep learning: a survey. IEEE Access (2020)
28.
go back to reference Dibaei, M., Zheng, X., Xia, Y., Xu, X., Jolfaei, A., Bashir, A.K., Tariq, U., Yu, D., Vasilakos, AV.: Investigating the prospect of leveraging blockchain and machine learning to secure vehicular networks: a survey. IEEE: Piscataway (2020) Dibaei, M., Zheng, X., Xia, Y., Xu, X., Jolfaei, A., Bashir, A.K., Tariq, U., Yu, D., Vasilakos, AV.: Investigating the prospect of leveraging blockchain and machine learning to secure vehicular networks: a survey. IEEE: Piscataway (2020)
29.
go back to reference Zhuo, D., Ghobadi, M., Mahajan, R., Förster, K.-T., Krishnamurthy, A., Anderson, T.: Understanding and mitigating packet corruption in data center networks. In: Proceedings of the Conference of the ACM Special Interest Group on Data Communication. ACM (2017) Zhuo, D., Ghobadi, M., Mahajan, R., Förster, K.-T., Krishnamurthy, A., Anderson, T.: Understanding and mitigating packet corruption in data center networks. In: Proceedings of the Conference of the ACM Special Interest Group on Data Communication. ACM (2017)
30.
go back to reference Liu, D., Zhao, Y., Xu, H., Sun, Y., Pei, D., Luo, J., Jing, X., Feng, M.: Opprentice. In: Proceedings of the 2015 Internet Measurement Conference. ACM (2015) Liu, D., Zhao, Y., Xu, H., Sun, Y., Pei, D., Luo, J., Jing, X., Feng, M.: Opprentice. In: Proceedings of the 2015 Internet Measurement Conference. ACM (2015)
31.
go back to reference Lakhina, Anukool, Crovella, Mark, Diot, Christophe: Diagnosing network-wide traffic anomalies. ACM SIGCOMM Comput. Commun. Rev. 34(4), 219–230 (2004)CrossRef Lakhina, Anukool, Crovella, Mark, Diot, Christophe: Diagnosing network-wide traffic anomalies. ACM SIGCOMM Comput. Commun. Rev. 34(4), 219–230 (2004)CrossRef
32.
go back to reference Hu, J., Zhou, Z., Yang, X., Malone, J., Williams, J.W.: Cablemon: Improving the reliability of cable broadband networks via proactive network maintenance. In: 17th \(\{\)USENIX\(\}\) Symposium on Networked Systems Design and Implementation (\(\{\)NSDI\(\}\) 20), pp. 619–632 (2020) Hu, J., Zhou, Z., Yang, X., Malone, J., Williams, J.W.: Cablemon: Improving the reliability of cable broadband networks via proactive network maintenance. In: 17th \(\{\)USENIX\(\}\) Symposium on Networked Systems Design and Implementation (\(\{\)NSDI\(\}\) 20), pp. 619–632 (2020)
33.
go back to reference Li, X., Bian, F., Crovella, M., Diot, C., Govindan, R., Iannaccone, G., Lakhina, A.: Detection and identification of network anomalies using sketch subspaces. In: Proceedings of the 6th ACM SIGCOMM on Internet measurement-IMC 06. ACM Press (2006) Li, X., Bian, F., Crovella, M., Diot, C., Govindan, R., Iannaccone, G., Lakhina, A.: Detection and identification of network anomalies using sketch subspaces. In: Proceedings of the 6th ACM SIGCOMM on Internet measurement-IMC 06. ACM Press (2006)
34.
go back to reference Biswas, R., Roy, S.: Botnet traffic identification using neural networks. Multimed. Tools Appl., pp 1–25 (2021) Biswas, R., Roy, S.: Botnet traffic identification using neural networks. Multimed. Tools Appl., pp 1–25 (2021)
35.
go back to reference Sinha, K., Viswanathan, A., Bunn, J.: Tracking temporal evolution of network activity for botnet detection. arXiv preprint arXiv:1908.03443 (2019) Sinha, K., Viswanathan, A., Bunn, J.: Tracking temporal evolution of network activity for botnet detection. arXiv preprint arXiv:​1908.​03443 (2019)
36.
go back to reference Zhao, D., Traore, I., Sayed, B., Wei, L., Saad, S., Ghorbani, A., Garant, D.: Botnet detection based on traffic behavior analysis and flow intervals. Comput. Secur. 39, 2–16 (2013)CrossRef Zhao, D., Traore, I., Sayed, B., Wei, L., Saad, S., Ghorbani, A., Garant, D.: Botnet detection based on traffic behavior analysis and flow intervals. Comput. Secur. 39, 2–16 (2013)CrossRef
37.
go back to reference Strayer, W.T., Lapsely, D., Walsh, R., Livadas, C.: Botnet detection based on network behavior. In: Botnet Detection, pp. 1–24. Springer (2008) Strayer, W.T., Lapsely, D., Walsh, R., Livadas, C.: Botnet detection based on network behavior. In: Botnet Detection, pp. 1–24. Springer (2008)
38.
go back to reference Ranjan, S.: Machine learning based botnet detection using real-time extracted traffic features, March 25. US Patent 8,682,812 (2014) Ranjan, S.: Machine learning based botnet detection using real-time extracted traffic features, March 25. US Patent 8,682,812 (2014)
39.
go back to reference Ranjan, S., Chen, F.: Machine learning based botnet detection with dynamic adaptation, March 19. US Patent 8,402,543 (2013) Ranjan, S., Chen, F.: Machine learning based botnet detection with dynamic adaptation, March 19. US Patent 8,402,543 (2013)
40.
go back to reference Ongtang, Machigar, McLaughlin, Stephen, Enck, William, McDaniel, Patrick: Semantically rich application-centric security in android. Secur. Commun. Netw. 5(6), 658–673 (2012)CrossRef Ongtang, Machigar, McLaughlin, Stephen, Enck, William, McDaniel, Patrick: Semantically rich application-centric security in android. Secur. Commun. Netw. 5(6), 658–673 (2012)CrossRef
41.
go back to reference Zhao, Min, Zhang, Tao, Ge, Fangbin, Yuan, Zhijian: Robotdroid: a lightweight malware detection framework on smartphones. J. Netw. 7(4), 715 (2012) Zhao, Min, Zhang, Tao, Ge, Fangbin, Yuan, Zhijian: Robotdroid: a lightweight malware detection framework on smartphones. J. Netw. 7(4), 715 (2012)
42.
go back to reference Andronio, N., Zanero, S., Maggi, F.: Heldroid: Dissecting and detecting mobile ransomware. In: International Symposium on Recent Advances in Intrusion Detection, pp. 382–404. Springer (2015) Andronio, N., Zanero, S., Maggi, F.: Heldroid: Dissecting and detecting mobile ransomware. In: International Symposium on Recent Advances in Intrusion Detection, pp. 382–404. Springer (2015)
43.
go back to reference Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. (TOCS) 32(2), 1–29 (2014)CrossRef Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. (TOCS) 32(2), 1–29 (2014)CrossRef
44.
go back to reference Ni, J., Zhang, K. Vasilakos, A. V.: Challenges and solutions. In: IEEE Wireless Communications, Security and privacy for mobile edge caching (2020) Ni, J., Zhang, K. Vasilakos, A. V.: Challenges and solutions. In: IEEE Wireless Communications, Security and privacy for mobile edge caching (2020)
45.
go back to reference Ioulianou, P., Vasilakis, V., Moscholios, I., Logothetis, M.: A signature-based intrusion detection system for the internet of things. In: Information and Communication Technology Form (2018) Ioulianou, P., Vasilakis, V., Moscholios, I., Logothetis, M.: A signature-based intrusion detection system for the internet of things. In: Information and Communication Technology Form (2018)
46.
go back to reference Dwyer, O., Marnerides, A., Giotsas, V., Mursh, T.: Profiling IoT-based botnet traffic using DNS. (2019) Dwyer, O., Marnerides, A., Giotsas, V., Mursh, T.: Profiling IoT-based botnet traffic using DNS. (2019)
47.
go back to reference Li, Wanting, Jin, Jian, Lee, Jong-Hyouk.: Analysis of botnet domain names for IoT cybersecurity. IEEE Access 7, 94658–94665 (2019)CrossRef Li, Wanting, Jin, Jian, Lee, Jong-Hyouk.: Analysis of botnet domain names for IoT cybersecurity. IEEE Access 7, 94658–94665 (2019)CrossRef
48.
go back to reference Ridley, A., Abbas, R., Ponnurangam, P.: Machine leaning DNS data analysis for automated maliciousdomain classification. (2019) Ridley, A., Abbas, R., Ponnurangam, P.: Machine leaning DNS data analysis for automated maliciousdomain classification. (2019)
49.
go back to reference Wazid, Mohammad, Das, Ashok Kumar, Bhat, Vivekananda, Vasilakos, Athanasios V.: Lam-CIoT: lightweight authentication mechanism in cloud-based IoT environment. J. Netw. Comput. Appl. 150, 102496 (2020)CrossRef Wazid, Mohammad, Das, Ashok Kumar, Bhat, Vivekananda, Vasilakos, Athanasios V.: Lam-CIoT: lightweight authentication mechanism in cloud-based IoT environment. J. Netw. Comput. Appl. 150, 102496 (2020)CrossRef
50.
go back to reference Jangirala, S., Das, AK., Wazid, M., Vasilakos, A.V.: Designing secure user authentication protocol for big data collection in IoT-based intelligent transportation system. In: IEEE Internet of Things Journal (2020) Jangirala, S., Das, AK., Wazid, M., Vasilakos, A.V.: Designing secure user authentication protocol for big data collection in IoT-based intelligent transportation system. In: IEEE Internet of Things Journal (2020)
51.
go back to reference Bera, Basudeb, Saha, Sourav, Das, Ashok Kumar, Vasilakos, Athanasios V.: Designing blockchain-based access control protocol in IoT-enabled smart-grid system. IEEE Internet Things J. 8(7), 5744–5761 (2021)CrossRef Bera, Basudeb, Saha, Sourav, Das, Ashok Kumar, Vasilakos, Athanasios V.: Designing blockchain-based access control protocol in IoT-enabled smart-grid system. IEEE Internet Things J. 8(7), 5744–5761 (2021)CrossRef
52.
go back to reference Garip, M.T., Reiher, P., Gerla, M.: Botveillance: a vehicular botnet surveillance attack against pseudonymous systems in vanets. In: 2018 11th IFIP Wireless and Mobile Networking Conference (WMNC), pp. 1–8. IEEE (2018) Garip, M.T., Reiher, P., Gerla, M.: Botveillance: a vehicular botnet surveillance attack against pseudonymous systems in vanets. In: 2018 11th IFIP Wireless and Mobile Networking Conference (WMNC), pp. 1–8. IEEE (2018)
53.
go back to reference Garip, M.T., Gursoy, M.E. Reiher, P., Gerla, M.: Congestion attacks to autonomous cars using vehicular botnets. In: NDSS Workshop on Security of Emerging Networking Technologies (SENT), San Diego (2015) Garip, M.T., Gursoy, M.E. Reiher, P., Gerla, M.: Congestion attacks to autonomous cars using vehicular botnets. In: NDSS Workshop on Security of Emerging Networking Technologies (SENT), San Diego (2015)
54.
go back to reference Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H. Savage, S., Koscher, K., Czeskis, A., Roesner, F., Kohno, T. et al. Comprehensive experimental analyses of automotive attack surfaces. In: USENIX Security Symposium, volume 4, pp. 447–462. San Francisco (2011) Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H. Savage, S., Koscher, K., Czeskis, A., Roesner, F., Kohno, T. et al. Comprehensive experimental analyses of automotive attack surfaces. In: USENIX Security Symposium, volume 4, pp. 447–462. San Francisco (2011)
56.
go back to reference Ben, L.:. Malicious siri commands can be hidden in music and innocuous-sounding speech recordings, May (2018) Ben, L.:. Malicious siri commands can be hidden in music and innocuous-sounding speech recordings, May (2018)
57.
go back to reference Sugawara, T., Cyr, B., Rampazzi, S., Genkin, D., Fu, K.: Laser-based audio injection attacks on voice-controllable systems, Light Commands (2019) Sugawara, T., Cyr, B., Rampazzi, S., Genkin, D., Fu, K.: Laser-based audio injection attacks on voice-controllable systems, Light Commands (2019)
58.
go back to reference Murphy, M.: How google is secretly recording you through your mobile, monitoring millions of conversations every day and storing the creepy audio files (2017) Murphy, M.: How google is secretly recording you through your mobile, monitoring millions of conversations every day and storing the creepy audio files (2017)
59.
go back to reference Thomas, Kévin, F., Hacéne, C., Stéphane, R.F.: C-its communications based on ble messages. In: GLOBECOM 2020-2020 IEEE Global Communications Conference, pp. 1–7. IEEE (2020) Thomas, Kévin, F., Hacéne, C., Stéphane, R.F.: C-its communications based on ble messages. In: GLOBECOM 2020-2020 IEEE Global Communications Conference, pp. 1–7. IEEE (2020)
60.
go back to reference Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., et al.: Experimental security analysis of a modern automobile. In: IEEE Symposium on Security and Privacy, volume 10. Oakland (2010) Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., et al.: Experimental security analysis of a modern automobile. In: IEEE Symposium on Security and Privacy, volume 10. Oakland (2010)
61.
go back to reference Wood, M., Erlinger, M.: Intrusion detection message exchange requirements. In: IETF, draft-ietf-idwg-requirements-10, (2002) Wood, M., Erlinger, M.: Intrusion detection message exchange requirements. In: IETF, draft-ietf-idwg-requirements-10, (2002)
64.
go back to reference Sukru, Y.G., Sheng, Z., Gokul, A.A., Bilin, A.G., Levent, G.: Cooperative collision avoidance in a connected vehicle environment. Technical report, SAE Technical Paper (2019) Sukru, Y.G., Sheng, Z., Gokul, A.A., Bilin, A.G., Levent, G.: Cooperative collision avoidance in a connected vehicle environment. Technical report, SAE Technical Paper (2019)
65.
go back to reference Ta, V.T., Dvir, A.: A secure road traffic congestion detection and notification concept based on v2i communications. Vehicular Commun. 25, 100283 (2020)CrossRef Ta, V.T., Dvir, A.: A secure road traffic congestion detection and notification concept based on v2i communications. Vehicular Commun. 25, 100283 (2020)CrossRef
66.
go back to reference Liu, Y., Yao, Y., Liu, C., Chu, L., Liu, X.: A remote on-line diagnostic system for vehicles by integrating obd, gps and 3g techniques. In: Practical applications of intelligent systems, pp. 607–614. Springer (2011) Liu, Y., Yao, Y., Liu, C., Chu, L., Liu, X.: A remote on-line diagnostic system for vehicles by integrating obd, gps and 3g techniques. In: Practical applications of intelligent systems, pp. 607–614. Springer (2011)
67.
go back to reference Tan, S.: Neighbor-weighted k-nearest neighbor for unbalanced text corpus. Expert Syst. Appl. 28(4), 667–671 (2005)CrossRef Tan, S.: Neighbor-weighted k-nearest neighbor for unbalanced text corpus. Expert Syst. Appl. 28(4), 667–671 (2005)CrossRef
68.
go back to reference Pelk, H.: Machine learning, neural networks and algorithms. (2017) Pelk, H.: Machine learning, neural networks and algorithms. (2017)
69.
go back to reference Abirami, S., Chitra, P.: Energy-efficient edge based real-time healthcare support system. In: Advances in Computers, vol. 117, pp. 339–368. Elsevier (2020) Abirami, S., Chitra, P.: Energy-efficient edge based real-time healthcare support system. In: Advances in Computers, vol. 117, pp. 339–368. Elsevier (2020)
70.
go back to reference Seo, E., Song, H.M., Kim, H.K.: Gids: gan based intrusion detection system for in-vehicle network. In: 2018 16th Annual Conference on Privacy, Security and Trust (PST), pp. 1–6. IEEE (2018) Seo, E., Song, H.M., Kim, H.K.: Gids: gan based intrusion detection system for in-vehicle network. In: 2018 16th Annual Conference on Privacy, Security and Trust (PST), pp. 1–6. IEEE (2018)
71.
go back to reference Krishnan, H., Bai, F., Holland, G.: Commercial and public use applications. Vehicular Netw. 4, 1–8 (2010) Krishnan, H., Bai, F., Holland, G.: Commercial and public use applications. Vehicular Netw. 4, 1–8 (2010)
Metadata
Title
AntibotV: A Multilevel Behaviour-Based Framework for Botnets Detection in Vehicular Networks
Authors
Rabah Rahal
Abdelaziz Amara Korba
Nacira Ghoualmi-Zine
Yacine Challal
Mohamed Yacine Ghamri-Doudane
Publication date
01-01-2022
Publisher
Springer US
Published in
Journal of Network and Systems Management / Issue 1/2022
Print ISSN: 1064-7570
Electronic ISSN: 1573-7705
DOI
https://doi.org/10.1007/s10922-021-09630-8

Other articles of this Issue 1/2022

Journal of Network and Systems Management 1/2022 Go to the issue

Premium Partner