Skip to main content
Top
Published in: Wireless Personal Communications 2/2020

06-07-2020

Towards the Development of Realistic DoS Dataset for Intelligent Transportation Systems

Authors: Rabah Rahal, Abdelaziz Amara Korba, Nacira Ghoualmi-Zine

Published in: Wireless Personal Communications | Issue 2/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Vehicular ad-hoc networks (VANETs) present security vulnerabilities, which make them prone to diverse cyberattacks. Denial of Service (DoS) is one of the most prevalent and severe cyberattack that targets VANETs. To tackle this cyberattack and mitigate its effect, intrusion detection systems need to be developed. To this end, a realistic and representative dataset is essential to train and validate the systems. This paper proposes a new dataset, VDoS-LRS, which includes legitimate and simulated vehicular network traffic, along with different types of DoS cyberattack. We also present a realistic testbed environment instead of simulators, taking into consideration different environments (urban, highway and rural). In addition, we explore a wide range of traffic features for detecting and classifying vehicular traffic. We evaluate the reliability of the VDoS-LRS dataset using different machine learning algorithms for forensics purposes. The experimental results showed that it is possible to detect effectively different types of DoS cyberattack within diverse environments.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Rehman, O. M. H., Bourdoucen, H., & Ould-Khaoua, M. (2015). Forward link quality estimation in VANETs for sender-oriented alert messages broadcast. Journal of Network and Computer Applications, 58, 23–41. Rehman, O. M. H., Bourdoucen, H., & Ould-Khaoua, M. (2015). Forward link quality estimation in VANETs for sender-oriented alert messages broadcast. Journal of Network and Computer Applications, 58, 23–41.
2.
go back to reference Mihaita, A.-E., Dobre, C., Pop, F., Mavromoustakis, C. X., & Mastorakis, G. (2016). Secure opportunistic vehicle-to-vehicle communication. In C. X. Mavromoustakis, G. Mastorakis, C. Dobre (Eds.), Studies in big data (pp. 229–268). Springer. Mihaita, A.-E., Dobre, C., Pop, F., Mavromoustakis, C. X., & Mastorakis, G. (2016). Secure opportunistic vehicle-to-vehicle communication. In C. X. Mavromoustakis, G. Mastorakis, C. Dobre (Eds.), Studies in big data (pp. 229–268). Springer.
3.
go back to reference Bektache, D., Tolba, C., & Zine, N. G. (2014). Forecasting approach in VANET based on vehicle kinematics for road safety. International Journal of Vehicle Safety, 7(2), 147. Bektache, D., Tolba, C., & Zine, N. G. (2014). Forecasting approach in VANET based on vehicle kinematics for road safety. International Journal of Vehicle Safety, 7(2), 147.
4.
go back to reference Gadkari, M. Y., & Sambre, N. B. (2012). VANET: Routing protocols, security issues and simulation tools. IOSR Journal of Computer Engineering, 3(3), 28–38. Gadkari, M. Y., & Sambre, N. B. (2012). VANET: Routing protocols, security issues and simulation tools. IOSR Journal of Computer Engineering, 3(3), 28–38.
5.
go back to reference Malik, A., & Pandey, B. (2018). CIAS: A comprehensive identity authentication scheme for providing security in VANET. International Journal of Information Security and Privacy (IJISP), 12(1), 29–41. Malik, A., & Pandey, B. (2018). CIAS: A comprehensive identity authentication scheme for providing security in VANET. International Journal of Information Security and Privacy (IJISP), 12(1), 29–41.
6.
go back to reference Belenko, V., Krundyshev, V., & Kalinin, M. (2018). Synthetic datasets generation for intrusion detection in VANET. In Proceedings of the 11th international conference on security of information and networks (p. 9). ACM. Belenko, V., Krundyshev, V., & Kalinin, M. (2018). Synthetic datasets generation for intrusion detection in VANET. In Proceedings of the 11th international conference on security of information and networks (p. 9). ACM.
7.
go back to reference Alheeti, K. M. A., Gruebler, A., & McDonald-Maier, K. D. (2015). On the detection of grey hole and rushing attacks in self-driving vehicular networks. In 2015 7th Computer science and electronic engineering conference (CEEC) (pp. 231–236). IEEE. Alheeti, K. M. A., Gruebler, A., & McDonald-Maier, K. D. (2015). On the detection of grey hole and rushing attacks in self-driving vehicular networks. In 2015 7th Computer science and electronic engineering conference (CEEC) (pp. 231–236). IEEE.
8.
go back to reference Grover, J., Prajapati, N. K., Laxmi, V., & Gaur, M. S. (2011). Machine learning approach for multiple misbehavior detection in VANET. In International conference on advances in computing and communications (pp. 644–653). Berlin: Springer. Grover, J., Prajapati, N. K., Laxmi, V., & Gaur, M. S. (2011). Machine learning approach for multiple misbehavior detection in VANET. In International conference on advances in computing and communications (pp. 644–653). Berlin: Springer.
9.
go back to reference Singh, P. K., Gupta, R. R., Nandi, S. K., & Nandi, S. (2019). Machine learning based approach to detect wormhole attack in VANETs. In Workshops of the international conference on advanced information networking and applications (pp. 651–661). Cham: Springer. Singh, P. K., Gupta, R. R., Nandi, S. K., & Nandi, S. (2019). Machine learning based approach to detect wormhole attack in VANETs. In Workshops of the international conference on advanced information networking and applications (pp. 651–661). Cham: Springer.
10.
go back to reference Singh, P. K., Gupta, S., Vashistha, R., Nandi, S. K., & Nandi, S. (2019). Machine learning based approach to detect position falsification attack in VANETs. In International conference on security and privacy (pp. 166–178). Singapore: Springer. Singh, P. K., Gupta, S., Vashistha, R., Nandi, S. K., & Nandi, S. (2019). Machine learning based approach to detect position falsification attack in VANETs. In International conference on security and privacy (pp. 166–178). Singapore: Springer.
11.
go back to reference Hasrouny, H., Samhat, A. E., Bassil, C., & Laouiti, A. (2017). VANet security challenges and solutions: A survey. Vehicular Communications, 7, 7–20. Hasrouny, H., Samhat, A. E., Bassil, C., & Laouiti, A. (2017). VANet security challenges and solutions: A survey. Vehicular Communications, 7, 7–20.
12.
go back to reference Quyoom, A., Ali, R., Gouttam, D. N., & Sharma, H. (2015). A novel mechanism of detection of denial of service attack (DoS) in VANET using Malicious and Irrelevant Packet Detection Algorithm (MIPDA). In International conference on computing, communication and automation (pp. 414–419). IEEE. Quyoom, A., Ali, R., Gouttam, D. N., & Sharma, H. (2015). A novel mechanism of detection of denial of service attack (DoS) in VANET using Malicious and Irrelevant Packet Detection Algorithm (MIPDA). In International conference on computing, communication and automation (pp. 414–419). IEEE.
13.
go back to reference Aloqaily, M., Otoum, S., Al Ridhawi, I., & Jararweh, Y. (2019). An intrusion detection system for connected vehicles in smart cities. Ad Hoc Networks, 90, 101842. Aloqaily, M., Otoum, S., Al Ridhawi, I., & Jararweh, Y. (2019). An intrusion detection system for connected vehicles in smart cities. Ad Hoc Networks, 90, 101842.
14.
go back to reference Anzer, A., & Elhadef, M. (2018). Deep learning-based intrusion detection systems for intelligent vehicular ad hoc networks. In J. J. Park, V. Loia, K.-K. R. Choo, & G. Yi (Eds.), Advanced multimedia and ubiquitous engineering (pp. 109–116). Singapore: Springer. Anzer, A., & Elhadef, M. (2018). Deep learning-based intrusion detection systems for intelligent vehicular ad hoc networks. In J. J. Park, V. Loia, K.-K. R. Choo, & G. Yi (Eds.), Advanced multimedia and ubiquitous engineering (pp. 109–116). Singapore: Springer.
15.
go back to reference Gyawali, S., & Qian, Y. (2019). Misbehavior detection using machine learning in vehicular communication networks. In ICC 2019–2019 IEEE international conference on communications (ICC) (pp. 1–6). IEEE. Gyawali, S., & Qian, Y. (2019). Misbehavior detection using machine learning in vehicular communication networks. In ICC 20192019 IEEE international conference on communications (ICC) (pp. 1–6). IEEE.
16.
go back to reference Krundyshev, V., Kalinin, M., & Zegzhda, P. (2018). Artificial swarm algorithm for VANET protection against routing attacks. In 2018 IEEE industrial cyber-physical systems (ICPS) (pp. 795–800). IEEE. Krundyshev, V., Kalinin, M., & Zegzhda, P. (2018). Artificial swarm algorithm for VANET protection against routing attacks. In 2018 IEEE industrial cyber-physical systems (ICPS) (pp. 795–800). IEEE.
17.
go back to reference Kumar, S., & Mann, K. S. (2018). Detection of multiple malicious nodes using entropy for mitigating the effect of denial of service attack in VANETs. In 2018 4th International conference on computing sciences (ICCS) (pp. 72–79). IEEE. Kumar, S., & Mann, K. S. (2018). Detection of multiple malicious nodes using entropy for mitigating the effect of denial of service attack in VANETs. In 2018 4th International conference on computing sciences (ICCS) (pp. 72–79). IEEE.
18.
go back to reference Lyamin, N., Kleyko, D., Delooz, Q., & Vinel, A. (2019). Real-time jamming DoS detection in safety-critical V2V C-ITS using data mining. IEEE Communications Letters, 23(3), 442–445. Lyamin, N., Kleyko, D., Delooz, Q., & Vinel, A. (2019). Real-time jamming DoS detection in safety-critical V2V C-ITS using data mining. IEEE Communications Letters, 23(3), 442–445.
19.
go back to reference Schmidt, D. A., Khan, M. S., & Bennett, B. T. (2019). Spline based intrusion detection in vehicular ad hoc networks (VANET). arXiv preprint arXiv:1903.08018. Schmidt, D. A., Khan, M. S., & Bennett, B. T. (2019). Spline based intrusion detection in vehicular ad hoc networks (VANET). arXiv preprint arXiv:​1903.​08018.
20.
go back to reference Tomandl, A., Fuchs, K. P., & Federrath, H. (2014). REST-Net: A dynamic rule-based IDS for VANETs. In 2014 7th IFIP wireless and mobile networking conference (WMNC) (pp. 1–8). IEEE. Tomandl, A., Fuchs, K. P., & Federrath, H. (2014). REST-Net: A dynamic rule-based IDS for VANETs. In 2014 7th IFIP wireless and mobile networking conference (WMNC) (pp. 1–8). IEEE.
29.
go back to reference Nagle, D. (2019). Packet sender—Free utility to for sending/receiving of network packets. TCP, UDP, SSL. [online] Packetsender.com. Retrieved August 15, 2019, from https://packetsender.com/. Nagle, D. (2019). Packet senderFree utility to for sending/receiving of network packets. TCP, UDP, SSL. [online] Packetsender.com. Retrieved August 15, 2019, from https://​packetsender.​com/​.
32.
go back to reference Lashkari, A. H., Kadir, A. F. A., Gonzalez, H., Mbah, K. F., & Ghorbani, A. A. (2017). Towards a network-based framework for android malware detection and characterization. In 2017 15th Annual conference on privacy, security and trust (PST) (pp. 233–23309). IEEE. Lashkari, A. H., Kadir, A. F. A., Gonzalez, H., Mbah, K. F., & Ghorbani, A. A. (2017). Towards a network-based framework for android malware detection and characterization. In 2017 15th Annual conference on privacy, security and trust (PST) (pp. 233–23309). IEEE.
35.
go back to reference Mitchell, T. M. (1997). Machine learning (1st ed.). New York, NY: McGraw-Hill, Inc.MATH Mitchell, T. M. (1997). Machine learning (1st ed.). New York, NY: McGraw-Hill, Inc.MATH
36.
go back to reference Cortes, C., & Vapnik, V. (1995). Support-vector networks. Machine Learning, 20(3), 273–297.MATH Cortes, C., & Vapnik, V. (1995). Support-vector networks. Machine Learning, 20(3), 273–297.MATH
37.
go back to reference Tan, S. (2005). Neighbor-weighted k-nearest neighbor for unbalanced text corpus. Expert Systems with Applications, 28(4), 667–671. Tan, S. (2005). Neighbor-weighted k-nearest neighbor for unbalanced text corpus. Expert Systems with Applications, 28(4), 667–671.
38.
go back to reference Breiman, L. (2017). Classification and regression trees. Abingdon: Routledge. Breiman, L. (2017). Classification and regression trees. Abingdon: Routledge.
Metadata
Title
Towards the Development of Realistic DoS Dataset for Intelligent Transportation Systems
Authors
Rabah Rahal
Abdelaziz Amara Korba
Nacira Ghoualmi-Zine
Publication date
06-07-2020
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2020
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07635-1

Other articles of this Issue 2/2020

Wireless Personal Communications 2/2020 Go to the issue