ABSTRACT
Inter-car network -- a VANET (vehicular adhoc network) -- enables wireless communication between vehicles (V2V) and vehicle-to-infrastructure (V2X). The main goal of VANET is to render safety and convenience on the road. VANET differs from traditional networks due to its unique characteristics such as a high speed of hosts movement, a quickly changing topology, a frequent installation and disconnection of communication links. For a lack of infrastructure and centralized management, it becomes vulnerable to misbehaviors that significantly threatens different aspects of the VANET security. VANET should provide adequate security measures for the protected cyberenvironment. One of the commonly known approaches to protect a network is an intrusion detection system (IDS) that inspects a behavior of traffic and network hosts looking for the signs of the security threats and generates the alarm for any detected security anomaly. To be effective, IDS has to be trained with an adequate dataset of samples of security threats, but such task-driven datasets have not been produced for VANET so far. This paper discusses our method of synthetic generating a dataset for VANET IDS. There is a generator that allows providing datasets applying a network simulator NS-3 when investigating various types of specific cyber attacks targeted at VANET. The paper presents the existing datasets, describes our method developed to solve the task, discusses the characteristics of the resulting dataset, and shows the outcomes of simulation. The synthetically generated datasets may be applied for training the machine learning-based VANET IDSs being used to detect security threats in new car-to-car adhoc networks.
- M. Kalinin, V. Krundyshev, P. Zegzhda, and V. Belenko. Network security architectures for VANET. In Proceedings of the 10th International Conference on Security of Information and Networks (SIN'2017), October 2017. Google ScholarDigital Library
- P. Bhattacharjee. 2010. Artificial Intelligence Based Authentication Technique with Three Attributes in Vehicular Ad Hoc Network. International Journal of Computer Theory and Engineering, Vol. 2, No. 3, June, 2010, 1793--1802.Google Scholar
- J. Z. Lei and A. Ghorbani. 2004. Network intrusion detection using an improved competitive learning neural network. In Proceeding of the Second Annual Conference on Communication Networks and Services Research, 19--21 May 2004. Google ScholarDigital Library
- B. Subba, S. Biswas, and S. Karmakar. 2016. A neural network based system for intrusion detection and attack classification. In Proceeding of the Twenty Second National Conference on Communication (NCC), March 2016.Google ScholarCross Ref
- M. Erritali and B. El Ouahidi. 2013. A Survey on VANET Intrusion Detection Systems. In Proceedings of the 2013 International Conference on Systems, Control, Signal Processing and Informatics. International Journal of Engineering and Technology (IJET), Vol. 5, No. 2, April, 2013, 1985--1989.Google Scholar
- G. Kaur and A. Kaur. 2016. IDS System against Gray Hole Attack in VANET. International Journal of Science and Research (IJSR), Volume 5 Issue 5, May 2016, 100--104.Google Scholar
- M. Zamani and M. Movahedi. 2013. Machine Learning Techniques for Intrusion Detection. CoRR, vol. abs/1312.2177, 2013.Google Scholar
- M. Almseidin, M. Alzubi, S. Kovacs, and M. Alkasassbeh. 2017. Evaluation of Machine Learning Algorithms for Intrusion Detection System. Intelligent Systems and Informatics (SISY), 2017, Serbia, 277--282.Google Scholar
- A. Olusola, A. Oladele, and D. Abosede. 2010. Analysis of KDD '99 Intrusion Detection Dataset for Selection of Relevance Features. In Proceeding of the World Congress on Engineering and Computer Science 2010, Vol. 1, 162--168.Google Scholar
- DARPA intrusion detection evaluation. June 2018. http://www.ll.mit.edu/IST/ideval/data/data index.htmlGoogle Scholar
- KDD Cup 1999. June 2018. Retrieved from http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.Google Scholar
- Te-Shun Chou. 2007. Ensemble Fuzzy Belief Intrusion Detection Design. Florida International University.Google Scholar
- Intrusion detection evaluation dataset (ISCXIDS2012). June 2018. Retrieved from http://www.unb.ca/cic/datasets/ids-2017.htmlGoogle Scholar
- W. Yassin, N. Udzir, A. Abdullah, M. Zulzalil, and Z. Muda. 2014. Signature-based anomaly intrusion detection using integrated data mining classifiers. In 2014 International Symposium on Biometrics and Security Technologies (ISBAST), 232--237Google Scholar
- LBNL dataset. June 2018. Retrieved from http://powerdata.lbl.gov/download.htmlGoogle Scholar
- CAIDA dataset. June 2018. Retrieved from https://www.caida.org/data/Google Scholar
- R. van der Heijden, T. Lukaseder, and F. Kargl. 2018. VeReMi: A Dataset for Comparable Evaluation of Misbehavior Detection in VANETs. arXiv preprint arXiv:1804.06701.Google Scholar
- NS-3. June 2018. Open source network simulator. Retrieved from https://www.nsnam.org/.Google Scholar
Index Terms
- Synthetic datasets generation for intrusion detection in VANET
Recommendations
Decision support protocol for intrusion detection in VANETs
DIVANet '13: Proceedings of the third ACM international symposium on Design and analysis of intelligent vehicular networks and applicationsVehicular Ad hoc Networks (VANETs) are so difficult to secure due to the wireless technology and its several known security holes. To protect against attacks, methods and techniques have been developed. The Intrusion Detection System (IDS) can detect ...
Enhancing vehicular ad-hoc networks security using intrusion detection system techniques
SCA '19: Proceedings of the 4th International Conference on Smart City ApplicationsThe deployment of vehicular ad hoc networks has greatly increased the risks caused by the attacks on vehicular networks, that represents a real problem for road safety. To secure this network against these attacks, several methods and techniques have ...
Intrusion Detection in the RPL-connected 6LoWPAN Networks
IoTPTS '17: Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and SecurityThe interconnectivity of 6LoWPAN networks with the Internet raises serious security concerns, as constrained 6LoWPAN devices are accessible anywhere from the untrusted global Internet. Also, 6LoWPAN devices are mostly deployed in unattended environments,...
Comments