skip to main content
10.1145/3264437.3264479acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

Synthetic datasets generation for intrusion detection in VANET

Authors Info & Claims
Published:10 September 2018Publication History

ABSTRACT

Inter-car network -- a VANET (vehicular adhoc network) -- enables wireless communication between vehicles (V2V) and vehicle-to-infrastructure (V2X). The main goal of VANET is to render safety and convenience on the road. VANET differs from traditional networks due to its unique characteristics such as a high speed of hosts movement, a quickly changing topology, a frequent installation and disconnection of communication links. For a lack of infrastructure and centralized management, it becomes vulnerable to misbehaviors that significantly threatens different aspects of the VANET security. VANET should provide adequate security measures for the protected cyberenvironment. One of the commonly known approaches to protect a network is an intrusion detection system (IDS) that inspects a behavior of traffic and network hosts looking for the signs of the security threats and generates the alarm for any detected security anomaly. To be effective, IDS has to be trained with an adequate dataset of samples of security threats, but such task-driven datasets have not been produced for VANET so far. This paper discusses our method of synthetic generating a dataset for VANET IDS. There is a generator that allows providing datasets applying a network simulator NS-3 when investigating various types of specific cyber attacks targeted at VANET. The paper presents the existing datasets, describes our method developed to solve the task, discusses the characteristics of the resulting dataset, and shows the outcomes of simulation. The synthetically generated datasets may be applied for training the machine learning-based VANET IDSs being used to detect security threats in new car-to-car adhoc networks.

References

  1. M. Kalinin, V. Krundyshev, P. Zegzhda, and V. Belenko. Network security architectures for VANET. In Proceedings of the 10th International Conference on Security of Information and Networks (SIN'2017), October 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. P. Bhattacharjee. 2010. Artificial Intelligence Based Authentication Technique with Three Attributes in Vehicular Ad Hoc Network. International Journal of Computer Theory and Engineering, Vol. 2, No. 3, June, 2010, 1793--1802.Google ScholarGoogle Scholar
  3. J. Z. Lei and A. Ghorbani. 2004. Network intrusion detection using an improved competitive learning neural network. In Proceeding of the Second Annual Conference on Communication Networks and Services Research, 19--21 May 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. B. Subba, S. Biswas, and S. Karmakar. 2016. A neural network based system for intrusion detection and attack classification. In Proceeding of the Twenty Second National Conference on Communication (NCC), March 2016.Google ScholarGoogle ScholarCross RefCross Ref
  5. M. Erritali and B. El Ouahidi. 2013. A Survey on VANET Intrusion Detection Systems. In Proceedings of the 2013 International Conference on Systems, Control, Signal Processing and Informatics. International Journal of Engineering and Technology (IJET), Vol. 5, No. 2, April, 2013, 1985--1989.Google ScholarGoogle Scholar
  6. G. Kaur and A. Kaur. 2016. IDS System against Gray Hole Attack in VANET. International Journal of Science and Research (IJSR), Volume 5 Issue 5, May 2016, 100--104.Google ScholarGoogle Scholar
  7. M. Zamani and M. Movahedi. 2013. Machine Learning Techniques for Intrusion Detection. CoRR, vol. abs/1312.2177, 2013.Google ScholarGoogle Scholar
  8. M. Almseidin, M. Alzubi, S. Kovacs, and M. Alkasassbeh. 2017. Evaluation of Machine Learning Algorithms for Intrusion Detection System. Intelligent Systems and Informatics (SISY), 2017, Serbia, 277--282.Google ScholarGoogle Scholar
  9. A. Olusola, A. Oladele, and D. Abosede. 2010. Analysis of KDD '99 Intrusion Detection Dataset for Selection of Relevance Features. In Proceeding of the World Congress on Engineering and Computer Science 2010, Vol. 1, 162--168.Google ScholarGoogle Scholar
  10. DARPA intrusion detection evaluation. June 2018. http://www.ll.mit.edu/IST/ideval/data/data index.htmlGoogle ScholarGoogle Scholar
  11. KDD Cup 1999. June 2018. Retrieved from http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.Google ScholarGoogle Scholar
  12. Te-Shun Chou. 2007. Ensemble Fuzzy Belief Intrusion Detection Design. Florida International University.Google ScholarGoogle Scholar
  13. Intrusion detection evaluation dataset (ISCXIDS2012). June 2018. Retrieved from http://www.unb.ca/cic/datasets/ids-2017.htmlGoogle ScholarGoogle Scholar
  14. W. Yassin, N. Udzir, A. Abdullah, M. Zulzalil, and Z. Muda. 2014. Signature-based anomaly intrusion detection using integrated data mining classifiers. In 2014 International Symposium on Biometrics and Security Technologies (ISBAST), 232--237Google ScholarGoogle Scholar
  15. LBNL dataset. June 2018. Retrieved from http://powerdata.lbl.gov/download.htmlGoogle ScholarGoogle Scholar
  16. CAIDA dataset. June 2018. Retrieved from https://www.caida.org/data/Google ScholarGoogle Scholar
  17. R. van der Heijden, T. Lukaseder, and F. Kargl. 2018. VeReMi: A Dataset for Comparable Evaluation of Misbehavior Detection in VANETs. arXiv preprint arXiv:1804.06701.Google ScholarGoogle Scholar
  18. NS-3. June 2018. Open source network simulator. Retrieved from https://www.nsnam.org/.Google ScholarGoogle Scholar

Index Terms

  1. Synthetic datasets generation for intrusion detection in VANET

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          SIN '18: Proceedings of the 11th International Conference on Security of Information and Networks
          September 2018
          148 pages
          ISBN:9781450366083
          DOI:10.1145/3264437

          Copyright © 2018 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 10 September 2018

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

          Acceptance Rates

          SIN '18 Paper Acceptance Rate24of42submissions,57%Overall Acceptance Rate102of289submissions,35%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader