iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.3390/JSAN11010006
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,23]],"date-time":"2024-09-23T04:27:37Z","timestamp":1727065657660},"reference-count":28,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2022,1,10]],"date-time":"2022-01-10T00:00:00Z","timestamp":1641772800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSAN"],"abstract":"With the emergence of networked devices, from the Internet of Things (IoT) nodes and cellular phones to vehicles connected to the Internet, there has been an ever-growing expansion of attack surfaces in the Internet of Vehicles (IoV). In the past decade, there has been a rapid growth in the automotive industry as network-enabled and electronic devices are now integral parts of vehicular ecosystems. These include the development of automobile technologies, namely, Connected and Autonomous Vehicles (CAV) and electric vehicles. Attacks on IoV may lead to malfunctioning of Electronic Control Unit (ECU), brakes, control steering issues, and door lock issues that can be fatal in CAV. To mitigate these risks, there is need for a lightweight model to identify attacks on vehicular systems. In this article, an efficient model of an Intrusion Detection System (IDS) is developed to detect anomalies in the vehicular system. The dataset used in this study is an In-Vehicle Network (IVN) communication protocol, i.e., Control Area Network (CAN) dataset generated in a real-time environment. The model classifies different types of attacks on vehicles into reconnaissance, Denial of Service (DoS), and fuzzing attacks. Experimentation with performance metrics of accuracy, precision, recall, and F-1 score are compared across a variety of classification models. The results demonstrate that the proposed model outperforms other classification models.<\/jats:p>","DOI":"10.3390\/jsan11010006","type":"journal-article","created":{"date-parts":[[2022,1,10]],"date-time":"2022-01-10T22:42:25Z","timestamp":1641854545000},"page":"6","source":"Crossref","is-referenced-by-count":25,"title":["Towards a Lightweight Intrusion Detection Framework for In-Vehicle Networks"],"prefix":"10.3390","volume":"11","author":[{"given":"Dheeraj","family":"Basavaraj","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, California State University, Fresno, CA 93740, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7466-1042","authenticated-orcid":false,"given":"Shahab","family":"Tayeb","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, California State University, Fresno, CA 93740, USA"}]}],"member":"1968","published-online":{"date-parts":[[2022,1,10]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Li, H., Zhao, L., Juliato, M., Ahmed, S., Sastry, M.R., and Yang, L.L. (2017). POSTER: Intrusion Detection System for In-vehicle Networks using Sensor Correlation and Integration. ACM SIGSAC Conference on Computer and Communications Security (CCS \u201917), Association for Computing Machinery.","DOI":"10.1145\/3133956.3138843"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"He, Q., Meng, X., Qu, R., and Xi, R. (2020). Machine Learning-Based Detection for Cyber Security Attacks on Connected and Autonomous Vehicles. Mathematics, 8.","DOI":"10.3390\/math8081311"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Thapa, N., Liu, Z., Kc, D.B., Gokaraju, B., and Roy, K. (2020). Comparison of Machine Learning and Deep Learning Models for Network Intrusion Detection Systems. Future Internet, I2.","DOI":"10.3390\/fi12100167"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Tayeb, S., Pirouz, M., and Latifi, S. (2017, January 22). A Raspberry-Pi Prototype of Smart Transportation. Proceedings of the 2017 25th International Conference on Systems Engineering (ICSEng), Las Vegas, NV, USA.","DOI":"10.1109\/ICSEng.2017.25"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Trueblood, F., Gill, S., Wong, R., Tayeb, S., and Pirouz, M. (2020, January 6). A Data-Centric Approach to Taming the Message Dissemination on the Internet of Vehicles. Proceedings of the 10th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA.","DOI":"10.1109\/CCWC47524.2020.9031272"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Arai, K., Kapoor, S., and Bhatia, R. Optimizing Connectivity for the Internet of Vehicles. Proceedings of the Future Technologies Conference (FTC) 2020, Advances in Intelligent Systems and Computing.","DOI":"10.1007\/978-3-030-32523-7"},{"key":"ref_7","first-page":"76","article-title":"Intrusion Detection System for In-Vehicle Networks","volume":"88","author":"Hamada","year":"2019","journal-title":"SEI Tech. Rev."},{"key":"ref_8","first-page":"90","article-title":"Cyber security attacks to modern vehicular systems","volume":"36","author":"Pan","year":"2017","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Davis, A., Gill, S., Wong, R., and Tayeb, S. (2020, January 9\u201312). Feature Selection for Deep Neural Networks in Cyber Security Applications. Proceedings of the 2020 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Vancouver, BC, Canada.","DOI":"10.1109\/IEMTRONICS51293.2020.9216403"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/TSE.1987.232894","article-title":"An Intrusion-Detection Model","volume":"13","author":"Denning","year":"1987","journal-title":"IEEE Trans. Softw. Eng."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/65.283931","article-title":"Network intrusion detection","volume":"8","author":"Mukherjee","year":"1994","journal-title":"IEEE Netw."},{"key":"ref_12","unstructured":"Dupont, G., Lekidis, A., den Hartog, J., and Etalle, S. (2021, December 30). Automotive Controller Area Network (CAN) Bus Intrusion Dataset v2. 4TU.ResearchData. 4TU.ResearchData, Available online: https:\/\/data.4tu.nl\/articles\/dataset\/Automotive_Controller_Area_Network_CAN_Bus_Intrusion_Dataset\/12696950\/2."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Aloqaily, M., Otoum, S., Ridhawi, I.A., and Jararweh, Y. (2019). An intrusion detection system for connected vehicles in smart cities. Ad Hocnetworks, 90.","DOI":"10.1016\/j.adhoc.2019.02.001"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Barletta, V.S., Caivano, D., Nannavecchia, A., and Scalera, M. (2020). Intrusion Detection for in-Vehicle Communication Networks: An Unsupervised Kohonen SOM Approach. Future Internet, I2.","DOI":"10.3390\/fi12070119"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"20255","DOI":"10.1109\/ACCESS.2018.2820092","article-title":"A new intrusion detection system based on fast learning network and particle swarm optimization","volume":"6","author":"Ali","year":"2018","journal-title":"IEEE Access"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"13624","DOI":"10.1109\/ACCESS.2018.2810198","article-title":"An improved intrusion detection algorithm based on GA and SVM","volume":"6","author":"Tao","year":"2018","journal-title":"IEEE Access"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Brown, J., Anwar, M., and Dozier, G. (2016, January 1). An Evolutionary General Regression Neural Network Classifier for Intrusion Detection. Proceedings of the 25th International Conference on Computer Communication and Networks (ICCCN), Waikoloa, HI, USA.","DOI":"10.1109\/ICCCN.2016.7568493"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/j.pisc.2016.04.005","article-title":"Computational neural network regression model for host-based intrusion detection system","volume":"8","author":"Gautam","year":"2016","journal-title":"Perspect. Sci."},{"key":"ref_19","unstructured":"Masarat, S., Taheri, H., and Sharifian, S. (29, January 29\u201330). A novel framework, based on fuzzy ensemble of classifiers for intrusion detection systems. Proceedings of the 4th International Conference on Computer and Knowledge Engineering (ICCKE), Mashhad, Iran."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"24188","DOI":"10.3390\/s141224188","article-title":"A malicious pattern detection engine for embedded security systems on the Internet of Things","volume":"14","author":"Oh","year":"2014","journal-title":"Sensors"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"A Ghaleb, F., Saeed, F., Al-Sarem, M., Ali Saleh Al-rimy, B., Boulila, W., Eljialy, A.E.M., Aloufi, K., and Alazab, M. (2020). Misbehavior-Aware On-Demand Collaborative Intrusion Detection System Using Distributed Ensemble Learning for VANET. Electronics, 9.","DOI":"10.3390\/electronics9091411"},{"key":"ref_22","first-page":"1266","article-title":"Identifying Impersonation Attack in VANET using k-NN and SVM Approach","volume":"13","author":"Mrugnayana","year":"2020","journal-title":"Int. J. Future Gener. Commun. Netw."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Song, H.M., Kim, H.R., and Kim, H.K. (2016, January 13). Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network. Proceedings of the International Conference on Information Networking (ICOIN), Kota Kinabalu, Malaysia.","DOI":"10.1109\/ICOIN.2016.7427089"},{"key":"ref_24","unstructured":"Khan, Z., Chowdhury, M., Islam, M., Huang, C.-Y., and Rahman, M. (2019). Long Short-Term Memory Neural Networks for False Information Attack Detection in Software-Defined In-Vehicle Network. arXiv."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"12060","DOI":"10.1109\/ACCESS.2017.2787719","article-title":"An effective two-step intrusion detection approach based on binary classification and -NN","volume":"6","author":"Li","year":"2018","journal-title":"IEEE Access"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Sani, A.Y., Mohamedou, K., Ali, A., Farjamfar, M.A., and Shamsuddin, S. (2009, January 16). An overview of neural networks use in anomaly Intrusion Detection Systems. Proceedings of the IEEE Student Conference on Research and Development (SCOReD), Serdang, Malaysia.","DOI":"10.1109\/SCORED.2009.5443289"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Zieglmeier, V., Kacianka, S., Hutzelmann, T., and Pretschner, A. (2019, January 8). A Real-Time Remote IDS Testbed for Connected Vehicles. Proceedings of the 34th ACM\/SIGAPP Symposium on Applied Computing (SAC \u201919), Limassol, Cyprus.","DOI":"10.1145\/3297280.3297465"},{"key":"ref_28","first-page":"129","article-title":"A novel hybrid GA and SVM with PSO feature selection for intrusion detection system","volume":"4","author":"Moukhafi","year":"2018","journal-title":"Int. J. Adv. Sci. Res. Eng."}],"container-title":["Journal of Sensor and Actuator Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2224-2708\/11\/1\/6\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T08:47:05Z","timestamp":1721810825000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2224-2708\/11\/1\/6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,10]]},"references-count":28,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2022,3]]}},"alternative-id":["jsan11010006"],"URL":"http:\/\/dx.doi.org\/10.3390\/jsan11010006","relation":{},"ISSN":["2224-2708"],"issn-type":[{"value":"2224-2708","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,10]]}}}