Tree-Based Intelligent Intrusion Detection System in Internet of Vehicles
Li Yang,Abdallah Moubayed,Ismail Hamieh,Abdallah Shami +3 more
- pp 1-6
Reads0
Chats0
TLDR
An intelligent intrusion detection system (IDS) is proposed based on tree-structure machine learning models that has the ability to identify various cyber-attacks in the AV networks and can achieve high detection rate and low computational cost simultaneously.Abstract:
The use of autonomous vehicles (AVs) is a promising technology in Intelligent Transportation Systems (ITSs) to improve safety and driving efficiency. Vehicle-to-everything (V2X) technology enables communication among vehicles and other infrastructures. However, AVs and Internet of Vehicles (IoV) are vulnerable to different types of cyber-attacks such as denial of service, spoofing, and sniffing attacks. In this paper, an intelligent intrusion detection system (IDS) is proposed based on tree-structure machine learning models. The results from the implementation of the proposed intrusion detection system on standard data sets indicate that the system has the ability to identify various cyber-attacks in the AV networks. Furthermore, the proposed ensemble learning and feature selection approaches enable the proposed system to achieve high detection rate and low computational cost simultaneously.read more
Citations
More filters
Journal ArticleDOI
I and i
TL;DR: There is, I think, something ethereal about i —the square root of minus one, which seems an odd beast at that time—an intruder hovering on the edge of reality.
Journal ArticleDOI
On Hyperparameter Optimization of Machine Learning Algorithms: Theory and Practice
Li Yang,Abdallah Shami +1 more
TL;DR: This survey paper will help industrial users, data analysts, and researchers to better develop machine learning models by identifying the proper hyper-parameter configurations effectively and introducing several state-of-the-art optimization techniques.
Journal ArticleDOI
Novel Deep Learning-Enabled LSTM Autoencoder Architecture for Discovering Anomalous Events From Intelligent Transportation Systems
TL;DR: A deep learning-based Intrusion Detection System (IDS) for ITS, in particular, to discover suspicious network activity of In-Vehicles Networks (IVN), vehicles to vehicles communications and vehicles to infrastructure (V2I) networks.
Journal ArticleDOI
MTH-IDS: A Multi-Tiered Hybrid Intrusion Detection System for Internet of Vehicles
TL;DR: In this article, a multi-tiered hybrid IDS was proposed to detect both known and unknown attacks on vehicular networks, which can detect various types of known attacks with 99.99% accuracy on the CAN-intrusion-dataset representing the intra-vehicle network data.
Journal ArticleDOI
Systematic ensemble model selection approach for educational data mining
TL;DR: This work proposes a systematic approach based on Gini index and p -value to select a suitable ensemble learner from a combination of six potential machine learning algorithms.
References
More filters
Journal ArticleDOI
SMOTE: synthetic minority over-sampling technique
TL;DR: In this article, a method of over-sampling the minority class involves creating synthetic minority class examples, which is evaluated using the area under the Receiver Operating Characteristic curve (AUC) and the ROC convex hull strategy.
Book
Computational Complexity of Machine Learning
TL;DR: A centerpiece of the thesis is a series of results demonstrating the computational difficulty of learning a number of well-studied concept classes by reducing some apparently hard number-theoretic problems from cryptography to the learning problems.
Journal ArticleDOI
Efficient Intrusion Detection With Bloom Filtering in Controller Area Networks
Bogdan Groza,Pal-Stefan Murvay +1 more
TL;DR: An intrusion detection mechanism that takes advantage of Bloom filtering to test frame periodicity based on message identifiers and parts of the data-field which facilitates detection of potential replay or modification attacks is proposed.
Proceedings ArticleDOI
Machine Learning for Performance-Aware Virtual Network Function Placement
Dimitrios Michael Manias,Manar Jammal,Hassan Hawilo,Abdallah Shami,Parisa Heidari,Adel Larabi,Richard Brunner +6 more
TL;DR: In this article, a machine learning decision tree model is proposed to learn from the effective placement of the various VNF instances forming a Service Function Chain (SFC), which takes several performance-related features from the network as an input and selects the placement of VNF instance on network servers with the objective of minimizing the delay between dependent VNFs.
Proceedings ArticleDOI
DNS Typo-Squatting Domain Detection: A Data Analytics a Machine Learning Based Approach
TL;DR: A majority voting-based ensemble learning classifier built using five classification algorithms is proposed that can detect suspicious domains with high accuracy and performs better in terms of accuracy, precision, and F-score.
Related Papers (5)
On Hyperparameter Optimization of Machine Learning Algorithms: Theory and Practice
Li Yang,Abdallah Shami +1 more