Abstract
Vehicular ad-hoc networks (VANETs) are core components of the cooperative intelligent transportation system (C-ITS). Vehicles communicate with each other to obtain traffic conditions on the current road segment by broadcasting authenticated safety messages using their digital certificates. Although this method protects the system against external threats, it is ineffective when faced with internal adversaries who possess legal certificates. Consequently, an increasing number of researchers have focused on intrusion detection (misbehavior detection) technology. VeReMi and its extension version are the only public misbehavior datasets of VANETs in its field, allowing researchers to compare their studies with those of others. We note that denial of service (DoS) attacks in these datasets are insufficiently comprehensive. As a result, we designed a more complete dataset than existing datasets by implementing multiple attacks, including different types of distributed denial of service (DDoS) attacks. We present the detection results of some machine learning algorithms on our proposed dataset. These results indicate that our dataset can be utilized as a reference for future studies to evaluate different detection methods.
The work was supported by the National Natural Science Foundation of China (61872001), the Excellent Youth Foundation of Anhui Scientific Committee (2108085J31), and the Special Fund for Key Program of Science and Technology of Anhui Province, China (202003A05020043).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alhaidari, F.A., Alrehan, A.M.: A simulation work for generating a novel dataset to detect distributed denial of service attacks on vehicular ad hoc network systems. Int. J. Distrib. Sens. Netw. 17(3), 1–25 (2021)
Belenko, V., Krundyshev, V., Kalinin, M.: Synthetic datasets generation for intrusion detection in VANET. In: 11th International Conference on Security of Information and Networks, pp. 1–6. ACM (2018)
Belgiu, M., Drăguţ, L.: Random forest in remote sensing: a review of applications and future directions. ISPRS J. Photogramm. Remote. Sens. 114, 24–31 (2016)
Codeca, L., Frank, R., Engel, T.: Luxembourg sumo traffic (lust) scenario: 24 hours of mobility for vehicular networking research. In: Vehicular Networking Conference (VNC), pp. 1–8. IEEE (2015)
Gonçalves, F., et al.: Synthesizing datasets with security threats for vehicular ad-hoc networks. In: Global Communications Conference (GLOBECOM), pp. 1–6. IEEE (2020)
Haidar, F., Kamel, J., Jemaa, I.B., Kaiser, A., Lonc, B., Urien, P.: Dare: a reports dataset for global misbehavior authority evaluation in c-its. In: 91st Vehicular Technology Conference (VTC 2020-Spring), pp. 1–6. IEEE (2020)
van der Heijden, R.W., Lukaseder, T., Kargl, F.: VeReMi: a dataset for comparable evaluation of misbehavior detection in VANETs. In: Beyah, R., Chang, B., Li, Y., Zhu, S. (eds.) SecureComm 2018. LNICST, vol. 254, pp. 318–337. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-01701-9_18
Idhammad, M., Afdel, K., Belouch, M.: Semi-supervised machine learning approach for DDoS detection. Appl. Intell. 48(10), 3193–3208 (2018)
Kadam, N., Krovi, R.S.: Machine learning approach of hybrid KSVN algorithm to detect DDoS attack in VANET. Int. J. Adv. Comput. Sci. Appl. 12(7), 718–722 (2021)
Kamel, J., Ansari, M.R., Petit, J., Kaiser, A., Jemaa, I.B., Urien, P.: Simulation framework for misbehavior detection in vehicular networks. IEEE Trans. Veh. Technol. 69(6), 6631–6643 (2020)
Kamel, J., Wolf, M., van der Heijder, R.W., Kaiser, A., Urien, P., Kargl, F.: VeReMi extension: a dataset for comparable evaluation of misbehavior detection in VANETs. In: International Conference on Communications (ICC), pp. 1–6. IEEE (2020)
Kolandaisamy, R., Noor, R.M., Z’aba, M.R., Ahmedy, I., Kolandaisamy, I.: Adapted stream region for packet marking based on DDoS attack detection in vehicular ad hoc networks. J. Supercomput. 76(8), 5948–5970 (2020)
Krajzewicz, D., Erdmann, J., Behrisch, M., Bieker, L.: Recent development and applications of sumo-simulation of urban mobility. Int. J. Adv. Syst. Meas. 5(3 &4) (2012)
Liao, Y., Vemuri, V.R.: Use of k-nearest neighbor classifier for intrusion detection. Comput. Secur. 21(5), 439–448 (2002)
Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Comput. Commun. Rev. 34(2), 39–53 (2004)
Mukherjee, S., Sharma, N.: Intrusion detection using Naive Bayes classifier with feature reduction. Procedia Technol. 4, 119–128 (2012)
Poongodi, M., Hamdi, M., Sharma, A., Ma, M., Singh, P.K.: DDoS detection mechanism using trust-based evaluation system in VANET. Access 7, 183532–183544 (2019)
Pradhan, A.: Support vector machine-a survey. Int. J. Emerg. Technol. Adv. Eng. 2(8), 82–85 (2012)
Safavian, S.R., Landgrebe, D.: A survey of decision tree classifier methodology. IEEE Trans. Syst. Man Cybern. 21(3), 660–674 (1991)
Sarle, W.S.: Neural networks and statistical models. In: 19th Annual SAS Users Group International Conference, pp. 1–13. SAS (1994)
Sommer, C., German, R., Dressler, F.: Bidirectionally coupled network and road traffic simulation for improved IVC analysis. IEEE Trans. Mob. Comput. (TMC) 10(1), 3–15 (2010)
Varga, A.: Discrete event simulation system. In: European Simulation Multiconference (ESM 2001), pp. 1–7. EUROSIS (2001)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Zhong, H., Yang, F., Wei, L., Zhang, J., Gu, C., Cui, J. (2022). Dataset for Evaluation of DDoS Attacks Detection in Vehicular Ad-Hoc Networks. In: Wang, L., Segal, M., Chen, J., Qiu, T. (eds) Wireless Algorithms, Systems, and Applications. WASA 2022. Lecture Notes in Computer Science, vol 13473. Springer, Cham. https://doi.org/10.1007/978-3-031-19211-1_21
Download citation
DOI: https://doi.org/10.1007/978-3-031-19211-1_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-19210-4
Online ISBN: 978-3-031-19211-1
eBook Packages: Computer ScienceComputer Science (R0)