Skip to main content

A Hybrid Few-Shot Learning Based Intrusion Detection Method for Internet of Vehicles

  • Conference paper
  • First Online:
Algorithms and Architectures for Parallel Processing (ICA3PP 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14488))

  • 129 Accesses

Abstract

With the rapid development of vehicle networks technologies, cyber security threats in the Internet have gradually penetrated into the Internet of vehicles. In view of the risks and challenges, this paper proposed a hybrid Meta-Learning based intrusion detection method, which core task is to distinguish normal and network flow samples as its learning task. By constructing a feature extraction network based on 3D-CNN, the characteristic values of network flow classification are learned, and then the constructed feature comparison network is used for learning and discrimination. It should be emphasized that the model can obtain enough prior knowledge to realize lightweight intrusion detection by constructing few-shot sample task training. In the experimental section, we first selected Car-Hacking dataset to evaluate the performance of the proposed method and analyze the accuracy, detection rate, precision, false positive rate and F-Score, etc., and extended the testing to the ICSX2012 dataset. The experimental results show that, the method proposed can effectively implement network intrusion detection in few-shot sample scenarios, and has the expansibility in cyber security applications.

This work is financially supported by the National Natural Science Foundation of China under Grant 62106060.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alshammari, A., Zohdy, M.A., Debnath, D., Corser, G.: Classification approach for intrusion detection in vehicle systems. Wirel. Eng. Technol. 9(4), 79–94 (2018)

    Article  Google Scholar 

  2. Chatzidakis, M., Hadjiefthymiades, S.: A trust change detection mechanism in mobile ad-hoc networks. Comput. Commun. 187, 155–163 (2022)

    Article  Google Scholar 

  3. Chen, X.: A simple utility to classify packets into flows (2017)

    Google Scholar 

  4. Cui, J., Ma, L., Wang, R., Liu, M.: Research and optimization of GPSR routing protocol for vehicular ad-hoc network. China Commun. 19(10), 194–206 (2022)

    Article  Google Scholar 

  5. Ghanem, W.A.H., et al.: Cyber intrusion detection system based on a multiobjective binary bat algorithm for feature selection and enhanced bat algorithm for parameter optimization in neural networks. IEEE Access 10, 76318–76339 (2022)

    Article  Google Scholar 

  6. Hossain, M.D., Inoue, H., Ochiai, H., Fall, D., Kadobayashi, Y.: An effective in-vehicle can bus intrusion detection system using cnn deep learning approach. In: GLOBECOM 2020–2020 IEEE Global Communications Conference, pp. 1–6. IEEE (2020)

    Google Scholar 

  7. Ji, S., Xu, W., Yang, M., Yu, K.: 3d convolutional neural networks for human action recognition. IEEE Trans. Pattern Anal. Mach. Intell. 35(1), 221–231 (2012)

    Article  Google Scholar 

  8. Kaur, G., Kakkar, D.: Hybrid optimization enabled trust-based secure routing with deep learning-based attack detection in vanet. Ad Hoc Netw. 136, 102961 (2022)

    Article  Google Scholar 

  9. Khan, I.A., Moustafa, N., Pi, D., Haider, W., Li, B., Jolfaei, A.: An enhanced multi-stage deep learning framework for detecting malicious activities from autonomous vehicles. IEEE Trans. Intell. Transp. Syst. 23(12), 25469–25478 (2021)

    Article  Google Scholar 

  10. Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)

  11. Ma, W., Zhang, Y., Guo, J., Yu, Q.: Few-shot abnormal network traffic detection based on multi-scale deep-capsnet and adversarial reconstruction. Int. J. Comput. Intell. Syst. 14(1), 195 (2021)

    Article  Google Scholar 

  12. Mabrouk, A., Naja, A.: Intrusion detection game for ubiquitous security in vehicular networks: a signaling game based approach. Comput. Netw. 109649 (2023)

    Google Scholar 

  13. Mchergui, A., Moulahi, T., Zeadally, S.: Survey on artificial intelligence (AI) techniques for vehicular ad-hoc networks (vanets). Veh. Commun. 34, 100403 (2022)

    Google Scholar 

  14. Naqvi, I., Chaudhary, A., Rana, A.: Intrusion detection in vanets. In: 2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO), pp. 1–5. IEEE (2021)

    Google Scholar 

  15. Pektaş, A., Acarman, T.: A deep learning method to detect network intrusion through flow-based features. Int. J. Netw. Manag. 29(3), e2050 (2019)

    Article  Google Scholar 

  16. Seo, E., Song, H.M., Kim, H.K.: Gids: gan based intrusion detection system for in-vehicle network. In: 2018 16th Annual Conference on Privacy, Security and Trust (PST), pp. 1–6. IEEE (2018)

    Google Scholar 

  17. Shams, E.A., Rizaner, A., Ulusoy, A.H.: Flow-based intrusion detection system in vehicular ad hoc network using context-aware feature extraction. Veh. Commun. 100585 (2023)

    Google Scholar 

  18. Shiravi, A., Shiravi, H., Tavallaee, M., Ghorbani, A.A.: Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 31(3), 357–374 (2012)

    Article  Google Scholar 

  19. Song, H.M., Woo, J., Kim, H.K.: In-vehicle network intrusion detection using deep convolutional neural network. Veh. Commun. 21, 100198 (2020)

    Google Scholar 

  20. Suthishni, D.N.P., Kumar, K.S.: A review on machine learning based security approaches in intrusion detection system. In: 2022 9th International Conference on Computing for Sustainable Global Development (INDIACom), pp. 341–348. IEEE (2022)

    Google Scholar 

  21. Wang, W., et al.: Hast-ids: learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection. IEEE Access 6, 1792–1806 (2017)

    Article  Google Scholar 

  22. Xu, C., Shen, J., Du, X.: A method of few-shot network intrusion detection based on meta-learning framework. IEEE Trans. Inf. Forensics Secur. 15, 3540–3552 (2020)

    Article  Google Scholar 

  23. Yang, J., Li, H., Shao, S., Zou, F., Wu, Y.: FS-IDS: a framework for intrusion detection based on few-shot learning. Comput. Secur. 122, 102899 (2022)

    Article  Google Scholar 

  24. Yang, L., Moubayed, A., Shami, A.: MTH-IDS: a multitiered hybrid intrusion detection system for internet of vehicles. IEEE Internet Things J. 9(1), 616–632 (2021)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ming Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhao, Y., Cui, J., Liu, M. (2024). A Hybrid Few-Shot Learning Based Intrusion Detection Method for Internet of Vehicles. In: Tari, Z., Li, K., Wu, H. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2023. Lecture Notes in Computer Science, vol 14488. Springer, Singapore. https://doi.org/10.1007/978-981-97-0801-7_12

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-0801-7_12

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-0800-0

  • Online ISBN: 978-981-97-0801-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics