Skip to main content
Log in

A hybrid machine learning model for intrusion detection in VANET

  • Special Issue Article
  • Published:
Computing Aims and scope Submit manuscript

Abstract

While Vehicular Ad-hoc Network (VANET) is developed to enable effective vehicle communication and traffic information exchange, VANET is also vulnerable to different security attacks, such as DOS attacks. The usage of an intrusion detection system (IDS) is one possible solution for preventing attacks in VANET. However, dealing with a large amount of vehicular data that keep growing in the urban environment is still an critical challenge for IDSs. This paper, therefore, proposes a new machine learning model to improve the performance of IDSs by using Random Forest and a posterior detection based on coresets to improve the detection accuracy and increase detection efficiency. The experimental results show that the proposed machine learning model can significantly enhance the detection accuracy compared to classical application of machine learning models.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Notes

  1. https://newsroom.intel.com/editorials/krzanich-the-future-of-automated-driving/#gs.iwfv6a

References

  1. Cheng Nan et al (2018) Big data driven vehicular networks. IEEE Netw 99:1–8

    Google Scholar 

  2. Zhou H et al (2020) Evolutionary V2X technologies toward the Internet of vehicles: Challenges and opportunities. Proceedings of the IEEE 108(2):308–323

  3. Cioroaica E, Kuhn T, Buhnova B (2019) (Do not) trust in ecosystems. In: 2019 IEEE/ACM 41st International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER). IEEE. 2019, pp. 9–12

  4. Awais Javed Muhammad, Zeadally Sherali, Hamida Elyes Ben (2019) Data analytics for cooperative intelligent transport systems. Vehicular Commun 15:63–72

    Google Scholar 

  5. Senouci O, Harous S, Aliouat Z (2020) Survey on vehicular ad hoc networks clustering algorithms: Overview, taxonomy, challenges, and open research issues. Int J Commun Syst 33(11):e4402

  6. Afzal Z, Kumar M (2020) Security of vehicular Ad-Hoc networks (VANET): a survey. In: Journal of Physics: Conference Series. Vol. 1427. 1. IOP Publishing

  7. Sheikh MS, Liang J, Wang W (2020) Security and privacy in vehicular Ad Hoc network and vehicle cloud computing: a survey. Wireless Commun Mobile Comput 2020:5129620

    Google Scholar 

  8. Kumar AT (2021) Modeling of VANET for future generation transportation system through Edge/Fog/Cloud computing powered by 6G. In: Cloud and IoT based vehicular Ad-Hoc networks (2021), p 105

  9. Tang F et al (2019) Future intelligent and secure vehicular network toward 6G: Machine-learning approaches. Proceedings of the IEEE 108(2):292–307

  10. Bangui H et al (2018) Moving to the edge-cloud-of-things: recent advances and future research directions. Electronics 7(11):309

    Google Scholar 

  11. Ahmad T, Anwar MA, Haque M (2020) Machine learning techniques for intrusion detection. In: Handbook of research on intrusion detection systems. IGI Global, pp 47–65

  12. Agarwal Y, Jain K, Karabasoglu O (2018) Smart vehicle monitoring and assistance using cloud computing in vehicular Ad Hoc networks. Int J Transport Sci Technol 7(1):60–73

    Google Scholar 

  13. Shrestha Rakesh, Bajracharya Rojeena, Nam Seung Yeob (2018) Challenges of future VANET and cloud-based approaches. In: Wireless Communications and Mobile Computing

  14. Sharma Sachin, Mohan Seshadri (2020) Cloud-Based Secured VANET with Advanced Resource Management and IoV Applications. In: Connected Vehicles in the Internet of Things. Springer, 2020, pp. 309–325

  15. Wang W, Wu L, Qu W, Liu Z, Wang H (2021) Privacy-preserving cloud-fog–based traceable road condition monitoring in VANET. Int J Netw Manag 31(2):e2096

    Google Scholar 

  16. Zimmerova B et al (2008) Component-interaction automata approach (CoIn). The common component modeling example. Springer, New york, pp 146–176

    Google Scholar 

  17. Zhou Sheng et al (2019) Exploiting moving intelligence: delay-optimized computation offoading in vehicular fog networks. IEEE Commun Mag 57(5):49–55

    Google Scholar 

  18. Lovén L et al (2019) EdgeAI: a vision for distributed, edgenative artificial intelligence in future 6G networks. In: The 1st 6G Wireless Summit (2019), pp 1–2

  19. Hasrouny Hamssa et al (2017) VANet security challenges and solutions: a survey. Vehicular Commun 7:7–20

    Google Scholar 

  20. Khan Khalid et al (2020) A survey on intrusion detection and prevention in wireless ad-hoc networks. J Syst Archit 105:101701

    Google Scholar 

  21. Pitropakis Nikolaos et al (2019) A taxonomy and survey of attacks against machine learning. Computer Sci Rev 34:100199

    MathSciNet  Google Scholar 

  22. Singh T, Kumar N (2020) WITHDRAWN: Machine learning models for intrusion detection in IoT environment: a comprehensive review. In: Computer Communications, Elsevier. https://doi.org/10.1016/j.comcom.2020.02.001

  23. Loukas George et al (2019) A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad Hoc Netw 84:124–147

    Google Scholar 

  24. Ferrag Mohamed Amine et al (2020) Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. J Information Secur Appl 50:102419

    Google Scholar 

  25. Ge M, Bangui H, Buhnova B (2018) Big data for internet of things: a survey. Future Gener Computer Syst 87:601–614

    Google Scholar 

  26. Bangui H, Ge M, Buhnova B (2018) Exploring big data clustering algorithms for internet of things applications. In: IoTBDS, pp 269–276

  27. Dehkordi Soroush Abbasian et al (2020) A survey on data aggregation techniques in IoT sensor networks. Wireless Netw 26(2):1243–1263

    Google Scholar 

  28. Chonka Ashley et al (2011) Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks. J Netw Computer Appl 34(4):1097–1107

    Google Scholar 

  29. Cordero Claudio Valencia, Lisser Abdel (2015) Jamming attacks reliable prevention in a clustered wireless sensor network. Wireless Personal Commun 85(3):925–936

    Google Scholar 

  30. Osanaiye O, Alfa A, Hancke G (2018) A statistical approach to detect jamming attacks in wireless sensor networks. Sensors 18(6):1691

    Google Scholar 

  31. Sharma S, Kaul A (2018) A survey on intrusion detection systems and honeypot based proactive security mechanisms in VANETs and VANET Cloud. Vehicular Commun 12:138–164

    Google Scholar 

  32. Bangui Hind et al (2017) Multi-criteria decision analysis methods in the mobile cloud offoading paradigm. J Sensor Actuator Netw 6(4):25

    Google Scholar 

  33. Belenko V, Krundyshev V, Kalinin M (2018) Synthetic datasets generation for intrusion detection in VANET. In: Proceedings of the 11th international conference on security of information and networks. pp 1–6

  34. Puñal O et al (2014) Machine learning-based jamming detection for IEEE 802.11: design and experimental evaluation. In: Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014. IEEE pp 1–10

  35. Grover J, Laxmi V, Gaur MS (2011) Misbehavior detection based on ensemble learning in vanet. In: International Conference on Advanced Computing, Networking and Security. Springer, pp 602–611

  36. Bangui H, Ge M, Buhnova B, Hong Trang L (2021) Towards faster big data analytics for anti-jamming applications in vehicular ad-hoc network. Trans Emerg Telecommun Technol. https://doi.org/10.1002/ett.4280

    Article  Google Scholar 

  37. Punal Oscar et al (2014) Experimental characterization and modeling of RF jamming attacks on VANETs. IEEE Transactions Vehicular Technol 64(2):524–540

    Google Scholar 

  38. Kim M et al (2017) Collaborative security attack detection in softwarede fined vehicular networks. In: 2017 19th Asia-Pacific Network Operations and Management Symposium (APNOMS) IEEE pp 19-24

  39. Boukhamla A, Gaviro JC (2018) Cicids2017 dataset: performance improvements and validation as a robust intrusion detection system testbed. Int J Inf Comput Secur 9

  40. Zeng Y et al (2019) DeepVCM: a deep learning based intrusion detection method in VANET. In: 2019 IEEE 5th Intl Conference on big data security on cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing,(HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS) IEEE pp 288–293

  41. Shams Erfan A, Rizaner Ahmet, Ulusoy Ali Hakan (2018) Trust aware support vector machine intrusion detection and prevention system in vehicular ad hoc networks. Computers Secur 78:245–254

    Google Scholar 

  42. Kumar N, Chilamkurti N (2014) Collaborative trust aware intelligent intrusion detection in VANETs. Computers Electrical Eng 40(6):1981–1996

    Google Scholar 

  43. Mehdi MM, Raza I, Hussain SA (2017) A game theory based trust model for vehicular Ad hoc networks (VANETs). Computer Netw 121:152–172

    Google Scholar 

  44. Liang J et al (2019) A filter model for intrusion detection system in vehicle Ad Hoc networks: a hidden Markov methodology. Knowl-Based Syst 163:611–623

    Google Scholar 

  45. Almi’cani M et al (2018) Intelligent intrusion detection system using clustered self organized map. In: 2018 Fifth International Conference on Software Defined Systems (SDS) IEEE 2018, pp 138–144

  46. Liang Junwei et al (2019) A novel intrusion detection system for vehicular Ad Hoc networks (VANETs) based on differences of traffic ow and position. Appl Soft Comput 75:712–727

    Google Scholar 

  47. Subba B, Biswas S, Karmakar S (2018) A game theory based multi layered intrusion detection framework for VANET. Future Gener Computer Syst 82:12–28

    Google Scholar 

  48. Ayoob AA, Gang S, Al G (2018) Hierarchical growing neural gas network (HGNG)-based semicooperative feature classifier for IDS in vehicular Ad Hoc network (VANET). J Sensor Actuator Netw 7(3):41

    Google Scholar 

  49. Zhang T, Zhu Q (2018) Distributed privacy-preserving collaborative intrusion detection systems for VANETs. IEEE Transactions Signal Information Process over Netw 4(1):148–161

    MathSciNet  Google Scholar 

  50. Nie L, Li YK, Kong Xiangjie (2018) Spatio-temporal network traffic estimation and anomaly detection based on convolutional neural network in vehicular ad-hoc networks. IEEE Access 6:40168–40176

    Google Scholar 

  51. Sharma S, Kaul A (2018) Hybrid fuzzy multi-criteria decision making based multi cluster head dolphin swarm optimized IDS for VANET. Vehicular Commun 12:23–38

    Google Scholar 

  52. Ali KM, Alheeti AG, McDonald-Maier K (2016) Intelligent intrusion detection of grey hole and rushing attacks in selfdriving vehicular networks. Computers 5(3):16

    Google Scholar 

  53. Sedjelmaci H, Senouci SM (2015) An accurate and efficient collaborative intrusion detection framework to secure vehicular networks. Computers Electrical Eng 43:33–47

    Google Scholar 

  54. Nazakat I, Khurshid K (2019) Intrusion detection system for in-vehicular communication. In: 2019 15th International Conference on Emerging Technologies (ICET) IEEE pp 1–6

  55. Zhou M, Han L, Lu H, Fu C (2020) Distributed collaborative intrusion detection system for vehicular Ad Hoc networks based on invariant. Comput Netw 172:107174

    Google Scholar 

  56. Omar Abdel Wahab CEAP et al (2016) SVM-based intelligent detection model for clustered vehicular ad hoc networks. Expert Syst Appl 50:40–54

    Google Scholar 

  57. Schmidt DA, Khan MS, Bennett BT (2020) Spline-based intrusion detection for VANET utilizing knot flow classification Internet Technol Lett e155

  58. Kosmanos D et al (2020) A novel intrusion detection system against spoofing attacks in connected electric vehicles. Array 5:100013

    Google Scholar 

  59. Mejri MN, Ben-Othman J (2014) Detecting greedy behavior by linear regression and watchdog in vehicular ad hoc networks In: 2014 IEEE Global Communications Conference IEEE pp 5032-5037

  60. Liu X et al (2014) Data mining intrusion detection in vehicular Ad Hoc network. IEICE TRANSACTIONS Information Syst 97(7):1719–1726

    Google Scholar 

  61. Ali KM, Alheeti AG, McDonald-Maier K (2017) Using discriminant analysis to detect intrusions in external communication for self-driving vehicles. Digital Commun Netw 3(3):180–187

    Google Scholar 

  62. Rupareliya J, Vithlani S, Gohel C (2016) Securing VANET by preventing attacker node using watchdog and Bayesian network theory. Procedia computer science 79:649–656

  63. Kaur J, Singh T, Lakhwani K(2019) An enhanced approach for attack detection in VANETs using adaptive neuro-fuzzy system. In: 2019 International Conference on Automation, Computational and Technology Management (ICACTM) IEEE 2019, pp 191–197

  64. Alheeti Khattab MA, McDonald-Maier K (2016) Hybrid intrusion detection in connected self-driving vehicles. In: 2016 22nd International Conference on Automation and Computing (ICAC) IEEE pp 456–461

  65. Zeng Y et al (2018) Senior2local: a machine learning based intrusion detection method for vanets. In: International Conference on Smart Computing and Communication. Springer 2018, pp 417–426

  66. Sedjelmaci H, Senouci SM, Abu-Rgheff MA (2014) An efficient and lightweight intrusion detection mechanism for serviceoriented vehicular networks. IEEE Internet Things J 1(6):570–577

    Google Scholar 

  67. Kumar N et al (2015) An intelligent clustering scheme for distributed intrusion detection in vehicular cloud computing. Cluster Comput 18(3):1263–1283

    Google Scholar 

  68. Kit GL et al (2017) SUMO enhancement for vehicular ad hoc network (VANET) simulation. In: 2017 IEEE 2nd International Conference on Automatic Control and Intelligent Systems (I2CACIS) IEEE 2017, pp 86–91

  69. Prasad M, Tripathi S, Dahal K (2020) An efficient feature selection based Bayesian and rough set approach for intrusion detection. Appl Soft Comput 87:105980

    Google Scholar 

  70. Ahmad MW, Mourshed M, Rezgui Y (2017) Trees vs Neurons: comparison between random forest and ANN for high-resolution prediction of building energy consumption. Energy Build 147:77–89

    Google Scholar 

  71. Hasan MAM, Nasser M, Pal B, Ahmad S (2014) Support vector machine and random forest modeling for intrusion detection system (IDS). J Intell Learn Syst Appl 2014

  72. Min E, Long J, Liu Q, Cui J, Chen W (2018) TR-IDS: anomaly-based intrusion detection through text-convolutional neural network and random forest. Secur Commun Netw 2018

  73. Hasan MAM et al (2016) Feature selection for intrusion detection using random forest. J Information Secur 7(3):129–140

    Google Scholar 

  74. Resende PAA, Drummond AC (2018) A survey of random forest based methods for intrusion detection systems. ACM Comput Surv (CSUR) 51(3):1–36

    Google Scholar 

  75. Lan Ting et al (2020) A comparative study of decision tree, random forest, and convolutional neural network for spread-F identification. Adv Space Res 65(8):2052–2061

    Google Scholar 

  76. Sothe C et al (2020) Comparative performance of convolutional neural network, weighted and conventional support vector machine and random forest for classifying tree species using hyperspectral and photogrammetric data. GI Sci Remote Sens 57(3):369–394

    Google Scholar 

  77. Waskle S, Parashar L, Singh U (2020) Intrusion detection system using PCA with random forest approach. In: 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC) IEEE 2020, pp 803–808

  78. Feldman D, Schmidt M, Sohler C (2020) Turning big data into tiny data: constant-size coresets for k-means, PCA, and projective clustering. SIAM J Comput 49(3):601–657

    MathSciNet  MATH  Google Scholar 

  79. Banikhalaf M, Moaiad Ahmad K (2020) A simple and robust clustering scheme for large-scale and dynamic VANETs. IEEE Access 8:103565–103575

    Google Scholar 

  80. Qi W, Li Q, Song Q, Guo L, Jamalipour A (2021) Extensive edge intelligence for future vehicular networks in 6G. In: IEEE Wireless Commun, IEEE

  81. Lv Z et al (2021) Big data analytics for 6G-enabled massive internet of things. IEEE Internet Things J 8(7):5350–5359

    Google Scholar 

  82. Darwish TSJ, Bakar KA (2018) Fog based intelligent transportation big data analytics in the internet of vehicles environment: motivations, architecture, challenges, and critical issues. IEEE Access 6:15679–15701

    Google Scholar 

  83. Breiman L (2001) Random forests. Mach learn 45(1):5–32

    MATH  Google Scholar 

  84. Sathyadevan S, Nair RR (2015) Comparative analysis of decision tree algorithms: ID3, C4. 5 and random forest. In: Computational intelligence in data mining-volume 1. Springer, pp. 549–562

  85. Savaresi SM, Boley DL (2004) A comparative analysis on the bisecting K-means and the PDDP clustering algorithms. Intell Data Anal 8(4):345–362

    Google Scholar 

  86. Amorim RCD, Mirkin B (2012) Minkowski metric, feature weighting and anomalous cluster initializing in K-Means clustering. Pattern Recognition 45(3):1061–1075

    Google Scholar 

  87. Agarwal PK, Har-Peled S, Varadarajan KR (2005) Geometric approximation via coresets. Comb Comput Geom 52(1–30):3

    MathSciNet  MATH  Google Scholar 

  88. Feldman D (2020) Core-sets: updated survey. Sampling techniques for supervised or unsupervised tasks. Springer, New York, pp 23–44

    Google Scholar 

  89. Lucic M, Bachem O, Krause A (2016) Strong coresets for hard and soft Bregman clustering with applications to exponential family mixtures. Artific Intell Stat 2016:1–9

    Google Scholar 

  90. Yang S, Guo J, Jin J (2018) An improved Id3 algorithm for medical data classification. Comput Electr Eng 65:474–487

    Google Scholar 

  91. Feldman D, Langberg M (2011) A unified framework for approximating and clustering data. In: Proceedings of the forty-third annual ACM symposium on Theory of computing. 2011, pp 569–578

  92. Feldman D, Faulkner M, Krause A (2011) Scalable training of mixture models via coresets. Adv Neural Information Process Syst 2011:2142–2150

    Google Scholar 

  93. Trang LH et al (2019) Scaling big data applications in smart city with coresets. In: Proceedings of the 8th International Conference on Data Science, Technology and Applications. DATA 2019. Prague, Czech Republic

  94. Rahal R, Korba AA, Ghoualmi-Zine N (2020) Towards the development of realistic DoS dataset for intelligent transportation systems. Wireless Personal Commun 115(2):1415–1444

    Google Scholar 

  95. Pathre A, Agrawal C, Jain A (2013) A novel defense scheme against DDOS attack in VANET. In: 2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN) IEEE 2013, pp 1–5

  96. Géron A (2019) Hands-on machine learning with Scikit-Learn, Keras. and TensorFlow: Concepts, tools, and techniques to build intelligent systems. O’Reilly Media

  97. Zennaro FM (2019) Analyzing and storing network intrusion detection data using Bayesian coresets: a preliminary study in offine and streaming settings. In: arXiv preprint arXiv:1906.08528

Download references

Acknowledgements

The work was supported from ERDF/ESF “CyberSecurity, CyberCrime and Critical Information Infrastructures Center of Excellence” (No. CZ.02.1.01/0.0/0.0/16_019/0000822).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hind Bangui.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bangui, H., Ge, M. & Buhnova, B. A hybrid machine learning model for intrusion detection in VANET. Computing 104, 503–531 (2022). https://doi.org/10.1007/s00607-021-01001-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00607-021-01001-0

Keywords

Mathematics Subject Classification

Navigation