Skip to main content

GTBNN: game-theoretic and bayesian neural networks to tackle security attacks in intelligent transportation systems

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

The extensive implementation of cloud computing has brought about a significant transformation in multiple industries, encompassing major corporations, individual consumers, and nascent technological advancements. Cloud computing services have been widely adopted by Intelligent Transportation Systems (ITS) in order to optimize communication, data storage, and processing capabilities. ITS infrastructure is very vulnerable to security concerns due to its sensitive nature, hence requiring the implementation of efficient Intrusion Detection Systems (IDS) to identify potential threats. This study presents a new method to improve the accuracy of IDS in identifying attacks in the ITS Cloud environment by using game theoretic and bayesian optimized bayesian neural network (GTBNN). The Game-theoretic Model effectively tackles the issue of non-cooperative behavior between attackers and defenders. This model is combined with a Bayesian Optimized Bayesian Neural Network (BNN) to achieve efficient optimization and testing. The performance of our framework is evaluated on three benchmark datasets, namely UNSW-NB15, CICIDS, and Bot-IoT. The experimental findings demonstrate significant enhancements in detection rates across all datasets, exhibiting respective increases of 9.66%, 3.75%, and 4.16% and significant decreases in False Positive Rates (FPR) of 0.01%, 0.026%, and 0.138% for the respective datasets. The presented approach utilizes game-theoretic ideas and Bayesian optimization techniques to provide a distinctive and influential solution for improving the accuracy and efficiency of IDS in protecting vital ITS infrastructure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Algorithm 1
Algorithm 2
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Availability of Data and Materials

The datasets generated and analyzed during the current study are publicly available at:

https://research.unsw.edu.au/projects/unsw-nb15-dataset

https://www.kaggle.com/datasets/cicdataset/cicids2017

https://research.unsw.edu.au/projects/bot-iot-dataset

References

  1. Alqahtani, H., Kumar, G.: Machine learning for enhancing transportation security: A comprehensive analysis of electric and flying vehicle systems. Eng. Appl. Artif. Intell. 129, 107667 (2024)

    Article  Google Scholar 

  2. Gupta, R., Saxena, D., Gupta, I., Makkar, A., Singh, A.K.: Quantum machine learning driven malicious user prediction for cloud network communications. IEEE Networking Letters 4(4), 174–178 (2022)

    Article  Google Scholar 

  3. Malik, Rayeesa, Singh, Yashwant, Sheikh, Zakir Ahmad, Anand, Pooja, Singh, Pradeep Kumar, Workneh, Tewabe Chekole: An improved deep belief network ids on iot-based network for traffic systems. Journal of Advanced Transportation, 2022 (2022)

  4. Abdulganiyu, O.H., Tchakoucht, T.A., Saheed, Y.K.: A systematic literature review for network intrusion detection system (ids). Int. J. Inf. Secur. 22(5), 1125–1162 (2023)

    Article  Google Scholar 

  5. Azam, Zahedi, Islam, Md Motaharul, Huda, Mohammad Nurul: Comparative analysis of intrusion detection systems and machine learning based model analysis through decision tree. IEEE Access (2023)

  6. Gupta, R., Singh, A.K.: A differential approach for data and classification service-based privacy-preserving machine learning model in cloud environment. N. Gener. Comput. 40(3), 737–764 (2022)

    Article  Google Scholar 

  7. Singh, A.K., Gupta, R.: A privacy-preserving model based on differential approach for sensitive data in cloud environment. Multimedia Tools and Applications 81(23), 33127–33150 (2022)

    Article  Google Scholar 

  8. Moustafa, Nour, Slay, Jill: Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 military communications and information systems conference (MilCIS), pages 1–6. IEEE (2015)

  9. Vamsi Krishna, K., Swathi, K., Rama Koteswara Rao, P., Basaveswara Rao, B.: A detailed analysis of the cidds-001 and cicids-2017 datasets. In: Pervasive Computing and Social Networking, pages 619–638. Springer (2022)

  10. Koroniotis, N., Moustafa, N., Sitnikova, E.: A new network forensic framework based on deep learning for internet of things networks: A particle deep framework. Futur. Gener. Comput. Syst. 110, 91–106 (2020)

    Article  Google Scholar 

  11. Gupta, Rishabh, Gupta, Ishu, Singh, Ashutosh Kumar, Saxena, Deepika, Lee, Chung-Nan: An iot-centric data protection method for preserving security and privacy in cloud. IEEE Systems Journal (2022)

  12. Halabi, Talal, Wahab, Omar Abdel, Zulkernine, Mohammad: A game-theoretic approach for distributed attack mitigation in intelligent transportation systems. In: NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium, pages 1–6. IEEE (2020)

  13. Panda, S., Rass, S., Moschoyiannis, S., Liang, K., Loukas, G., Panaousis, E.: Honeycar: a framework to configure honeypot vulnerabilities on the internet of vehicles. IEEE Access 10, 104671–104685 (2022)

    Article  Google Scholar 

  14. Sfar, A.R., Challal, Y., Moyal, P., Natalizio, E.: A game theoretic approach for privacy preserving model in iot-based transportation. IEEE Trans. Intell. Transp. Syst. 20(12), 4405–4414 (2019)

    Article  Google Scholar 

  15. Laszka, A., Abbas, W., Vorobeychik, Y., Koutsoukos, X.: Detection and mitigation of attacks on transportation networks as a multi-stage security game. Computers & Security 87, 101576 (2019)

    Article  Google Scholar 

  16. Oseni, Ayodeji, Moustafa, Nour, Creech, Gideon, Sohrabi, Nasrin, Strelzoff, Andrew, Tari, Zahir, Linkov, Igor: An explainable deep learning framework for resilient intrusion detection in iot-enabled transportation networks. IEEE Transactions on Intelligent Transportation Systems (2022)

  17. Gupta, Brij Bhooshan, Gaurav, Akshat, Marín, Enrique Caño, Alhalabi, Wadee: Novel graph-based machine learning technique to secure smart vehicles in intelligent transportation systems. IEEE transactions on intelligent transportation systems (2022)

  18. Khan, I.A., Moustafa, N., Pi, D., Hussain, Y., Khan, N.A.: Dff-sc4n: A deep federated defence framework for protecting supply chain 4.0 networks. IEEE Trans. Industr. Inf. 19(3), 3300–3309 (2021)

    Article  Google Scholar 

  19. Almutlaq, Samah, Derhab, Abdelouahid, Hassan, Mohammad Mehedi, Kaur, Kuljeet: Two-stage intrusion detection system in intelligent transportation systems using rule extraction methods from deep neural networks. IEEE Transactions on Intelligent Transportation Systems (2022)

  20. Otoum, Safa, Guizani, Nadra, Mouftah, Hussein: On the feasibility of split learning, transfer learning and federated learning for preserving security in its systems. IEEE Transactions on Intelligent Transportation Systems (2022)

  21. Khan, I.A., Moustafa, N., Pi, D., Haider, W., Li, B., Jolfaei, A.: An enhanced multi-stage deep learning framework for detecting malicious activities from autonomous vehicles. IEEE Trans. Intell. Transp. Syst. 23(12), 25469–25478 (2021)

    Article  Google Scholar 

  22. Gill, K.S., Saxena, S., Sharma, A.: Gtm-csec: game theoretic model for cloud security based on ids and honeypot. Computers & Security 92, 101732 (2020)

    Article  Google Scholar 

  23. Masum, Mohammad, Shahriar, Hossain, Haddad, Hisham, Faruk, Md Jobair Hossain, Valero, Maria, Khan, Md Abdullah, Rahman, Mohammad A., Adnan, Muhaiminul I., Cuzzocrea, Alfredo, Wu, Fan: Bayesian hyperparameter optimization for deep neural network-based network intrusion detection. In: 2021 IEEE International Conference on Big Data (Big Data), pages 5413–5419. IEEE (2021)

  24. Kunang, Yesi Novaria, Nurmaini, Siti, Stiawan, Deris, Suprapto, Bhakti Yudho: Improving classification attacks in iot intrusion detection system using bayesian hyperparameter optimization. In: 2020 3rd International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), pages 146–151. IEEE (2020)

  25. Chen, Wenjian, Wang, Haikuan, Fei, Minrui, Du, Dajun, Rakić, Aleksandar: An intrusion detection method using adasyn and bayesian optimized lightgbm. In: 2022 34th Chinese Control and Decision Conference (CCDC), pages 4622–4627. IEEE (2022)

  26. Nayak, J., Naik, B., Dash, P.B., Vimal, S., Kadry, S.: Hybrid bayesian optimization hypertuned catboost approach for malicious access and anomaly detection in iot nomalyframework. Sustainable Computing: Informatics and Systems 36, 100805 (2022)

    Google Scholar 

  27. Owen, G.: Game Theory. Emerald Group Publishing, Bingley (2013)

    Google Scholar 

  28. Moustafa, N., Slay, J., Creech, G.: Novel geometric area analysis technique for anomaly detection using trapezoidal area estimation on large-scale networks. IEEE Transactions on Big Data 5(4), 481–494 (2017)

    Article  Google Scholar 

  29. Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1, 108–116 (2018)

    Google Scholar 

  30. Koroniotis, N., Moustafa, N., Sitnikova, E., Turnbull, B.: Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset. Futur. Gener. Comput. Syst. 100, 779–796 (2019)

    Article  Google Scholar 

  31. Singh, A., Dhillon, A., Neeraj Kumar, M., Hossain, S., Muhammad, G., Kumar, M.: ediapredict: An ensemble-based framework for diabetes prediction. ACM Transactions on Multimidia Computing Communications and Applications 17(2s), 1–26 (2021)

    Google Scholar 

  32. Magris, Martin, Iosifidis, Alexandros: Bayesian learning for neural networks: an algorithmic survey. Artificial Intelligence Review, pages 1–51 (2023)

  33. Belete, Daniel Mesafint, Huchaiah, Manjaiah D.: Grid search in hyperparameter optimization of machine learning models for prediction of hiv/aids test results. International Journal of Computers and Applications, pages 1–12 (2021)

  34. Panichella, A.: A systematic comparison of search-based approaches for lda hyperparameter tuning. Inf. Softw. Technol. 130, 106411 (2021)

    Article  Google Scholar 

  35. Liang, D., Gao, R., Suganthan, P.N., Wang, D.Z.W.: Bayesian optimization based dynamic ensemble for time series forecasting. Inf. Sci. 591, 155–175 (2022)

    Article  Google Scholar 

  36. Kumar, V., Sinha, D., Das, A.K., Pandey, S.C., Goswami, R.T.: An integrated rule based intrusion detection system: analysis on unsw-nb15 data set and the real time online dataset. Clust. Comput. 23(2), 1397–1418 (2020)

    Article  Google Scholar 

  37. Vinayakumar, R., Mamoun Alazab, K.P., Soman, P.P., Al-Nemrat, A., Venkatraman, S.: Deep learning approach for intelligent intrusion detection system. IEEE Access 7, 41525–41550 (2019)

    Article  Google Scholar 

  38. Lee, S., Abdullah, A., Jhanjhi, N., Kok, S.: Classification of botnet attacks in iot smart factory using honeypot combined with machine learning. PeerJ Computer Science 7, e350 (2021)

    Article  Google Scholar 

Download references

Funding

This research received no specific grant from any funding agency in the public, commercial, or not-for-profit sectors.

Author information

Authors and Affiliations

Authors

Contributions

Komal Singh Gill and Arwinder Dhillon performs the implementation and wrote the manuscript. Sharad Saxena and Anju Sharma reviewed the manuscript.

Corresponding author

Correspondence to Komal Singh Gill.

Ethics declarations

Conflict of interest

Authors declares that they have no Conflict of interest.

Ethical approval

This article does not contain any study on human participants or animals performed by any of the authors

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gill, K.S., Saxena, S., Sharma, A. et al. GTBNN: game-theoretic and bayesian neural networks to tackle security attacks in intelligent transportation systems. Cluster Comput 27, 11645–11665 (2024). https://doi.org/10.1007/s10586-024-04531-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-024-04531-2

Keywords