You are currently viewing a new version of our website. To view the old version click .
Applied Sciences
  • Article
  • Open Access

Published: 25 June 2023

FSCB-IDS: Feature Selection and Minority Class Balancing for Attacks Detection in VANETs

,
,
,
,
,
and
1
Technology Higher School Essaouira, Cadi Ayyad University, Essaouira 40000, Morocco
2
STI Laboratory, IDMS Team, Faculty of Sciences and Techniques, Moulay Ismail University of Meknes, Errachidia 52000, Morocco
3
Smart Systems Engineering Lab, Department of Communications and Networks, College of Engineering, Prince Sultan University, Riyadh 11586, Saudi Arabia
*
Authors to whom correspondence should be addressed.
This article belongs to the Special Issue Data Security and Privacy in Mobile Cloud Computing

Abstract

Vehicular ad hoc networks (VANETs) are used for vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) communications. They are a special type of mobile ad hoc networks (MANETs) that can share useful information to improve road traffic and safety. In VANETs, vehicles are interconnected through a wireless medium, making the network susceptible to various attacks, such as Denial of Service (DoS), Distributed Denial of Service (DDoS), or even black hole attacks that exploit the wireless medium to disrupt the network. These attacks degrade the network performance of VANETs and prevent legitimate users from accessing resources. VANETs face unique challenges due to the fast mobility of vehicles and dynamic changes in network topology. The high-speed movement of vehicles results in frequent alterations in the network structure, posing difficulties in establishing and maintaining stable communication. Moreover, the dynamic nature of VANETs, with vehicles joining and leaving the network regularly, adds complexity to implementing effective security measures. These inherent constraints necessitate the development of robust and efficient solutions tailored to VANETs, ensuring secure and reliable communication in dynamic and rapidly evolving environments. Therefore, securing communication in VANETs is a crucial requirement. Traditional security countermeasures are not pertinent to autonomous vehicles. However, many machine learning (ML) technologies are being utilized to classify malicious packet information and a variety of solutions have been suggested to improve security in VANETs. In this paper, we propose an enhanced intrusion detection framework for VANETs that leverages mutual information to select the most relevant features for building an effective model and synthetic minority oversampling (SMOTE) to deal with the class imbalance problem. Random Forest (RF) is applied as our classifier, and the proposed method is compared with different ML techniques such as logistic regression (LR), K-Nearest Neighbor (KNN), decision tree (DT), and Support Vector Machine (SVM). The model is tested on three datasets, namely ToN-IoT, NSL-KDD, and CICIDS2017, addressing challenges such as missing values, unbalanced data, and categorical values. Our model demonstrated great performance in comparison to other models. It achieved high accuracy, precision, recall, and f1 score, with a 100% accuracy rate on the ToN-IoT dataset and 99.9% on both NSL-KDD and CICIDS2017 datasets. Furthermore, the ROC curve analysis demonstrated our model’s exceptional performance, achieving a 100% AUC score.

1. Introduction

VANET is a subclass of MANET that enables wireless communication among vehicles and infrastructure devices to improve traffic safety and efficiency [1,2]. VANET comprises two types of nodes: on-board units (OBUs) that are installed in vehicles; and roadside units (RSUs) that are deployed along the roads. The vehicular communication module (VCM) is responsible for routing the traffic data from other VANET nodes to the vehicle devices, facilitating effective vehicle monitoring and management [3].
Even though VANET has achieved significant improvements in its domain, the security challenge still remains the biggest challenge. This problem is a direct threat to the quality of human life and constitutes one of the major difficulties faced by VANETs. Various types of attacks may impact VANETs as the vehicles are linked over a wireless medium. There are many dangers, such as flooding, SQL injection, DoS, DDOS, Sybil, and Jamming attack [4,5], which injects undesired traffic to a network and blocks the legitimate users from accessing the resources. Furthermore, malicious software is a kind of code that takes control by exploiting vulnerabilities in the network system [6]. Consequently, the security of vehicles against intrusion became an important point, since traditional models of vehicles do not include this aspect of safety. Since VANETs provide different forms of communication, as V2V and V2I are linked to the Internet, they are vulnerable to different types of attacks, which not only degrade the quality of traffic but also threaten human lives. Consequently, the use of classical security mechanisms, such as encryption techniques or access control, are not relevant to modern vehicles. Reactive systems, in particular intrusion detection systems (IDSs), have been the subject of much attention these days, as they are able to detect any possibility of cyberattacks on VANETs in order to improve their usability.
The objective of the present work is to develop and implement an intrusion detection model for VANETs. To realize this model, we will use the RF classifier and several techniques to improve the quality of the dataset usage and to have better results. Mainly, the mutual information is used for the selection of the group of best features to build an efficient model, the Synthetic Minority Over-sampling Technique (SMOTE) which is an oversampling technique that helps to overcome the overfitting problem due to the random oversampling. This technique is used in our case to deal with the imbalance problem between the classes and the one-hot encoding technique to convert the categorical information into numerical data. We evaluated and compared the results obtained with the following ML techniques: DT, KNN, LR, and SVM. The model was evaluated and compared using three datasets—NSL-KDD, TON-IOT, and CICID2017—in order to validate the accuracy and the efficiency of our system. These results confirm the performance and accuracy of the proposed model.
The rest of the paper is structured as follows: Section 2 presents the background and related work of VANETs architecture, services, network security, and intrusion detection methods. It also covers the relevant literature related to intrusion detection based on machine learning, deep learning, and ensemble learning techniques. Section 3 details the design of the proposed model. A discussion of the results and evaluation study of the system is presented in Section 4. The conclusion and future work are presented in Section 5.

3. Proposed Methodology

This section enlightens the proposed work using RF classifier. We optimize the quality of the data using mutual information for feature selection to reduce the consummation of resources. To solve the problem of class imbalance, we apply the SMOTE technique. Then, we train the RF classifier by considering fifteen features to create the proposed intrusion detection system. The proposed model has three steps as shown in Figure 2: data preprocessing, feature selection, and classification.
Figure 2. The components detail of our approach.
This section may be divided by subheadings. It should provide a concise and precise description of the experimental results, their interpretation, as well as the experimental conclusions that can be drawn.

3.1. Data Preprocessing

The most important step in the ML method is the preparation of the data to obtain high performance. Initially, the data needs to be cleaned as it can have problems such as missing values, conversion of categorical data to numerical, and imbalance classes. Moreover, the unnecessary data must be removed, which can affect the performance and results of using the ML method. The datasets must be processed properly in order to create a useful analysis. In our case, our datasets contain many missing values, so we will replace them with the most common values. Additionally, we have to convert the categorical data of our datasets into numerical to better use our model. For this purpose, we used a one-shot encoding. And finally, to address the issue of imbalance class, we use the SMOTE technique [16] which improves random oversampling by the supply of synthetic samples of minority classes and fixes the overfitting issue which may result from simple random oversampling since SMOTE generates new data items in place of duplicating the existing data items.
Steps of oversampling method:
For every motif X in the minority class A:
Select one of its K nearest neighbors x^1 (also belong to the minority class).
Create a new motif S on a random point on the line segment linking the motif and the selected neighbor, as shown in Equation (5):
The following formula is utilized to generate a new example for each x i ) A   (i = 1, 2, 3… N):
S = x + rand   ( 0 ,   1 )   ×   ( x _   x i )

3.2. Feature Selection

The objective of feature selection is to eliminate unimportant and/or duplicate features so as to select the optimal set of features to build efficient models of the studied phenomena. The feature selection workflow consists of obtaining a score for each possible feature and selecting the better features. A feature’s frequency is calculated in the training process for each instance, both positive and negative individually, and a function of these two is calculated. It is important to verify features in intrusion detection to identify the most crucial ones that will help in eliminating unnecessary data. In this paper, we have used mutual information [43] filtering method that measures the decrease in variance among two variables, as presented in Equation (6).
I(X;Y) = H(X) − H(X|Y)
H(X): X’s entropy
H(X|Y): X’s conditional entropy given Y

3.3. Data Normalization and Classification

Normalization minimizes the complexity of models as it has a significant role in reducing the overweight features having higher values in comparison with ones having lower values. The normalization method used is Min-Max to scale the feature values between [0:1] as defined in Equation (7).
x n o r m   = x x m i n x m a x x m i n   [ 0 ,   1 ]
For the classification process, we will use the RF classifier, and we will compare the results with the following ML techniques: LR, KNN, DT, and SVM. We will perform the tests on the three datasets ToN-IoT, NSL-KDD, and CICIDS2017.

4. Results and Discussion

This section analyzes and compares the efficiency of our employed ML methods for VANET by comparing the results of the three datasets ToN-IoT, NSL-KDD, and CICIDS2017.

4.1. Environment Description

NSL-KDD is a newer version of the existing KDD’99 dataset. It is an efficient reference dataset that helps researchers in comparing various methods of intrusion detection. Every single set of records has different characteristics of the flux with a label indicating whether it is an attack or normal behavior. Because of the limited open data sets for the use of IDS based on networks, NSL-KDD is actually the most effective dataset that can be used to evaluate various intrusion detection approaches [44]. The CICIDS2017 dataset includes benign attacks and the latest current attacks, resembling real-world data (PCAP). In addition, it contains analysis results from network flow based on CICFlowMeter, having flows that are labeled by timestamp, the source and destination IPs, the protocols, and the attacks (CSV files) [45]. ToN-IoT holds a collection of different information sources taken from the whole IIoT system, as well as telemetry data, linux records, and also IoT system network traffic. The ToN-IoT network is accessible on ToN-IoT repository [46]. In addition, the datasets were displayed in CSV format with a column labeled that represents the attack or the normal behavior, indicating the types of attacks.
We run our tests on an Intel(R) Core(TM) i7-8650U CPU @ 1.90 GHz 2.11 GHz, and 16 GB in RAM, with Windows 10 × 64-bit. We implemented our model and feature engineering using Python v3.10.6.
  • TP: True positives define the amount of well identified intrusion.
  • FP: False positives represent the amount of badly classified intrusion.
  • TN: True negatives define the amount of correctly well normal occurrence.
  • FN: False negatives represent the amount of misclassified normal occurrence.
To evaluate our model we used the following metrics: accuracy, precision, recall, and f1-score, and the equations to calculate these metrics are respectively (8), (9), and (10). Those metrics are calculated based on the elements of the confusion matrix represented in the Table 2.
Accuracy :   TP + TN TP + TN + FP + FN
Precision :   TP TP + FP
Recall   ( True   Positive   Rate   TPR ) :   TP TP + FN
False   Positive   Rate   ( FPR ) :   FP FP + TN
F1-score :   2   ×   Precision   ×   Recall   Precision   +   Recall
Table 2. The confusion matrix.

4.2. Result Discussion

In this section, we first present the results for our three datasets NSl-KDD, ToN-IoT network, and CICIDS2017. A cross validation with 10 factors was used for all ML methods. In summary, all the applied techniques obtained significant results due to the different feature engineering methods that were employed on the datasets. First, we imputed missing values and converted categorical values, solving the imbalanced data problem with the SMOTE technique, and then applying the Min-Max normalization technique.

4.2.1. Using NSL-KDD Dataset

Figure 3 and Figure 4 present the outcomes of applying SMOTE on the NSL-KDD dataset to address the issue of imbalanced classes. Figure 3 displays the distribution percentages of each class prior to employing the SMOTE technique, illustrating the initial class imbalance. In contrast, Figure 4 showcases the outcomes after the implementation of SMOTE, revealing a noticeable resolution of the imbalanced classes. The results demonstrate a more balanced distribution among the classes, thereby indicating the effectiveness of the SMOTE technique in mitigating class imbalance.
Figure 3. The amount of information in the attack class before applying the over sampling technique (NSL-KDD dataset).
Figure 4. Attack class using SMOTE (NSL-KDD dataset).
The mutual information technique reveals the most influential features in the NSL-KDD dataset, which we use for dimensionality reduction by selecting the columns with the highest variance for improved prediction accuracy. Figure 5 displays the result of this technique, where we choose the top 15 features for our model.
Figure 5. Influential features of detection attack on NSL-KDD dataset.
We utilized mutual information as a feature selection method, resulting in the identification of 15 optimal features, as shown in Figure 5. To address the class imbalance issue in the dataset, as depicted in Figure 3, we applied the SMOTE technique, which significantly improved the distribution of the classes, as illustrated in Figure 4.
For the purpose of comparison, we employed the RF classifier alongside LR, DT, KNN, and SVM techniques. The experiments were conducted using the NSL-KDD dataset. Figure 6 displays the performance of our proposed model, exhibiting a satisfactory outcome with a minimal number of FPR and FNR.
Figure 6. Confusion matrix of prediction for NSL-KDD dataset.
To further assess the performance of the techniques, we examined the ROC curve, as shown in Figure 7 and Figure 8. Our analysis reveals that we achieved good results, particularly with a 99% accuracy for KNN. Moreover, Table 3 provides a comprehensive overview, indicating that our model exhibits high accuracy (0.99), recall (0.97), precision (0.97), and F1 score (0.97) in terms of intrusion detection, with DT and KNN methods following closely.
Figure 7. ROC curve of the applied techniques on the 15 best features (NSL-KDD Dataset).
Figure 8. ROC curve for all applied techniques on the 15 best features (NSL-KDD).
Table 3. Experimentation result on NSL-KDD dataset.

4.2.2. Using TON-IOT Dataset

TON-IOT dataset has also the problem of class imbalance which is shown in Figure 9. After using the SMOTE technique, this problem is solved as shown in Figure 10. The influence features present in our TON-IOT dataset are shown in Figure 11. We have selected the 15 best features to obtain better results.
Figure 9. Attack class before applying the over sampling technique by using TON-IOT dataset.
Figure 10. Attack class after applying the over sampling technique by using TON-IOT dataset.
Figure 11. Influential features of detection attack on TON-IOT dataset.
We first applied mutual information to select the 15 best features, as depicted in Figure 5. These features, including ts, src_ip, src_port, dst_ip, dst_port, service, duration, src_bytes, dst_bytes, conn_state, src_pkts, src_ip_bytes, and dst_pkts, were used in subsequent analyses.
Furthermore, Figure 9 and Figure 10 demonstrate the significant impact of employing the SMOTE technique to address class imbalance in the dataset. The improvement in class balance is evident, indicating the effectiveness of SMOTE in mitigating the issue.
For evaluating the performance of our RF classifier, we compared it with LR, DT, KNN, and SVM techniques using the TON-IOT dataset. To provide a more comprehensive analysis, we examined the confusion matrices in Figure 12. Notably, our model exhibited outstanding performance with 0 FPR and FNR.
Figure 12. Confusion matrix of prediction using TON-IOT dataset.
Additionally, Figure 13 and Figure 14 illustrates the ROC curve for all the applied techniques on the dataset. Our model achieved excellent results, attaining 100% AUC, which signifies its robustness in distinguishing between normal and intrusive instances.
Figure 13. ROC curve on the 15 best features using TON-IOT Dataset.
Figure 14. ROC curve of all techniques by considering 15 best features.
To provide a comprehensive assessment, we present the results in Table 4, which showcases the performance metrics of accuracy, recall, precision, and F1 score. Our model outperformed all other techniques, attaining 100% for each of these metrics. The second-best technique, decision tree (DT), also achieved 100% in all metrics.
Table 4. Experimentation result on TON-IOT dataset.
The SMOTE technique is also used on CICIDS2017 dataset to face the problem of class imbalance. Figure 15 and Figure 16 show the percentages before and after the use of SMOTE.
Figure 15. Attack class before applying the over sampling technique using CICIDS2017 dataset.
Figure 16. Attack class after applying the over sampling technique using CICIDS2017 dataset.
Figure 15 and Figure 16 display the partitions of the attack class before and after applying the SMOTE technique. As depicted in Figure 16, the problem of class imbalance is effectively resolved, and the partitions are more balanced.
Figure 17 showcases the influential features on our dataset, specifically the CICIDS2017 dataset. These features play a significant role in the performance of our model.
Figure 17. Influential features of detection attack on CICIDS2017 dataset.
Furthermore, the confusion matrices presented in Figure 18 demonstrate the correct implementation of our model, as indicated by the absence of FPR and FNR.
Figure 18. Confusion matrix of prediction for CICIDS2017 dataset.
In terms of performance evaluation, Table 5 presents the results obtained by the RF and SVM techniques. The RF technique yields satisfactory outcomes, with an accuracy, recall, precision, and F1 score of 0.999. On the other hand, the SVM technique exhibits lower performance, with an accuracy of 0.180, recall of 0.340, precision of 0.160, and F1 score of 0.340. The results obtained allow us to conclude that the proposed framework is relevant and achieves significant performance.
Table 5. Experimentation result using CICIDS2017 dataset.
For the TON-IOT dataset, the performance evaluation results indicate that our RF classifier achieves exceptional results. The model exhibits 0 FPR and FNR as shown in the confusion matrices (Figure 12). The ROC curve (Figure 14) demonstrates that our model achieves 100% AUC, indicating its strong discriminatory power. Moreover, the results presented in Table 4 indicate that our RF classifier achieves the highest intrusion detection performance, with 100% accuracy, recall, precision, and F1 score. Moving on to the NSL-KDD dataset, the performance comparison reveals that our RF classifier continues to excel. Figure 3 shows the class imbalance issue in the original dataset, which is effectively addressed by applying the SMOTE technique (Figure 4). The confusion matrices (Figure 6) demonstrate the satisfactory performance of our model, with a low number of FPR and FNR. The ROC curve (Figure 8) exhibits good results, particularly with 99% accuracy for the KNN technique. Table 3 presents the evaluation metrics, indicating that our RF classifier achieves high accuracy (0.99), recall (0.97), precision (0.97), and F1 score (0.97) for intrusion detection, surpassing the performance of other methods such as DT and KNN. Regarding the CICIDS2017 dataset, our RF classifier once again demonstrates superior performance. Figure 15 and Figure 16 illustrate the difference between the partitions of the attack class before and after applying the SMOTE technique, effectively resolving the class imbalance issue. The confusion matrices (Figure 18) highlight the correct implementation of our model, with 0 FPR and 0 FNR. In terms of evaluation metrics (Table 5), the RF technique achieves outstanding results, with 0.999 accuracy, recall, precision, and F1 score. In contrast, the SVM technique lags behind, with significantly lower values for these metrics. Overall, the comparison of results across the TON-IOT, NSL-KDD, and CICIDS2017 datasets consistently demonstrates the superiority of our model based on the RF classifier. It consistently achieves higher performance in terms of accuracy, recall, precision, and F1 score, outperforming other techniques such as SVM, DT, and KNN. These findings highlight the robustness and effectiveness of our proposed model in intrusion detection tasks across different datasets.

5. Conclusions

VANETs play a crucial role in ensuring the safety, security, and efficiency of transportation systems. However, the interconnected and dynamic nature of VANETs presents significant challenges and risks that require rigorous assessment and mitigation. In this study, we addressed the problem of intrusion detection in VANETs by proposing a model based on mutual information for feature selection and utilizing the SMOTE technique to handle class imbalance. Our experimental evaluations on multiple datasets demonstrated the effectiveness of the proposed model in enhancing the security of VANETs. The model achieved commendable performance in terms of accuracy, precision, and F1 score, highlighting its potential for intrusion detection in VANETs. Additionally, we compared our model with other machine learning techniques, further validating its superiority. However, it is important to acknowledge certain limitations. The fast mobility of nodes in VANETs and the dynamic changes in network typology pose challenges for intrusion detection. The rapid movement of nodes and dynamic network conditions require adaptive and dynamic intrusion detection mechanisms to ensure accurate and up-to-date threat detection. In conclusion, our study contributes to the field of VANET security by proposing an effective intrusion detection model. The use of mutual information and the SMOTE technique demonstrated promising results. Looking ahead, future research should focus on developing adaptive intrusion detection approaches that can address the challenges posed by the fast mobility of nodes and the dynamic network typology in VANETs. By doing so, we can enhance the security and resilience of VANETs, ensuring safer and more reliable transportation systems in the future.

Author Contributions

Conceptualization, S.A. and A.G.; methodology M.M.N., H.F. and A.G.; software, M.A.; validation, S.B., S.B.A.K. and A.G.; formal analysis, M.M.N.; investigation, M.A.; resources, A.G.; data curation, S.A.; writing—original draft preparation, S.A.; writing—review and editing, A.G., S.B., M.A. and M.M.N. visualization, S.B.A.K. and H.F.; supervision, S.B.; project administration, S.B.; funding acquisition, M.M.N. All authors have read and agreed to the published version of the manuscript.

Funding

This study was not funded and did not receive financial support. We did this research work as academic researchers of computer science at the university.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Available on request.

Acknowledgments

The authors would like to acknowledge Cadi Ayyad University, Moulay Ismail University of Meknes, Prince Sultan University (PSU) and Smart Systems Engineering lab for their valuable support. Additionally, the authors would like to acknowledge the support of PSU for paying the Article Processing Charges (APC) of this publication.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Yousefi, S.; Mousavi, M.S.; Fathy, M. Vehicular ad hoc networks (VANETs): Challenges and perspectives. In Proceedings of the 2006 6th International Conference on ITS Telecommunications, Chengdu, China, 21–23 June 2006; IEEE: Piscateville, NJ, USA, 2006. [Google Scholar]
  2. Biswas, S.; Mišić, J.; Mišić, V. DDoS attack on WAVE-enabled VANET through synchronization. In Proceedings of the 2012 IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, USA, 3–7 December 2012; IEEE: Piscateville, NJ, USA, 2012. [Google Scholar]
  3. Zeng, Y.; Qiu, M.; Zhu, D.; Xue, Z.; Xiong, J.; Liu, M. A Deepvcm: A deep learning based intrusion detection method in vanet. In Proceedings of the 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS), Washington, DC, USA, 27–29 May 2019; pp. 288–293. [Google Scholar]
  4. Zaidi, T.; Faisal, S. An overview: Various attacks in VANET. In Proceedings of the 2018 4th International Conference on Computing Communication and Automation (ICCCA), Greater Noida, India, 14–15 December 2018; IEEE: Piscateville, NJ, USA, 2018. [Google Scholar]
  5. Zeadally, S.; Hunt, R.; Chen, Y.S.; Irwin, A.; Hassan, A. Vehicular ad hoc networks (VANETS): Status, results, and challenges. Telecommun. Syst. 2012, 50, 217–241. [Google Scholar] [CrossRef]
  6. Choudhury, N.; Nasralla, M.M. A Proposed Resource-Aware Time-Constrained Scheduling Mechanism for DSME based IoV Networks. In Proceedings of the 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall), Norman, OK, USA, 27–30 September 2021; pp. 1–7. [Google Scholar] [CrossRef]
  7. Shah, Y.A.; Aadil, F.; Khalil, A.; Assam, M.; Abunadi, I.; Alluhaidan, A.S.; Al-Wesabi, F.N. An Evolutionary Algorithm-Based Vehicular Clustering Technique for VANETs. IEEE Access 2022, 10, 14368–14385. [Google Scholar] [CrossRef]
  8. Khan, M.A.; Nasralla, M.M.; Umar, M.M.; Iqbal, Z.; Rehman, G.U.; Sarfraz, M.S.; Choudhury, N. A Survey on the Noncooperative Environment in Smart Nodes-Based Ad Hoc Networks: Motivations and Solutions. Secur. Commun. Netw. 2021, 2021, 9921826. [Google Scholar] [CrossRef]
  9. Ku, I.; Lu, Y.; Gerla, M.; Gomes, R.L.; Ongaro, F.; Cerqueira, E. Towards software-defined VANET: Architecture and services. In Proceedings of the 2014 13th Annual Mediterranean ad hoc Networking Workshop (MED-HOC-NET), Piran, Slovenia, 2–4 June 2014; IEEE: Piscateville, NJ, USA, 2014; pp. 103–110. [Google Scholar]
  10. Tang, Y.; Cheng, N.; Wu, W.; Wang, M.; Dai, Y.; Shen, X. Delay-Minimization Routing for Heterogeneous VANETs with Machine Learning Based Mobility Prediction. IEEE Trans. Veh. Technol. 2019, 68, 3967–3979. [Google Scholar] [CrossRef]
  11. Kaiwartya, O.; Abdullah, A.H.; Cao, Y.; Altameem, A.; Prasad, M.; Lin, C.T.; Liu, X. Internet of vehicles: Motivation, layered architecture, network model, challenges, and future aspects. IEEE Access 2016, 4, 5356–5373. [Google Scholar] [CrossRef]
  12. Azrour, M.; Mabrouki, J.; Guezzaz, A.; Kanwal, A. Internet of Things Security: Challenges and Key Issues. Secur. Commun. Netw. 2021, 2021, 5533843. [Google Scholar] [CrossRef]
  13. Guezzaz, A.; Asimi, A.; Asimi, Y.; Azrour, M.; Benkirane, S. A Distributed Intrusion Detection Approach Based on Machine Leaning Techniques for a Cloud Security. In Intelligent Systems in Big Data, Semantic Web and Machine Learning; Springer: Cham, Switzerland, 2021; Volume 1344, pp. 85–94. [Google Scholar]
  14. Nasralla, M.M.; Garcia-Magarino, I.; Lloret, J. Defenses against Perception-Layer Attacks on IoT Smart Furniture for Impaired People. IEEE Access 2020, 8, 119795–119805. [Google Scholar] [CrossRef]
  15. Nirmala, R.; Sudha, R. A Relativity Cram between MANET and VANET Background along Routing Protocols. Int. J. Adv. Inf. Sci. Technol. 2014, 26, 153–157. [Google Scholar]
  16. Chawla, N.V.; Bowyer, K.W.; Hall, L.O.; Kegelmeyer, W.P. SMOTE: Synthetic Minority Over-sampling Technique. J. Artif. Intell. Res. 2002, 16, 321–357. [Google Scholar] [CrossRef]
  17. Guezzaz, A.; Asimi, A.; Asimi, Y.; Tbatou, Z.; Sadqi, Y. A Lightweight Neural Classifier for Intrusion Detection. Gen. Lett. Math. 2017, 2, 57–66. [Google Scholar] [CrossRef]
  18. Alheeti, K.M.A.; Gruebler, A.; McDonald-Maier, K. Intelligent Intrusion Detection of Grey Hole and Rushing Attacks in Self-Driving Vehicular Networks. Computers 2016, 5, 16. [Google Scholar] [CrossRef]
  19. Khan, A.S.; Balan, K.; Javed, Y.; Tarmizi, S.; Abdullah, J. Secure Trust-Based Blockchain Architecture to Prevent Attacks in VANET. Sensors 2019, 19, 4954. [Google Scholar] [CrossRef] [PubMed]
  20. Guezzaz, A.; Benkirane, S.; Azrour, M.; Khurram, S. A Reliable Network Intrusion Detection Approach Using Decision Tree with Enhanced Data Quality. Secur. Commun. Netw. 2021, 2021, 1–8. [Google Scholar] [CrossRef]
  21. Guezzaz, A.; Azrour, M.; Benkirane, S.; Mohy-Eddine, M.; Attou, H.; Douiba, M. A Lightweight Hybrid Intrusion Detection Framework using Machine Learning for Edge-Based IIoT Security. Int. Arab. J. Inf. Technol. 2022, 19, 5. [Google Scholar] [CrossRef]
  22. Jones, A.K.; Sielken, R.S. Computer system intrusion detection: A survey. Comput. Sci. Tech. Rep. 2000, 1–25. [Google Scholar]
  23. Ioannou, C.; Vassiliou, V. An Intrusion Detection System for Constrained WSN and IoT Nodes Based on Binary Logistic Regression. In Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Suzhou, China, 25 October 2018; pp. 259–263. [Google Scholar]
  24. Rai, K.; Guleria, A.; Devi, M.S. Decision Tree Based Algorithm for Intrusion Detection. Int. J. Adv. Netw. Appl. 2016, 7, 2828. [Google Scholar]
  25. Almseidin, M.; Alzubi, M.; Kovacs, S.; Alkasassbeh, M. Evaluation of machine learning algorithms for intrusion detection system. In Proceedings of the 2017 IEEE 15th International Symposium on Intelligent Systems and Informatics (SISY), Subotica, Serbia, 14–16 September 2017. [Google Scholar]
  26. Mahesh, B. Machine learning algorithms–A review. Int. J. Sci. Res. 2020, 9, 381–386. [Google Scholar]
  27. Amiri, F.; Yousefi, M.R.; Lucas, C.; Shakery, A.; Yazdani, N. Mutual information-based feature selection for intrusion detection systems. J. Netw. Comput. Appl. 2011, 34, 1184–1199. [Google Scholar] [CrossRef]
  28. Guezzaz, S.; Azrour, B.M. A Novel Anomaly Network Intrusion Detection System for Internet of Things Security. In IoT and Smart Devices for Sustainable Environment. EAI/Springer Innovations in Communication and Computing; Springer: Berlin/Heidelberg, Germany, 2022. [Google Scholar]
  29. Al-Jarrah, O.Y.; Siddiqui, A.; Elsalamouny, M.; Yoo, P.D.; Muhaidat, S.; Kim, K. Machine-learning-based feature selection techniques for large-scale network intrusion detection. In Proceedings of the 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW), Madrid, Spain, 30 June–3 July 2014; IEEE: Piscateville, NJ, USA, 2014; pp. 177–181. [Google Scholar]
  30. Gad, A.R.; Nashat, A.A.; Barkat, T.M. Intrusion detection system using machine learning for vehicular ad hoc networks based on ToN-IoT dataset. IEEE Access 2021, 9, 142206–142217. [Google Scholar] [CrossRef]
  31. Zeng, Y.; Qiu, M.; Ming, Z.; Liu, M. Senior2local: A machine learning based intrusion detection method for vanets. In Proceedings of the International Conference on Smart Computing and Communication, Tokyo, Japan, 10–12 December 2018; Springer: Cham, Switzerland, 2018; pp. 417–426. [Google Scholar]
  32. Wahab, O.A.; Mourad, A.; Otrok, H.; Bentahar, J. CEAP: SVM-based intelligent detection model for clustered vehicular ad hoc networks. Expert Syst. Appl. 2016, 50, 40–54. [Google Scholar] [CrossRef]
  33. Bangui, H.; Ge, M.; Buhnova, B. A hybrid data-driven model for intrusion detection in VANET. Procedia Comput. Sci. 2021, 184, 516–523. [Google Scholar] [CrossRef]
  34. Benkirane, S.; Guezzaz, A.; Azrour, M.; Gardezi, A.A.; Ahmad, S.; Sayed, A.E.; Naseer, S.; Shafiq, M. Adapted Speed System in a Road Bend Situation in VANET Environment. Comput. Mater. Contin. 2022, 74, 3781–3794. [Google Scholar] [CrossRef]
  35. Grover, J.; Prajapati, N.K.; Laxmi, V.; Gaur, M.S. Machine learning approach for multiple misbehavior detection in VANET. In International Conference on Advances in Computing and Communications; Springer: Berlin/Heidelberg, Germany; pp. 644–653.
  36. Kandali, K.; Bennis, L.; El Bannay, O.; Bennis, H. An Intelligent Machine Learning Based Routing Scheme for VANET. IEEE Access 2022, 10, 74318–74333. [Google Scholar] [CrossRef]
  37. Kandali, K.; Bennis, L.; Bennis, H. A New Hybrid Routing Protocol Using a Modified K-Means Clustering Algorithm and Continuous Hopfield Network for VANET. IEEE Access 2021, 9, 47169–47183. [Google Scholar] [CrossRef]
  38. Kosmanos, D.; Pappas, A.; Maglaras, L.; Moschoyiannis, S.; Aparicio-Navarro, F.J.; Argyriou, A.; Janicke, H. A novel Intrusion Detection System against spoofing attacks in connected Electric Vehicles. Array 2020, 5, 100013. [Google Scholar] [CrossRef]
  39. Hassan, H.A.; Hemdan, E.E.; El-Shafai, W.; Shokair, M.; El-Samie, F.E.A. Intrusion Detection Systems for the Internet of Thing: A Survey Study. Wirel. Pers. Commun. 2022, 128, 2753–2778. [Google Scholar] [CrossRef]
  40. Abro, G.E.M.; Zulkifli, S.A.B.M.; Kumar, K.; El Ouanjli, N.; Asirvadam, V.S.; Mossa, M.A. Comprehensive Review of Recent Advancements in Battery Technology, Propulsion, Power Interfaces, and Vehicle Network Systems for Intelligent Autonomous and Connected Electric Vehicles. Energies 2023, 16, 2925. [Google Scholar] [CrossRef]
  41. Javed, A.R.; Jalil, Z.; Moqurrab, S.A.; Abbas, S.; Liu, X. Ensemble Adaboost classifier for accurate and fast detection of botnet attacks in connected vehicles. Trans. Emerg. Telecommun. Technol. 2020, 33, e4088. [Google Scholar]
  42. Alhaidari, A.F.; Alrehan, A.M. A simulation work for generating a novel dataset to detect distributed denial of service attacks on Vehicular Ad hoc NETwork systems. Int. J. Distrib. Sens. Netw. 2021, 17, 15501477211000287. [Google Scholar] [CrossRef]
  43. Guezzaz, A.; Asimi, A.; Azrour, M.; Batou, Z.; Asimi, Y. A Multilayer Perceptron Classifier for Monitoring Network Traffic. In Big Data and Networks Technologies; Springer: Berlin/Heidelberg, Germany, 2020. [Google Scholar]
  44. NSL-KDD Dataset. Available online: https://web.archive.org/web/20150205070216/http://nsl.cs.unb.ca/NSL-KDD/ (accessed on 11 January 2023).
  45. CICIDS2017 Dataset. Available online: https://www.unb.ca/cic/datasets/ids-2017.html (accessed on 11 January 2023).
  46. Moustafa, N. ToN-IoT Dataset. Available online: https://cloudstor.aarnet.edu.au/plus/s/ds5zW91vdgjEj9i (accessed on 11 January 2023).
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.