Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection

被引:131
|
作者
Zaidi, Kamran [1 ]
Milojevic, Milos B. [1 ]
Rakocevic, Veselin [1 ]
Nallanathan, Arumugam [2 ]
Rajarajan, Muttukrishnan [1 ]
机构
[1] City Univ London, Sch Math Comp Sci & Engn, London EC1V 0HB, England
[2] Univ London, Kings Coll London, Dept Informat, London WC2R 2LS, England
关键词
Cryptography; fault tolerance; intrusion detection; rogue nodes (RNs); security; vehicular ad hoc networks (VANETs); vehicular networks; wireless networks; SECURE; EFFICIENT; PROTOCOL;
D O I
10.1109/TVT.2015.2480244
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, an intrusion detection system (IDS) for vehicular ad hoc networks (VANETs) is proposed and evaluated. The IDS is evaluated by simulation in the presence of rogue nodes (RNs) that can launch different attacks. The proposed IDS is capable of detecting a false information attack using statistical techniques effectively and can also detect other types of attacks. First, the theory and implementation of the VANET model that is used to train the IDS is discussed. Then, an extensive simulation and analysis of our model under different traffic conditions is conducted to identify the effects of these parameters in VANETs. In addition, the extensive data gathered in the simulations are presented using graphical and statistical techniques. Moreover, RNs are introduced in the network, and an algorithm is presented to detect these RNs. Finally, we evaluate our system and observe that the proposed application-layer IDS based on a cooperative information exchange mechanism is better for dynamic and fast-moving networks such as VANETs, as compared with other techniques available.
引用
收藏
页码:6703 / 6714
页数:12
相关论文
共 50 条
  • [21] Host-based intrusion detection system using optimal representation
    Jung, YS
    Choi, YJ
    Park, N
    Kim, WN
    Hong, MP
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XIII, PROCEEDINGS: SYSTEMICS, CYBERNETICS AND INFORMATICS: TECHNOLOGIES AND APPLICATIONS, 2003, : 143 - 147
  • [22] On Effective Sampling Techniques for Host-based Intrusion Detection in MANET
    Ge, Linqiang
    Zhang, Difan
    Hardy, Rommie
    Liu, Hui
    Yu, Wei
    Reschly, Robert
    2012 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2012), 2012,
  • [23] Host-Based Intrusion Detection Model Using Siamese Network
    Park, Daekyeong
    Kim, Sangsoo
    Kwon, Hyukjin
    Shin, Dongil
    Shin, Dongkyoo
    IEEE ACCESS, 2021, 9 : 76614 - 76623
  • [24] Host-based intrusion detection by monitoring windows registry accesses
    Topallar, M
    Depren, MÖ
    Anarim, E
    Ciliz, K
    PROCEEDINGS OF THE IEEE 12TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE, 2004, : 728 - 731
  • [25] An Approach for Host-Based Intrusion Detection System Design Using Convolutional Neural Network
    Nam Nhat Tran
    Sarker, Ruhul
    Hu, Jiankun
    MOBILE NETWORKS AND MANAGEMENT (MONAMI 2017), 2018, 235 : 116 - 126
  • [26] A Host-based Intrusion Detection Model Based on OS Diversity for SCADA
    Bulle, Bruno B.
    Santin, Altair O.
    Viegas, Eduardo K.
    dos Santos, Roger R.
    IECON 2020: THE 46TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2020, : 691 - 696
  • [27] A Lightweight Host-Based Intrusion Detection based on Process Generation Patterns
    Tsuda, Yu
    Nakazato, Junji
    Takagi, Yaichiro
    Inoue, Daisuke
    Nakao, Koji
    Terada, Kenjiro
    2018 13TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2018), 2018, : 102 - 108
  • [28] Application of Sequence Embedding in Host-based Intrusion Detection System
    Lu, Yijun
    Teng, Shaohua
    PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2021, : 434 - 439
  • [29] Host-based intrusion detection based on real time keystroke sequences
    Gao, Yan
    Guan, Xiao-Hong
    Sun, Guo-Ji
    Feng, Li
    Jisuanji Xuebao/Chinese Journal of Computers, 2004, 27 (03): : 396 - 401
  • [30] A reinforcement learning approach for host-based intrusion detection using sequences of system calls
    Xu, X
    Xie, T
    ADVANCES IN INTELLIGENT COMPUTING, PT 1, PROCEEDINGS, 2005, 3644 : 995 - 1003