Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection

被引:131
|
作者
Zaidi, Kamran [1 ]
Milojevic, Milos B. [1 ]
Rakocevic, Veselin [1 ]
Nallanathan, Arumugam [2 ]
Rajarajan, Muttukrishnan [1 ]
机构
[1] City Univ London, Sch Math Comp Sci & Engn, London EC1V 0HB, England
[2] Univ London, Kings Coll London, Dept Informat, London WC2R 2LS, England
关键词
Cryptography; fault tolerance; intrusion detection; rogue nodes (RNs); security; vehicular ad hoc networks (VANETs); vehicular networks; wireless networks; SECURE; EFFICIENT; PROTOCOL;
D O I
10.1109/TVT.2015.2480244
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, an intrusion detection system (IDS) for vehicular ad hoc networks (VANETs) is proposed and evaluated. The IDS is evaluated by simulation in the presence of rogue nodes (RNs) that can launch different attacks. The proposed IDS is capable of detecting a false information attack using statistical techniques effectively and can also detect other types of attacks. First, the theory and implementation of the VANET model that is used to train the IDS is discussed. Then, an extensive simulation and analysis of our model under different traffic conditions is conducted to identify the effects of these parameters in VANETs. In addition, the extensive data gathered in the simulations are presented using graphical and statistical techniques. Moreover, RNs are introduced in the network, and an algorithm is presented to detect these RNs. Finally, we evaluate our system and observe that the proposed application-layer IDS based on a cooperative information exchange mechanism is better for dynamic and fast-moving networks such as VANETs, as compared with other techniques available.
引用
收藏
页码:6703 / 6714
页数:12
相关论文
共 50 条
  • [31] On Effective Data Aggregation Techniques In Host-based Intrusion Detection in MANET
    Zhang, Difan
    Ge, Linqiang
    Hardy, Rommie
    Yu, Wei
    Zhang, Hanlin
    Reschly, Robert
    2013 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2013, : 85 - 90
  • [32] Host-based intrusion detection using self-organizing maps
    Lichodzijewski, P
    Zincir-Heywood, AN
    Heywood, MI
    PROCEEDING OF THE 2002 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-3, 2002, : 1714 - 1719
  • [33] Towards a better similarity algorithm for host-based intrusion detection system
    Ouarda, Lounis
    Malika, Bourenane
    Brahim, Bouderah
    JOURNAL OF INTELLIGENT SYSTEMS, 2023, 32 (01)
  • [34] Host-based intrusion detection using dynamic and static behavioral models
    Yeung, DY
    Ding, YX
    PATTERN RECOGNITION, 2003, 36 (01) : 229 - 243
  • [35] Trust Management and Admission Control for Host-Based Collaborative Intrusion Detection
    Carol Fung
    Jie Zhang
    Issam Aib
    Raouf Boutaba
    Journal of Network and Systems Management, 2011, 19 : 257 - 277
  • [36] Host-based intrusion detection with multi-datasource and deep learning
    Hwang, Ren-Hung
    Lee, Chieh-Lun
    Lin, Ying-Dar
    Lin, Po-Chin
    Wu, Hsiao-Kuang
    Lai, Yuan-Cheng
    Chen, C. K.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 78
  • [37] On effective sampling techniques in host-based intrusion detection in tactical MANET
    Yu, Wei
    Ge, Linqiang
    Zhang, Difan
    Hardy, Rommie L.
    Reschly, Robert J.
    International Journal of Security and Networks, 2013, 8 (03) : 154 - 168
  • [38] A Unified Host-based Intrusion Detection Framework using Spark in Cloud
    Liu, Ming
    Xue, Zhi
    He, Xiangjian
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 97 - 103
  • [39] Trust Management and Admission Control for Host-Based Collaborative Intrusion Detection
    Fung, Carol
    Zhang, Jie
    Aib, Issam
    Boutaba, Raouf
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2011, 19 (02) : 257 - 277
  • [40] Bluebox: A policy-driven, host-based intrusion detection system
    Chari, Suresh N.
    Cheng, Pau-Chen
    ACM Transactions on Information and System Security, 2003, 6 (02) : 173 - 200