Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection

被引:131
|
作者
Zaidi, Kamran [1 ]
Milojevic, Milos B. [1 ]
Rakocevic, Veselin [1 ]
Nallanathan, Arumugam [2 ]
Rajarajan, Muttukrishnan [1 ]
机构
[1] City Univ London, Sch Math Comp Sci & Engn, London EC1V 0HB, England
[2] Univ London, Kings Coll London, Dept Informat, London WC2R 2LS, England
关键词
Cryptography; fault tolerance; intrusion detection; rogue nodes (RNs); security; vehicular ad hoc networks (VANETs); vehicular networks; wireless networks; SECURE; EFFICIENT; PROTOCOL;
D O I
10.1109/TVT.2015.2480244
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, an intrusion detection system (IDS) for vehicular ad hoc networks (VANETs) is proposed and evaluated. The IDS is evaluated by simulation in the presence of rogue nodes (RNs) that can launch different attacks. The proposed IDS is capable of detecting a false information attack using statistical techniques effectively and can also detect other types of attacks. First, the theory and implementation of the VANET model that is used to train the IDS is discussed. Then, an extensive simulation and analysis of our model under different traffic conditions is conducted to identify the effects of these parameters in VANETs. In addition, the extensive data gathered in the simulations are presented using graphical and statistical techniques. Moreover, RNs are introduced in the network, and an algorithm is presented to detect these RNs. Finally, we evaluate our system and observe that the proposed application-layer IDS based on a cooperative information exchange mechanism is better for dynamic and fast-moving networks such as VANETs, as compared with other techniques available.
引用
收藏
页码:6703 / 6714
页数:12
相关论文
共 50 条
  • [41] Enhancing the accuracy of network-based intrusion detection with host-based context
    Dreger, H
    Kreibich, C
    Paxson, V
    Sommer, R
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, PROCEEDINGS, 2005, 3548 : 206 - 221
  • [42] A network audit system for host-based intrusion detection (NASHID) in linux
    Daniels, TE
    Spafford, EH
    16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 178 - 187
  • [43] An Autonomous Host-Based Intrusion Detection System for Android Mobile Devices
    José Ribeiro
    Firooz B. Saghezchi
    Georgios Mantas
    Jonathan Rodriguez
    Simon J. Shepherd
    Raed A. Abd-Alhameed
    Mobile Networks and Applications, 2020, 25 : 164 - 172
  • [44] An Autonomous Host-Based Intrusion Detection System for Android Mobile Devices
    Ribeiro, Jose
    Saghezchi, Firooz B.
    Mantas, Georgios
    Rodriguez, Jonathan
    Shepherd, Simon J.
    Abd-Alhameed, Raed A.
    MOBILE NETWORKS & APPLICATIONS, 2020, 25 (01): : 164 - 172
  • [45] Generating Host-Based Data from Network Traces for Intrusion Detection
    Day, Patrick
    Iannucci, Stefano
    Banicescu, Ioana
    2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC, 2023, : 268 - 273
  • [46] Applying host-based intrusion detection to critical communication infrastructure components
    Bowen, TF
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL V, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING: I, 2003, : 452 - 457
  • [47] Enhancing Security of Host-Based Intrusion Detection Systems for the Internet of Things
    Nallakaruppan, M. K.
    Somayaji, Siva Rama Krishnan
    Fuladi, Siddhesh
    Benedetto, Francesco
    Ulaganathan, Senthil Kumaran
    Yenduri, Gokul
    IEEE ACCESS, 2024, 12 : 31788 - 31797
  • [48] On effective data aggregation techniques in host-based intrusion detection in MANET
    Zhang, Difan
    Ge, Linqiang
    Yu, Wei
    Zhang, Hanlin
    Hardy, Rommie L.
    Reschly, Robert J.
    International Journal of Security and Networks, 2013, 8 (04) : 179 - 193
  • [49] Intelligent Host-based Stepping Stone Detection Approach
    Omar, Mohd Nizam
    Budiarto, Rahmat
    WCECS 2009: WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, VOLS I AND II, 2009, : 815 - 820
  • [50] A Trace Abstraction Approach for Host-based Anomaly Detection
    Murtaza, Syed Shariyar
    Khreich, Wael
    Hamou-Lhadj, Abdelwahab
    Gagnon, Stephane
    2015 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE FOR SECURITY AND DEFENSE APPLICATIONS (CISDA), 2015, : 170 - 177