Machine Learning-Based Malicious Vehicle Detection for Security Threats
and Attacks in Vehicle Ad-hoc Network (VANET) Communications
- URL: http://arxiv.org/abs/2401.08135v1
- Date: Tue, 16 Jan 2024 06:01:02 GMT
- Title: Machine Learning-Based Malicious Vehicle Detection for Security Threats
and Attacks in Vehicle Ad-hoc Network (VANET) Communications
- Authors: Thanh Nguyen Canh and Xiem HoangVan
- Abstract summary: Blackhole attacks are significant threats to Vehicle Ad-hoc Network (VANET)
In this paper, we propose a machine learning-based approach for blackhole detection in VANET.
- Score: 0.48951183832371004
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: With the rapid growth of Vehicle Ad-hoc Network (VANET) as a promising
technology for efficient and reliable communication among vehicles and
infrastructure, the security and integrity of VANET communications has become a
critical concern. One of the significant threats to VANET is the presence of
blackhole attacks, where malicious nodes disrupt the network's functionality
and compromise data confidentiality, integrity, and availability. In this
paper, we propose a machine learning-based approach for blackhole detection in
VANET. To achieve this task, we first create a comprehensive dataset comprising
normal and malicious traffic flows. Afterward, we study and define a promising
set of features to discriminate the blackhole attacks. Finally, we evaluate
various machine learning algorithms, including Gradient Boosting, Random
Forest, Support Vector Machines, k-Nearest Neighbors, Gaussian Naive Bayes, and
Logistic Regression. Experimental results demonstrate the effectiveness of
these algorithms in distinguishing between normal and malicious nodes. Our
findings also highlight the potential of machine learning based approach in
enhancing the security of VANET by detecting and mitigating blackhole attacks.
Related papers
- Edge-Only Universal Adversarial Attacks in Distributed Learning [49.546479320670464]
In this work, we explore the feasibility of generating universal adversarial attacks when an attacker has access to the edge part of the model only.
Our approach shows that adversaries can induce effective mispredictions in the unknown cloud part by leveraging key features on the edge side.
Our results on ImageNet demonstrate strong attack transferability to the unknown cloud part.
arXiv Detail & Related papers (2024-11-15T11:06:24Z) - Optimizing Age of Information in Vehicular Edge Computing with Federated Graph Neural Network Multi-Agent Reinforcement Learning [44.17644657738893]
This paper focuses on the Age of Information (AoI) as a key metric for data freshness and explores task offloading issues for vehicles under RSU communication resource constraints.
We propose an innovative distributed federated learning framework combining Graph Neural Networks (GNN), named Federated Graph Neural Network Multi-Agent Reinforcement Learning (FGNN-MADRL) to optimize AoI across the system.
arXiv Detail & Related papers (2024-07-01T15:37:38Z) - Enhancing Privacy and Security of Autonomous UAV Navigation [0.8512184778338805]
In critical scenarios such as border protection or disaster response, ensuring the secure navigation of autonomous UAVs is paramount.
We propose an innovative approach that combines Reinforcement Learning (RL) and Fully Homomorphic Encryption (FHE) for secure autonomous UAV navigation.
Our proposed approach ensures security and privacy in autonomous UAV navigation with negligible loss in performance.
arXiv Detail & Related papers (2024-04-26T07:54:04Z) - Cross-Domain AI for Early Attack Detection and Defense Against Malicious Flows in O-RAN [5.196266559887213]
Cross-Domain Artificial Intelligence (AI) can be the key to address this, although its application in Open Radio Access Network (O-RAN) is still at its infancy.
Our results demonstrate the potential of the proposed approach, achieving an accuracy rate of 93%.
This approach not only bridges critical gaps in mobile network security but also showcases the potential of cross-domain AI in enhancing the efficacy of network security measures.
arXiv Detail & Related papers (2024-01-17T13:29:47Z) - An Explainable Ensemble-based Intrusion Detection System for Software-Defined Vehicle Ad-hoc Networks [0.0]
In this study, we explore the detection of cyber threats in vehicle networks through ensemble-based machine learning.
We propose a model that uses Random Forest and CatBoost as our main investigators, with Logistic Regression used to then reason on their outputs to make a final decision.
We observe that our approach improves classification accuracy, and results in fewer misclassifications compared to previous works.
arXiv Detail & Related papers (2023-12-08T10:39:18Z) - RL-DistPrivacy: Privacy-Aware Distributed Deep Inference for low latency
IoT systems [41.1371349978643]
We present an approach that targets the security of collaborative deep inference via re-thinking the distribution strategy.
We formulate this methodology, as an optimization, where we establish a trade-off between the latency of co-inference and the privacy-level of data.
arXiv Detail & Related papers (2022-08-27T14:50:00Z) - An Online Ensemble Learning Model for Detecting Attacks in Wireless
Sensor Networks [0.0]
We develop an intelligent, efficient, and updatable intrusion detection system by applying an important machine learning concept known as ensemble learning.
In this paper, we examine the application of different homogeneous and heterogeneous online ensembles in sensory data analysis.
Among the proposed novel online ensembles, both the heterogeneous ensemble consisting of an Adaptive Random Forest (ARF) combined with the Hoeffding Adaptive Tree (HAT) algorithm and the homogeneous ensemble HAT made up of 10 models achieved higher detection rates of 96.84% and 97.2%, respectively.
arXiv Detail & Related papers (2022-04-28T23:10:47Z) - A Comparative Analysis of Machine Learning Algorithms for Intrusion
Detection in Edge-Enabled IoT Networks [0.0]
Intrusion detection is one of the challenging issues in the area of network security.
In this paper, a comparative analysis of conventional machine learning classification algorithms has been performed.
It can be observed that Multi-Layer Perception (MLP) has dependencies between input and output and relies more on network configuration for intrusion detection.
arXiv Detail & Related papers (2021-11-02T05:58:07Z) - Information Obfuscation of Graph Neural Networks [96.8421624921384]
We study the problem of protecting sensitive attributes by information obfuscation when learning with graph structured data.
We propose a framework to locally filter out pre-determined sensitive attributes via adversarial training with the total variation and the Wasserstein distance.
arXiv Detail & Related papers (2020-09-28T17:55:04Z) - Bayesian Optimization with Machine Learning Algorithms Towards Anomaly
Detection [66.05992706105224]
In this paper, an effective anomaly detection framework is proposed utilizing Bayesian Optimization technique.
The performance of the considered algorithms is evaluated using the ISCX 2012 dataset.
Experimental results show the effectiveness of the proposed framework in term of accuracy rate, precision, low-false alarm rate, and recall.
arXiv Detail & Related papers (2020-08-05T19:29:35Z) - Graph Backdoor [53.70971502299977]
We present GTA, the first backdoor attack on graph neural networks (GNNs)
GTA departs in significant ways: it defines triggers as specific subgraphs, including both topological structures and descriptive features.
It can be instantiated for both transductive (e.g., node classification) and inductive (e.g., graph classification) tasks.
arXiv Detail & Related papers (2020-06-21T19:45:30Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.