Malicious attack detection based on traffic-flow information fusion

被引:0
|
作者
Chen, Ye [1 ]
Lai, Yingxu [1 ]
Zhang, Zhaoyi [1 ]
Li, Hanmei [1 ]
Wang, Yuhang [1 ]
机构
[1] Beijing Univ Technol, Beijing, Peoples R China
基金
国家重点研发计划;
关键词
Vehicular networks; Attack detection; Sybil attacks; Traffic flow characterization; Information fusion; MISBEHAVIOR DETECTION; INTERNET; SCHEME;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
While vehicle-to-everything communication technology enables information sharing and cooperative control for vehicles, it also poses a significant threat to the vehicles' driving security owing to cyber-attacks. In particular, Sybil malicious attacks hidden in the vehicle broadcast information flow are challenging to detect, thereby becoming an urgent issue requiring attention. Several researchers have considered this problem and proposed different detection schemes. However, the detection performance of existing schemes based on plausibility checks and neighboring observers is affected by the traffic and attacker densities. In this study, we propose a malicious attack detection scheme based on traffic-flow information fusion, which enables the detection of Sybil attacks without neighboring observer nodes. Our solution is based on the basic safety message, which is broadcast by vehicles periodically. It first constructs the basic features of traffic flow to reflect the traffic state, subsequently fuses it with the road detector information to add the road fusion features, and then classifies them using machine learning algorithms to identify malicious attacks. The experimental results demonstrate that our scheme achieves the detection of Sybil attacks with an accuracy greater than 90% at different traffic and attacker densities. Our solutions provide security for achieving a usable vehicle communication network.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] The Traffic-Flow Detection Based on Pseudo-Random Coded Radar
    Zhang, Jun
    2009 INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION, VOL III, 2009, : 630 - 632
  • [2] Flow based Sequential Grouping System for Malicious Traffic Detection
    Park, Jee-Tae
    Baek, Ui-Jun
    Lee, Min-Seong
    Goo, Young-Hoon
    Lee, Sung-Ho
    Kim, Myung-Sup
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (10): : 3771 - 3792
  • [3] Freeway traffic-flow modeling based on neural network
    Xiao, JM
    Wang, XH
    2003 IEEE INTELLIGENT TRANSPORTATION SYSTEMS PROCEEDINGS, VOLS. 1 & 2, 2003, : 136 - 139
  • [4] Effectiveness Evaluation of Evasion Attack on Encrypted Malicious Traffic Detection
    Liu, Jian
    Xiao, Qingsai
    Jiang, Zhengwei
    Yao, Yepeng
    Wang, Qiuyun
    2022 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2022, : 1158 - 1163
  • [5] Escape method of malicious traffic based on backdoor attack
    Ma B.
    Guo Y.
    Ma J.
    Zhang Q.
    Fang C.
    Tongxin Xuebao/Journal on Communications, 2024, 45 (04): : 73 - 83
  • [6] A NEURAL NETWORK BASED TRAFFIC-FLOW PREDICTION MODEL
    Cetiner, B. Gueltekin
    Sari, Murat
    Borat, Oguz
    MATHEMATICAL & COMPUTATIONAL APPLICATIONS, 2010, 15 (02): : 269 - 278
  • [7] Study of hydrodynamics models of traffic-flow
    Li, Jinping
    Zhang, Lewen
    2002, Wuhan University of Technology (26):
  • [8] Malicious Traffic Detection Algorithm for the Internet of Things Based on Temporal Spatial Feature Fusion
    Zhang, Linzhong
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (11) : 646 - 656
  • [9] Scaling Properties of Traffic-flow Data
    Z Naturforschung Sect A Phys Sci, 8-9 (600):
  • [10] TRAFFIC-FLOW DYNAMICS - A SEARCH FOR CHAOS
    DENDRINOS, DS
    CHAOS SOLITONS & FRACTALS, 1994, 4 (04) : 605 - 617