检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Fayaz Hassan Jianguo Yu Zafi Sherhan Syed Arif Hussain Magsi Nadeem Ahmed
机构地区:[1]Beijing Key Laboratory of Work Safety Intelligent Monitoring,School of Electronic Engineering,Beijing University of Post and Telecommunication,Beijing,100876,China [2]Department of Telecommunication Engineering,Mehran University of Engineering and Technology,Jamshoro,76062,Pakistan [3]State Key Laboratory of Networking and Switching Technology,Beijing University of Post and Telecommunication,Beijing,100876,China [4]School of Electronic Science,Beijing University of Post and Telecommunication,Beijing,100876,China
出 处:《Computers, Materials & Continua》2023年第12期3185-3208,共24页计算机、材料和连续体(英文)
基 金:supported in part by the National Natural Science Foundation of China(NSFC)under Grant Number 62127802.
摘 要:Vehicular Ad-hoc Networks(VANETs)are mobile ad-hoc networks that use vehicles as nodes to create a wireless network.Whereas VANETs offer many advantages over traditional transportation networks,ensuring security in VANETs remains a significant challenge due to the potential for malicious attacks.This study addresses the critical issue of security in VANETs by introducing an intelligent Intrusion Detection System(IDS)that merges Machine Learning(ML)–based attack detection with Explainable AI(XAI)explanations.This study ML pipeline involves utilizing correlation-based feature selection followed by a Random Forest(RF)classifier that achieves a classification accuracy of 100%for the binary classification task of identifying normal and malicious traffic.An innovative aspect of this study is the incorporation of XAI methodologies,specifically the Local Interpretable Model-agnostic Explanations(LIME)and SHapley Additive exPlanations(SHAP).In addition,this research also considered key features identified by mutual information-based feature selection for the task at hand.The major findings from this study reveal that the XAI-based intrusion detection methods offer distinct insights into feature importance.Key features identified by mutual information,LIME,and SHAP predominantly relate to Transmission Control Protocol(TCP),Hypertext Transfer Protocol(HTTP),Domain Name System(DNS),and Message Queuing Telemetry Transport(MQTT)protocols,highlighting their significance in distinguishing normal and malicious network activity.This XAI approach equips cybersecurity experts with a robust means of identifying and understanding VANET malicious activities,forming a foundation for more effective security countermeasures.
关 键 词:Intrusion detection system machine learning security vehicular networks
分 类 号:TP39[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.13