IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Artificial Intelligence Based Intrusion Detection System to Detect Flooding Attack in VANETs

Artificial Intelligence Based Intrusion Detection System to Detect Flooding Attack in VANETs
View Sample PDF
Author(s): Mannat Jot Singh Aneja (Thapar University, India), Tarunpreet Bhatia (Thapar University, India), Gaurav Sharma (Université libre de Bruxelles, Belgium)and Gulshan Shrivastava (National Institute of Technology Patna, India)
Copyright: 2018
Pages: 14
Source title: Handbook of Research on Network Forensics and Analysis Techniques
Source Author(s)/Editor(s): Gulshan Shrivastava (National Institute of Technology Patna, India), Prabhat Kumar (National Institute of Technology Patna, India), B. B. Gupta (National Institute of Technology Kurukshetra, India), Suman Bala (Orange Labs, France)and Nilanjan Dey (Department of Information Technology, Techno India College of Technology, Kolkata, India)
DOI: 10.4018/978-1-5225-4100-4.ch006

Purchase

View Artificial Intelligence Based Intrusion Detection System to Detect Flooding Attack in VANETs on the publisher's website for pricing and purchasing information.

Abstract

This chapter describes how Vehicular Ad hoc Networks (VANETs) are classes of ad hoc networks that provides communication among various vehicles and roadside units. VANETs being decentralized are susceptible to many security attacks. A flooding attack is one of the major security threats to the VANET environment. This chapter proposes a hybrid Intrusion Detection System which improves accuracy and other performance metrics using Artificial Neural Networks as a classification engine and a genetic algorithm as an optimization engine for feature subset selection. These performance metrics have been calculated in two scenarios, namely misuse and anomaly. Various performance metrics are calculated and compared with other researchers' work. The results obtained indicate a high accuracy and precision and negligible false alarm rate. These performance metrics are used to evaluate the intrusion system and compare with other existing algorithms. The classifier works well for multiple malicious nodes. Apart from machine learning techniques, the effect of the network parameters like throughput and packet delivery ratio is observed.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom