IDS Vehicle Attack Detection and Prevention using Network Environment
Prajwal Gaikwad1 , Palash Saroware2 , Akshata Gaikwad3 , Shubhangi Tudme4 , Kajal Pardeshi5
Section:Survey Paper, Product Type: Journal Paper
Volume-7 ,
Issue-4 , Page no. 1041-1046, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.10411046
Online published on Apr 30, 2019
Copyright © Prajwal Gaikwad, Palash Saroware, Akshata Gaikwad, Shubhangi Tudme, Kajal Pardeshi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Prajwal Gaikwad, Palash Saroware, Akshata Gaikwad, Shubhangi Tudme, Kajal Pardeshi, “IDS Vehicle Attack Detection and Prevention using Network Environment,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1041-1046, 2019.
MLA Style Citation: Prajwal Gaikwad, Palash Saroware, Akshata Gaikwad, Shubhangi Tudme, Kajal Pardeshi "IDS Vehicle Attack Detection and Prevention using Network Environment." International Journal of Computer Sciences and Engineering 7.4 (2019): 1041-1046.
APA Style Citation: Prajwal Gaikwad, Palash Saroware, Akshata Gaikwad, Shubhangi Tudme, Kajal Pardeshi, (2019). IDS Vehicle Attack Detection and Prevention using Network Environment. International Journal of Computer Sciences and Engineering, 7(4), 1041-1046.
BibTex Style Citation:
@article{Gaikwad_2019,
author = {Prajwal Gaikwad, Palash Saroware, Akshata Gaikwad, Shubhangi Tudme, Kajal Pardeshi},
title = {IDS Vehicle Attack Detection and Prevention using Network Environment},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {1041-1046},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4163},
doi = {https://doi.org/10.26438/ijcse/v7i4.10411046}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.10411046}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4163
TI - IDS Vehicle Attack Detection and Prevention using Network Environment
T2 - International Journal of Computer Sciences and Engineering
AU - Prajwal Gaikwad, Palash Saroware, Akshata Gaikwad, Shubhangi Tudme, Kajal Pardeshi
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 1041-1046
IS - 4
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
2041 | 241 downloads | 164 downloads |
Abstract
We have been witnessing a continual transformation of the automotive industry, whereby new technologies are integrated into the vehicles, changing the traditional concept as we know it and improving safety, performance and efficiency. The vehicular revolution is fuelling the automotive industries, most significant transformation seen in decades. However, as modern vehicles become more connected they also become much more vulnerable to cyber-attacks. A fully working Intrusion Detection System approach is proposed to protect connected vehicles (fleets and individuals) against such attacks. We present a new approach for detecting anomalies, tailored to the temporal nature of our domain. However, as vehicles become more connected, they also become more vulnerable to remote cyber-attacks, as researchers have recently been pointing out. It is demonstrated how, in cases where it is possible to compromise cars internal network, it becomes possible to control a wide range of essential functions: disabling the brakes, selectively braking individual wheels, stopping the engine, etc.
Key-Words / Index Term
Intrusion Detection, Anomaly Detection, IDS systems and platforms, Vehicle Network Security
References
[1] Bayrem Triki, Slim Rekhis, Mhamed Chammem, Noureddine Boudriga, “A privacy preseriving solution for the protection against Sybil attacks in vehicular adhoc networks”, Wireless and Mobile Networking Conference, 2013.
[2] Chen Chen, Xin Wang, Weili Han, Binyu Zang, “A robust detection of the Sybil attack in urban VANETs”, ICDCS Workshop 2009.
[3] W. Chang, J. Wu, “A survey of Sybil attack in Networks”, .Sensor Networks for Sustainable Development, CRC Press.
[4] S. Park, B. Aslam, D. Turgut, Cliff C. Zou, “Defence Against Sybil Attack in Vehicular Ad-hoc Network Based on Roadside Unit Support”, In MILCOM, pages
1-7, 2009.
[5] Bo Yu, Chang-Zhong Xu, Bin Xiao, “Detecting Sybil Attacks in VANETs”, In: Journal of Parallel and Distributed Computing 73.6 (2013), pp. 746 –756.
[6] Mina Rahbari, Mohammad Ali Jabreil Jamali, “Efficient Detection of Sybil Attack Based on Cryptography in VANET”, International Journal of Network Security &
Its Applications (IJNSA) (November 2011).
[7] Shan Chang, Yong Qi, Hongzi Zhu,Jizhong Zhao, Xuemin(Sherman) Shen, “Footprint: Detecting Sybil Attacks in Urban Vehicular Networks”, Parallel and
Distributed Systems, IEEE Transactions on, vol. 23. no. 6, 2012, pp. 1103-1114; DOI 10.1109/tpds.2011.263.
[8] Kenza Mekliche, Dr. Samira Moussaoui, “L-P2DSA: Location-based Privacy-Preserving Detection of Sybil Attacks”, 11th international symposium on programming
and systems (April 2013), pp. 187-192.
[9] Rasheed Hussain, Heekuck oh, “On Secure and Privacy Aware Sybil Attack Detection in Communication”, In Journal of Wireless Personal Communication, DOI: 10.1007/s11277-014-1659-5.
[10] Tong Zhou, Romit R. Choudhury, P. Ning, K. Chakrabarty, “P2DAP- Sybil Attacks Detection in Vehicular Ad-hoc Networks”, IEEE Journal on Selected Areas in Communications 29(3), 582–594 (2011).