Artificial Hummingbird Algorithm with Optimal Deep Learning-Based Intrusion Detection on Vehicular Adhoc Networks
Artificial Hummingbird Algorithm with Optimal Deep Learning-Based Intrusion Detection on Vehicular Adhoc Networks |
||
|
||
© 2024 by IJETT Journal | ||
Volume-72 Issue-8 |
||
Year of Publication : 2024 | ||
Author : K. Sarathkumar, P. Sudhakar, A. Clara Kanmani |
||
DOI : 10.14445/22315381/IJETT-V72I8P136 |
How to Cite?
K. Sarathkumar, P. Sudhakar, A. Clara Kanmani, "Artificial Hummingbird Algorithm with Optimal Deep Learning-Based Intrusion Detection on Vehicular Adhoc Networks," International Journal of Engineering Trends and Technology, vol. 72, no. 8, pp. 389-399, 2024. Crossref, https://doi.org/10.14445/22315381/IJETT-V72I8P136
Abstract
Vehicular Ad hoc Networks (VANETs) permit transmission between the vehicle infrastructure, improving Intelligent Transportation Systems (ITS). Vehicles connect wirelessly to transmit the data. However, this transmission is susceptible to numerous attacks, mainly in Vehicle-to-Vehicle (V2V) settings. Intrusion Detection (ID) employing Deep Learning (DL) includes training Neural Networks (NNs) to identify the anomalies and patterns in network traffic, allowing the automatic recognition of potential security attacks and unauthorized events. DL methods, like recurrent NNs (RNNs) and convolutional NNs (CNNs), will efficiently analyze intricate and dynamic datasets for improved ID proficiencies. In this article, an artificial hummingbird algorithm with optimal DL-based ID (AHAODL-ID) technique on VANET is developed. The AHAODL-ID technique exploits feature selection with a hyperparameter selection model for detecting intrusions in the VANET. For data preprocessing, Z-score normalization is employed to scale the input data. Next, the AHA-based feature selection approach is executed for choosing an optimal feature subset. Meanwhile, the Bidirectional Long Short-Term Memory (BiLSTM) approach is implemented to identify various kinds of intrusions. Lastly, the hyperparameter election of the BiLSTM approach involves the design of a Manta Ray Foraging Optimization (MRFO) model. The experimental results of the AHAODL-ID technique are assessed using a benchmark IDS dataset. The obtained values underlined the advanced achievement of the AHAODL-ID technique over other existing models.
Keywords
VANET, IDS, Manta Ray Foraging Optimization, Intelligent Transportation System, Vehicle-to-Vehicle.
References
[1] Fuad A. Ghaleb et al., “Ensemble-Based Hybrid Context-Aware Misbehavior Detection Model for Vehicular Ad Hoc Network,” Remote Sensing, vol. 11, no. 23, pp. 1-29, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Junwei Liang et al., “A Novel Intrusion Detection System for Vehicular Ad Hoc Networks (VANETs) Based on Differences of Traffic Flow and Position,” Applied Soft Computing, vol. 75, pp. 712-727, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Fuad A. Ghaleb et al., “Hybrid and Multifaceted Context-Aware Misbehavior Detection Model for Vehicular Ad Hoc Network,” IEEE Access, vol. 7, pp. 159119-159140, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Sahrish Khan Tayyaba et al., “5G Vehicular Network Resource Management for Improving Radio Access Through Machine Learning,” IEEE Access, vol. 8, pp. 6792- 6800, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Dijiang Huang et al., “PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs,” IEEE Transactions on Intelligent Transportation Systems, vol. 12, no. 3, pp. 736-746, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Pooja Parameshwarappa, Zhiyuan Chen, and Aryya Gangopadhyay, “Analyzing Attack Strategies Against Rule-Based Intrusion Detection Systems,” Proceedings of the Workshop Program of the 19th International Conference on Distributed Computing and Networking, Varanasi, India, pp. 1-4, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Junwei Liang, Maode Ma, and Xu Tan, “GaDQN-IDS: A Novel Self-Adaptive IDS for VANETs Based on Bayesian Game Theory and Deep Reinforcement Learning,” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 8, pp. 12724-12737, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Vinoth Kumar Kalimuthu, and Thiruppathi Muthu, “Oppositional Coyote Optimization Based Feature Selection with Deep Learning Model for Intrusion Detection in Fog-Assisted Wireless Sensor Network,” Acta Montanistica Slovaca, vol. 28, no. 2, pp. 496-508, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Huseyin Polat, Muammer Turkoglu, and Onur Polat, “Deep Network Approach with Stacked Sparse Autoencoders in Detection of DDoS Attacks on SDN-Based VANET,” IET Communications, vol. 14, no. 22, pp. 4089-4100, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Farkhanda Zafar et al., “Carpooling in Connected and Autonomous Vehicles: Current Solutions and Future Directions,” ACM Computing Surveys, vol. 54, no. 10s, pp. 1-36, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Abizar Khalil et al., “Artificial Intelligence-Based Intrusion Detection System for V2V Communication in Vehicular Adhoc Networks,” Ain Shams Engineering Journal, vol. 15, no. 4, pp. 1-9, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Prakash Vijay Sontakke, and Nilkanth B. Chopade, “Optimized Deep Neural Model-Based Intrusion Detection and Mitigation System for Vehicular Ad-Hoc Network,” Cybernetics and Systems, vol. 54, no. 7, pp. 985-1013, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Amit Chougule et al., “Multibranch Reconstruction Error (MbRE) Intrusion Detection Architecture for Intelligent Edge-Based Policing in Vehicular Ad-Hoc Networks,” IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 11, pp. 13068-13077, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Weiping Ding et al., “DeepSecDrive: An Explainable Deep Learning Framework for Real-Time Detection of Cyberattack in in-Vehicle Networks,” Information Sciences, vol. 658, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Ankit Manderna et al., “Vehicular Network Intrusion Detection Using a Cascaded Deep Learning Approach with Multi-Variant Metaheuristic,” Sensors, vol. 23, no. 21, pp. 1-24, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[16] R. Reka et al., “Multi Head Self-Attention Gated Graph Convolutional Network Based Multi‑Attack Intrusion Detection in MANET,” Computers & Security, vol. 136, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[17] V. Karthik et al., “Residual Based Temporal Attention Convolutional Neural Network for Detection of Distributed Denial of Service Attacks in Software Defined Network Integrated Vehicular Adhoc Network,” International Journal of Network Management, vol. 34, no. 3, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[18] K. Lakshmi Narayanan, and R. Naresh, “Detection and Prevention of Black Hole Attack Using Tree Hierarchical Deep Convolutional Neural Network and Enhanced Identity-Based Encryption in Vehicular Ad Hoc Network,” IEIE Transactions on Smart Processing & Computing, vol. 13, no. 1, pp. 41-50, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Sara Amaouche et al., “FSCB-IDS: Feature Selection and Minority Class Balancing for Attacks Detection in VANETs,” Applied Sciences, vol. 13, no. 13, pp. 1-21, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Sehba Masood, and Aasim Zafar, “Deep-Efficient-Guard: Securing Wireless Ad Hoc Networks via Graph Neural Network,” International Journal of Information Technology, pp. 1-16, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Muhammad Ali Imron, and Budi Prasetyo, “Improving Algorithm Accuracy K-Nearest Neighbor Using Z-Score Normalization and Particle Swarm Optimization to Predict Customer Churn,” Journal of Soft Computing Exploration, vol. 1, no. 1, pp. 56-62, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Anusha Sanampudi, and S. Srinivasan, “Local Search Enhanced Optimal Inception-ResNet-v2 for Classification of Long-Term Lung Diseases in Post-COVID-19 Patients,” Automatika, vol. 65, no. 2, pp. 473-482, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Nabila Zrira et al., “Time Series Prediction of Sea Surface Temperature Based on BiLSTM Model with Attention Mechanism,” Journal of Sea Research, vol. 198, pp. 1-13, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Shibendu Mahata et al., “Reduced Order Infinite Impulse Response System Identification Using Manta Ray Foraging Optimization,” Alexandria Engineering Journal, vol. 87, pp. 448-477, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Nour Moustafa, “A New Distributed Architecture for Evaluating AI-Based Security Systems at the Edge: Network TON_IoT Datasets,” Sustainable Cities and Society, vol. 72, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Rabie A. Ramadan et al., “Internet of Drones Intrusion Detection Using Deep Learning,” Electronics, vol. 10, no. 21, pp. 1-28, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Abdallah R. Gad, Ahmed A. Nashat, and Tamer M. Barkat, “Intrusion Detection System Using Machine Learning for Vehicular Ad Hoc Networks Based on ToN-IoT Dataset,” IEEE Access, vol. 9, pp. 142206-142217, 2021.
[CrossRef] [Google Scholar] [Publisher Link]