2023
DOI: 10.1016/j.future.2022.10.020
|View full text |Cite
|
Sign up to set email alerts
|

DESC-IDS: Towards an efficient real-time automotive intrusion detection system based on deep evolving stream clustering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…Another key aspect of introducing the research community to the ROAD dataset is that it provides a quality platform to test novel IDS architectures. In [37,[71][72][73][74][75][76][77][78], researchers use the ROAD dataset for evaluation purposes from a novel IDS method. Jin et al combine oversampling, outlier detection, and metric learning for intrusion detection and evaluate their model on ROAD (and other datasets) [71].…”
Section: Plos Onementioning
confidence: 99%
See 1 more Smart Citation
“…Another key aspect of introducing the research community to the ROAD dataset is that it provides a quality platform to test novel IDS architectures. In [37,[71][72][73][74][75][76][77][78], researchers use the ROAD dataset for evaluation purposes from a novel IDS method. Jin et al combine oversampling, outlier detection, and metric learning for intrusion detection and evaluate their model on ROAD (and other datasets) [71].…”
Section: Plos Onementioning
confidence: 99%
“…The potential of embedding an IDS that utilizes characteristic functions is proposed in [ 79 ], where researchers evaluate the cybersecurity framework on ROAD. In [ 77 ], researchers utilize the ROAD dataset to validate a model called “Deep Evolving Stream Clustering- IDS” or DESC-IDS. Cheng et al propose the model as a means of anomaly detection capable of reducing data complexity for constructing spatial-temporal features and exposing attacks.…”
Section: Introducing the Road Datasetmentioning
confidence: 99%
“…(ii) Most packetbased NIDS do not consider the sequential functioning of packets in a flow and instead treat them as independent packets. As a result, the temporal correlations among the packets belonging to the flows are not captured [6], which may result in an incorrect classification by the NIDS (iii) They do not consider the direction of packets due to independence assumptions. However, the direction of a packet in a flow (forward or backward) can provide significant information in identifying attacks.…”
Section: Introductionmentioning
confidence: 99%