ICC 2023 - IEEE International Conference on Communications 2023
DOI: 10.1109/icc45041.2023.10279368
|View full text |Cite
|
Sign up to set email alerts
|

Federated Learning for Zero-Day Attack Detection in 5G and Beyond V2X Networks

Abdelaziz Amara Korba,
Abdelwahab Boualouache,
Bouziane Brik
et al.

Abstract: Le déploiement de véhicules connectés et automatisés (CAV) utilisant les réseaux 5G et 5G-B les rend vulnérables à de nouveaux vecteurs d'attaques. Afin de détecter et de mitiger ces attaques, plusieurs systèmes de détection d'intrusions (IDS) basés sur l'apprentissage automatique ont été proposés, dont la grande majorité utilise l'apprentissage profond supervisé. Cependant, la principale limite de ce type de solution est son incapacité à détecter des attaques différentes de celles vues lors de l'apprentissage… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 15 publications
0
0
0
Order By: Relevance
“…Plenty of surveys [49]- [51] have provided insight into the current usage of Federated learning in the field of the transportation system. A novel detection mechanism has been developed by [52] that utilizes the capabilities of deep auto-encoder methods to identify attacks based solely on the benign network traffic pattern. The proposed system demonstrates a high detection rate while effectively reducing the false positive rate and detection delay through comprehensive experiments conducted on a recent network traffic dataset.…”
Section: Table 1 Cav Security Attacksmentioning
confidence: 99%
“…Plenty of surveys [49]- [51] have provided insight into the current usage of Federated learning in the field of the transportation system. A novel detection mechanism has been developed by [52] that utilizes the capabilities of deep auto-encoder methods to identify attacks based solely on the benign network traffic pattern. The proposed system demonstrates a high detection rate while effectively reducing the false positive rate and detection delay through comprehensive experiments conducted on a recent network traffic dataset.…”
Section: Table 1 Cav Security Attacksmentioning
confidence: 99%