ICC 2022 - IEEE International Conference on Communications 2022
DOI: 10.1109/icc45855.2022.9838655
|View full text |Cite
|
Sign up to set email alerts
|

Federated-LSTM based Network Intrusion Detection Method for Intelligent Connected Vehicles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…The authors of [56] employed a simulated attack dataset consisting of simulated Sybil attack flows and normal traffic flows in their experimental analysis. Meanwhile, the simulations in [59] were conducted using the authors' proprietary dataset. Although the NSL-KDD and CIC-IDS 2017 datasets are not dedicated to IoVs and are primarily general intrusion detection datasets, the authors of [47,64] conducted their experiments on these datasets to evaluate the performance of their proposed methods.…”
Section: Analysis and Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…The authors of [56] employed a simulated attack dataset consisting of simulated Sybil attack flows and normal traffic flows in their experimental analysis. Meanwhile, the simulations in [59] were conducted using the authors' proprietary dataset. Although the NSL-KDD and CIC-IDS 2017 datasets are not dedicated to IoVs and are primarily general intrusion detection datasets, the authors of [47,64] conducted their experiments on these datasets to evaluate the performance of their proposed methods.…”
Section: Analysis and Discussionmentioning
confidence: 99%
“…• Attacks detected: Within the domain of FL-based IDSs for IoV, numerous research papers have put forth methodologies to identify a diverse range of cyber threats. DoS attacks [47,52,[57][58][59][60]63] and constant attacks [53,55,61] are the most frequently discussed types of attacks in the literature. In addition, some authors emphasized specific attacks, such as the Sybil assault [56] and the black hole attack [54].…”
Section: Analysis and Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Vehicle-level model testing and actual research, on the other extreme, should be carried out to confirm the practicality of IDSs in real-world automobiles. Yu, t et al [23] focuses on leveraging Federated LSTM networks for intrusion detection in ICVs. The study capitalizes on Federated Learning techniques, distributing LSTM models across ICVs to detect and prevent network intrusions effectively.…”
Section: Related Workmentioning
confidence: 99%