2020
DOI: 10.3390/math8081311
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning-Based Detection for Cyber Security Attacks on Connected and Autonomous Vehicles

Abstract: Connected and Autonomous Vehicle (CAV)-related initiatives have become some of the fastest expanding in recent years, and have started to affect the daily lives of people. More and more companies and research organizations have announced their initiatives, and some have started CAV road trials. Governments around the world have also introduced policies to support and accelerate the deployments of CAVs. Along these, issues such as CAV cyber security have become predominant, forming an essential part of the comp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 51 publications
(22 citation statements)
references
References 21 publications
0
14
0
Order By: Relevance
“…He et al [19] introduced a CAV cyber protection architecture centered on UML (Unified Modeling Language) to describe CAV networks' possible attacks. Depending on the training data, two classification methods were presented.…”
Section: Related Workmentioning
confidence: 99%
“…He et al [19] introduced a CAV cyber protection architecture centered on UML (Unified Modeling Language) to describe CAV networks' possible attacks. Depending on the training data, two classification methods were presented.…”
Section: Related Workmentioning
confidence: 99%
“…The severity assessment model regarding the autonomous and connected vehicles for the potential cyber attack was proposed by He, Meng, Qu, and Xi (2020). Here numerous sets of potential attacks were gathered and examined from various aspects that include risks, target assets, and consequences.…”
Section: Review Of Related Workmentioning
confidence: 99%
“…Thus, a CAV cyber security framework categorizing communication-based attacks is proposed in this paper. To simulate the network attack scenarios, [28] uses the KDD99 data set which includes Probing attacks, Denial of Service attacks, User-to-Root attacks, and Remote-to-Local attacks. The KDD99 is a data set that is commonly used as a benchmark for attack detection or online intrusion for computer and network security.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In CAV networks connectivity and safety, an intrusion detection system is an important element as it assists in discriminating normal and anomalous behavior with relatively high accuracy. Most such systems are based on machine learning schemes and other schemes [26,28,31,32,34], such as the proportional overlapping scoring method [9].…”
Section: Introductionmentioning
confidence: 99%