2022
DOI: 10.1109/access.2022.3212412
|View full text |Cite
|
Sign up to set email alerts
|

Statistical Detection of Adversarial Examples in Blockchain-Based Federated Forest In-Vehicle Network Intrusion Detection Systems

Abstract: The internet-of-Vehicle (IoV) can facilitate seamless connectivity between connected vehicles (CV), autonomous vehicles (AV), and other IoV entities. Intrusion Detection Systems (IDSs) for IoV networks can rely on machine learning (ML) to protect the in-vehicle network from cyber-attacks. Blockchainbased Federated Forests (BFFs) could be used to train ML models based on data from IoV entities while protecting the confidentiality of the data and reducing the risks of tampering with the data. However, ML models … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(13 citation statements)
references
References 50 publications
0
6
0
Order By: Relevance
“…The mark indicate the successful detection of attack, and X mark indicating the detection is not possible. The earlier works (3) , (4) , (6) , (8) achieved detectability at epsilon value greater than 2 but failed in detecting the attack samples with perturbation values < 2.0 and when encounter with new attack types. Our ML-Filter achieved the credibility for detection of those attacks samples of unknown attacks and known attacks and with the attack samples with minimal perturbations, thus overcoming the lack of generalized detection by the earlier works.…”
Section: Statistical Significance Testmentioning
confidence: 90%
See 1 more Smart Citation
“…The mark indicate the successful detection of attack, and X mark indicating the detection is not possible. The earlier works (3) , (4) , (6) , (8) achieved detectability at epsilon value greater than 2 but failed in detecting the attack samples with perturbation values < 2.0 and when encounter with new attack types. Our ML-Filter achieved the credibility for detection of those attacks samples of unknown attacks and known attacks and with the attack samples with minimal perturbations, thus overcoming the lack of generalized detection by the earlier works.…”
Section: Statistical Significance Testmentioning
confidence: 90%
“…Then, the ML model trains these attack samples to learn their patterns and identify them as malicious ones. This entire procedure is called adversarial training (AT) (8) . Although these techniques perform well on known attacks, they are still susceptible to unknown attacks and lack generality.…”
Section: Introductionmentioning
confidence: 99%
“…The following describes the datasets utilized in the provided papers to assess the efficacy of various IDS solutions. Three of the papers, namely [52,57,63], employed the CAN-intrusion dataset (OTIDS), which was sourced from the Hacking and Countermeasure Research Lab at Korea University. This dataset provides a comprehensive representation of intrusion scenarios within in-vehicle networks, making it suitable for assessing IDSs specifically designed for vehicular contexts.…”
Section: Analysis and Discussionmentioning
confidence: 99%
“…• Attacks detected: Within the domain of FL-based IDSs for IoV, numerous research papers have put forth methodologies to identify a diverse range of cyber threats. DoS attacks [47,52,[57][58][59][60]63] and constant attacks [53,55,61] are the most frequently discussed types of attacks in the literature. In addition, some authors emphasized specific attacks, such as the Sybil assault [56] and the black hole attack [54].…”
Section: Analysis and Discussionmentioning
confidence: 99%
“…Although the idea of decentralization is currently very common in the case of decentralization being applied to a number of fields. However, the application to software development is still relatively new [9]. At present, because of the characteristics of blockchain technology itself.…”
Section: Definition Of Decentralized Applications (Development History)mentioning
confidence: 99%