Ensemble Learning Based Malicious Node Detection in SDN-Based VANETs
Downloads
Background: The architecture of Software Defined Networking (SDN) integrated with Vehicular Ad-hoc Networks (VANETs) is considered a practical method for handling large-scale, dynamic, heterogeneous vehicular networks, since it offers flexibility, programmability, scalability, and a global understanding. However, the integration with VANETs introduces additional security vulnerabilities due to the deployment of a logically centralized control mechanism. These security attacks are classified as internal and external based on the nature of the attacker. The method adopted in this work facilitated the detection of internal position falsification attacks.
Objective: This study aimed to investigate the performance of k-NN, SVM, Naí¯ve Bayes, Logistic Regression, and Random Forest machine learning (ML) algorithms in detecting position falsification attacks using the Vehicular Reference Misbehavior (VeReMi) dataset. It also aimed to conduct a comparative analysis of two ensemble classification models, namely voting and stacking for final decision-making. These ensemble classification methods used the ML algorithms cooperatively to achieve improved classification.
Methods: The simulations and evaluations were conducted using the Python programming language. VeReMi dataset was selected since it was an application-specific dataset for VANETs environment. Performance evaluation metrics, such as accuracy, precision, recall, F-measure, and prediction time were also used in the comparative studies.
Results: This experimental study showed that Random Forest ML algorithm provided the best performance in detecting attacks among the ML algorithms. Voting and stacking were both used to enhance classification accuracy and reduce time required to identify an attack through predictions generated by k-NN, SVM, Naí¯ve Bayes, Logistic Regression, and Random Forest classifiers.
Conclusion: In terms of attack detection accuracy, both methods (voting and stacking) achieved the same level of accuracy as Random Forest. However, the detection of attack using stacking could be achieved in roughly less than half the time required by voting ensemble.
Keywords: Machine learning methods, Majority voting ensemble, SDN-based VANETs, Security attacks, Stacking ensemble classifiers, VANETs,
H. Hartenstein and K.P. Laberteaux, "A tutorial survey on vehicular ad hoc networks,” IEEE Commun. Mag., vol. 46, no. 6, pp. 164-171, 2008, doi: 10.1109/MCOM.2008.4539481.
S. Zeadally, R. Hunt, Y.S. Chen, A. Irwin, and A. Hassan, "Vehicular ad hoc networks (VANETS): status, results, and challenges,” Telecommun Syst, vol. 50, no. 4, pp. 217-241, 2012, doi: 10.1007/s11235-010-9400-5.
S.K. Bhoi, and P.M. Khilar, "Vehicular communication: a survey,” IET Networks, vol. 3, no. 3, pp. 204-217, 2014, doi: 10.1049/iet-net.2013.0065.
R. Swami, M. Dave, and V. Ranga, "Software-defined Networking-based DDoS Defense Mechanisms,” ACM Comput Surv, vol. 52, no. 2, pp. 1-36, 2020, doi: 10.1145/3301614.
S. Khatri, H. Vachhani, S. Shah, J. Bhatia, M. Chaturvedi, S. Tanwar, and N. Kumar, "Machine learning models and techniques for VANET based traffic management: Implementation issues and challenges,” Peer Peer Netw Appl, vol. 14, no. 3, pp. 1778-1805, 2021, doi: 10.1007/s12083-020-00993-4.
A. di Maio, M.R. Palattella, R. Soua, L. Lamorte, X. Vilajosana, J.A. Zarate, and T. Engel, "Enabling SDN in VANETs: what is the impact on security?” Sensors (Switzerland), vol. 16, no. 12, 2077, 2016, doi: 10.3390/s16122077.
M. Mousa, A.M. Bahaa-Eldin, and M. Sobh, "Software Defined Networking concepts and challenges,” in 11th International Conference on Computer Engineering & Systems (ICCES), pp. 79–90, 2016, doi: 10.1109/ICCES.2016.7821979.
K. Adhikary, S. Bhushan, S. Kumar, K. Dutta, "Hybrid algorithm to detect DDOS attacks in VANETs”, Wireless Personal Communications, vol. 114, pp. 3613-3634, 2022, doi: 10.1007/s11277-020-07549-y.
P.C. Sen, M. Hajra, and M. Ghosh, "Supervised classification algorithms in machine learning: A survey and review" in Emerging Technology in Modelling and Graphics, pp. 99-111, 2020.
A. Sangwan, A. Sangwan, R.P. Singh, "A classification of misbehavior detection schemes for VANETs: A Survey”, Wireless Personal Communications, 2022, doi:10.1007/s11277-022-10098-1.
R. Barnwal, and S. Ghosh, Detection of misbehaving nodes in vehicular ad hoc network, 2014.
P.K. Singh, S. Gupta, R. Vashistha, S.K. Nandi, and S. Nandi, "Machine Learning Based Approach to Detect Position Falsification Attack in VANETs,” in: Communications in Computer and Information Science, pp. 166-178, 2019, https://doi.org/10.1007/978-981-13-7561-3_13
A. Sonker, and R.K. Gupta, "A new procedure for misbehavior detection in vehicular ad-hoc networks using machine learning,” Int. J. Electr. Comput. Eng., vol. 11, no. 3, pp: 2535-2547, 2021.
S. So, P. Sharma, and J. Petit, "Integrating plausibility checks and machine learning for misbehavior detection in VANET,” in Proceedings 17th IEEE International Conference on Machine Learning and Applications, pp. 564–571, 2019, doi: 10.1109/ICMLA.2018.00091.
S. Gyawali and Y. Qian, "Misbehavior detection using machine learning in vehicular communication networks," in IEEE International Conference on Communications (ICC), Shanghai, China, pp. 1-6, 2019, doi: 10.1109/ICC.2019.8761300.
J. Grover, N. K. Prajapati, V. Laxmi, and M. S. Gaur, "Machine learning approach for multiple misbehavior detection in VANET,” Communications in Computer and Information Science, vol. 192, no. 3, pp. 644–653, 2011, doi: 10.1007/978-3-642-22720-2_68.
J. Montenegro, C. Iza, and M.A. Igartua, "Detection of position falsification attacks in VANETs applying trust model and machine learning,” in PE-WASUN 2020 - Proceedings of the 17th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks, pp. 9-16, 2020, doi: 10.1145/3416011.3424757.
R. Sultana, J. Grover, and M. Tripathi, "A novel framework for misbehavior detection in SDN-based VANET,” in International Symposium on Advanced Networks and Telecommunication Systems, pp. 1-6, 2020, doi: 10.1109/ANTS50601.2020.9342778.
M. J. Kang, and J.W. Kang, "Intrusion detection system using deep neural network for in-vehicle network security”, PloS One, vol. 11, no. 6, e0155781, 2016, doi: https://doi.org/10.1371/journal.pone.0155781.
H. Bangui, M. Ge, and B. Buhnova, "A hybrid machine learning model for intrusion detection in VANET,” Computing, vol. 104, pp. 503-531, 2022, doi: 10.1007/s00607-021-01001-0.
S. Ercan, M. Ayaida, and N. Messai, "Misbehavior Detection for Position Falsification Attacks in VANETs Using Machine Learning”, IEEE Access, vol. 10, pp. 1893-1904, 2022, doi: 10.1109/ACCESS.2021.3136706
F.A. Ghaleb, F. Saeed, M. Al-Sarem, B.A.S. Al-rimy, W. Boulila, A.E.M. Eljialy, K. Aloufi, and M. Alazab, "Misbehavior-Aware On-Demand Collaborative Intrusion Detection System Using Distributed Ensemble Learning for VANET,” Electronics, vol. 9, no. 9, 1411, 2020, https://doi.org/10.3390/electronics9091411
M.A. Khan, M.A. Khan, K.S. Latif, A.A. Shah, M.U. Rehman, W. Boulila, M. Driss, and J. Ahmad. "Voting classifier-based intrusion detection for IOT networks," in Advances on Smart and Soft Computing: Proceedings of ICACIn, pp. 313-328, 2021, https://doi.org/10.48550/arXiv.2104.10015.
S. Azam, M. Bibi, R. Riaz, S.S. Rizvi, and S.J. Kwon, "Collaborative learning based sybil attack detection in vehicular AD-HOC networks (VANETS),” Sensors, vol. 22, no. 18, 6934, 2022, doi: 10.3390/s22186934.
A. Sonker, R.K. Gupta, "A new combination of machine learning algorithms using stacking approach for misbehavior detection in VANETs,” International Journal of Computer Science and Network Security, vol. 20, no. 10, pp. 94-100, 2020, doi.org/10.22937/IJCSNS.2020.20.10.13.
R. W. van der Heijden, T. Lukaseder, and F. Kargl, "VeReMi: A dataset for comparable evaluation of misbehavior detection in VANETs,” Apr. 2018, [Online]. Available: http://arxiv.org/abs/1804.06701
Copyright (c) 2023 The Authors. Published by Universitas Airlangga.
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
All accepted papers will be published under a Creative Commons Attribution 4.0 International (CC BY 4.0) License. Authors retain copyright and grant the journal right of first publication. CC-BY Licenced means lets others to Share (copy and redistribute the material in any medium or format) and Adapt (remix, transform, and build upon the material for any purpose, even commercially).