IDEAS home Printed from https://ideas.repec.org/a/gam/jmathe/v10y2022i8p1267-d791499.html
   My bibliography  Save this article

Anomaly Detection in the Internet of Vehicular Networks Using Explainable Neural Networks (xNN)

Author

Listed:
  • Saddam Aziz

    (Centre for Advances in Reliability and Safety, New Territories, Hong Kong)

  • Muhammad Talib Faiz

    (Centre for Advances in Reliability and Safety, New Territories, Hong Kong)

  • Adegoke Muideen Adeniyi

    (Centre for Advances in Reliability and Safety, New Territories, Hong Kong)

  • Ka-Hong Loo

    (Centre for Advances in Reliability and Safety, New Territories, Hong Kong
    Department of Electronic and Information Engineering, The Hong Kong Polytechnic University (PolyU), Hung Hom, Hong Kong)

  • Kazi Nazmul Hasan

    (School of Engineering, Royal Melbourne Institute of Technology (RMIT) University, Melbourne, VIC 3000, Australia)

  • Linli Xu

    (Department of Electronic and Information Engineering, The Hong Kong Polytechnic University (PolyU), Hung Hom, Hong Kong)

  • Muhammad Irshad

    (Department of Electronic and Information Engineering, The Hong Kong Polytechnic University (PolyU), Hung Hom, Hong Kong)

Abstract

It is increasingly difficult to identify complex cyberattacks in a wide range of industries, such as the Internet of Vehicles (IoV). The IoV is a network of vehicles that consists of sensors, actuators, network layers, and communication systems between vehicles. Communication plays an important role as an essential part of the IoV. Vehicles in a network share and deliver information based on several protocols. Due to wireless communication between vehicles, the whole network can be sensitive towards cyber-attacks.In these attacks, sensitive information can be shared with a malicious network or a bogus user, resulting in malicious attacks on the IoV. For the last few years, detecting attacks in the IoV has been a challenging task. It is becoming increasingly difficult for traditional Intrusion Detection Systems (IDS) to detect these newer, more sophisticated attacks, which employ unusual patterns. Attackers disguise themselves as typical users to evade detection. These problems can be solved using deep learning. Many machine-learning and deep-learning (DL) models have been implemented to detect malicious attacks; however, feature selection remains a core issue. Through the use of training empirical data, DL independently defines intrusion features. We built a DL-based intrusion model that focuses on Denial of Service (DoS) assaults in particular. We used K-Means clustering for feature scoring and ranking. After extracting the best features for anomaly detection, we applied a novel model, i.e., an Explainable Neural Network (xNN), to classify attacks in the CICIDS2019 dataset and UNSW-NB15 dataset separately. The model performed well regarding the precision, recall, F1 score, and accuracy. Comparatively, it can be seen that our proposed model xNN performed well after the feature-scoring technique. In dataset 1 (UNSW-NB15), xNN performed well, with the highest accuracy of 99.7%, while CNN scored 87%, LSTM scored 90%, and the Deep Neural Network (DNN) scored 92%. xNN achieved the highest accuracy of 99.3% while classifying attacks in the second dataset (CICIDS2019); the Convolutional Neural Network (CNN) achieved 87%, Long Short-Term Memory (LSTM) achieved 89%, and the DNN achieved 82%. The suggested solution outperformed the existing systems in terms of the detection and classification accuracy.

Suggested Citation

  • Saddam Aziz & Muhammad Talib Faiz & Adegoke Muideen Adeniyi & Ka-Hong Loo & Kazi Nazmul Hasan & Linli Xu & Muhammad Irshad, 2022. "Anomaly Detection in the Internet of Vehicular Networks Using Explainable Neural Networks (xNN)," Mathematics, MDPI, vol. 10(8), pages 1-23, April.
  • Handle: RePEc:gam:jmathe:v:10:y:2022:i:8:p:1267-:d:791499
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2227-7390/10/8/1267/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2227-7390/10/8/1267/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. E. Laxmi Lydia & A. Arokiaraj Jovith & A. Francis Saviour Devaraj & Changho Seo & Gyanendra Prasad Joshi, 2021. "Green Energy Efficient Routing with Deep Learning Based Anomaly Detection for Internet of Things (IoT) Communications," Mathematics, MDPI, vol. 9(5), pages 1-18, March.
    2. Jiang, Ying & Zhang, Junyi, 2019. "Interaction between company Manager's and Driver's decisions on expressway routes for truck transport," Transport Policy, Elsevier, vol. 76(C), pages 1-12.
    3. Rongquan Zhang & Saddam Aziz & Muhammad Umar Farooq & Kazi Nazmul Hasan & Nabil Mohammed & Sadiq Ahmad & Nisrine Ibadah, 2021. "A Wind Energy Supplier Bidding Strategy Using Combined EGA-Inspired HPSOIFA Optimizer and Deep Learning Predictor," Energies, MDPI, vol. 14(11), pages 1-22, May.
    4. Li, Yunfeng & Xue, Wenli & Wu, Ting & Wang, Huaizhi & Zhou, Bin & Aziz, Saddam & He, Yang, 2021. "Intrusion detection of cyber physical energy system based on multivariate ensemble classification," Energy, Elsevier, vol. 218(C).
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Snezhana Gocheva-Ilieva & Atanas Ivanov & Hristina Kulina, 2023. "Special Issue “Statistical Data Modeling and Machine Learning with Applications II”," Mathematics, MDPI, vol. 11(12), pages 1-4, June.
    2. Furkat Safarov & Mainak Basak & Rashid Nasimov & Akmalbek Abdusalomov & Young Im Cho, 2023. "Explainable Lightweight Block Attention Module Framework for Network-Based IoT Attack Detection," Future Internet, MDPI, vol. 15(9), pages 1-19, September.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Ádám Sleisz & Dániel Divényi & Beáta Polgári & Péter Sőrés & Dávid Raisz, 2022. "A Novel Cost Allocation Mechanism for Local Flexibility in the Power System with Partial Disintermediation," Energies, MDPI, vol. 15(22), pages 1-18, November.
    2. Aslani, Mehrdad & Faraji, Jamal & Hashemi-Dezaki, Hamed & Ketabi, Abbas, 2022. "A novel clustering-based method for reliability assessment of cyber-physical microgrids considering cyber interdependencies and information transmission errors," Applied Energy, Elsevier, vol. 315(C).
    3. Elsisi, Mahmoud & Amer, Mohammed & Dababat, Alya’ & Su, Chun-Lien, 2023. "A comprehensive review of machine learning and IoT solutions for demand side energy management, conservation, and resilient operation," Energy, Elsevier, vol. 281(C).
    4. Liu, Chunming & Wang, Chunling & Yin, Yujun & Yang, Peihong & Jiang, Hui, 2022. "Bi-level dispatch and control strategy based on model predictive control for community integrated energy system considering dynamic response performance," Applied Energy, Elsevier, vol. 310(C).
    5. Yao, Leyi & Liu, Zeyuan & Chang, Weiguang & Yang, Qiang, 2023. "Multi-level model predictive control based multi-objective optimal energy management of integrated energy systems considering uncertainty," Renewable Energy, Elsevier, vol. 212(C), pages 523-537.
    6. Guo, Zhilong & Xu, Wei & Yan, Yue & Sun, Mei, 2023. "How to realize the power demand side actively matching the supply side? ——A virtual real-time electricity prices optimization model based on credit mechanism," Applied Energy, Elsevier, vol. 343(C).
    7. Lingling Li & Jiarui Pei & Qiang Shen, 2023. "A Review of Research on Dynamic and Static Economic Dispatching of Hybrid Wind–Thermal Power Microgrids," Energies, MDPI, vol. 16(10), pages 1-23, May.
    8. Abedrabboh, Khaled & Al-Fagih, Luluwah, 2023. "Applications of mechanism design in market-based demand-side management: A review," Renewable and Sustainable Energy Reviews, Elsevier, vol. 171(C).
    9. Wisam Abed Kattea Al-Maliki & Hayder Q. A. Khafaji & Hasanain A. Abdul Wahhab & Hussein M. H. Al-Khafaji & Falah Alobaid & Bernd Epple, 2022. "Advances in Process Modelling and Simulation of Parabolic Trough Power Plants: A Review," Energies, MDPI, vol. 15(15), pages 1-15, July.
    10. Saddam Aziz & Cheung-Ming Lai & Ka Hong Loo, 2023. "Performance of an Adaptive Optimization Paradigm for Optimal Operation of a Mono-Switch Class E Induction Heating Application," Mathematics, MDPI, vol. 11(13), pages 1-18, July.
    11. Rongquan Zhang & Saddam Aziz & Muhammad Umar Farooq & Kazi Nazmul Hasan & Nabil Mohammed & Sadiq Ahmad & Nisrine Ibadah, 2021. "A Wind Energy Supplier Bidding Strategy Using Combined EGA-Inspired HPSOIFA Optimizer and Deep Learning Predictor," Energies, MDPI, vol. 14(11), pages 1-22, May.

    More about this item

    Keywords

    IoV; xNN; K-MEANS; anomaly detection;
    All these keywords.

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:10:y:2022:i:8:p:1267-:d:791499. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.