a vehicular ad hoc networks intrusion detection system based on busnet
TRANSCRIPT
![Page 1: A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e195503460f94b05cc9/html5/thumbnails/1.jpg)
-Himali Jani-Cong Cheng-Shuang Wu
A Vehicular Ad Hoc Networks Intrusion Detection System Based on
BUSNet
![Page 2: A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e195503460f94b05cc9/html5/thumbnails/2.jpg)
What is VANETs?
Vehicular Ad hoc NETworks (VANETs) , is a special case of Mobile Ad hoc NETworks (MANETs).
Cars as routers or nodes. 100-300 meters range. As cars fall out of the signal range
and drop out of the network
![Page 3: A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e195503460f94b05cc9/html5/thumbnails/3.jpg)
Security Challenges in VANETs
Security challenges: -Mobility-Dynamic topology-Open wireless medium-No use of secure routing protocols because of insider attack
Properties of this method includes: IDS architecture is hierarchical and Detection algorithm can study normal behavior of network through a neural network so works intelligently
![Page 4: A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e195503460f94b05cc9/html5/thumbnails/4.jpg)
Intrusion Defense
First line of defense: intrusion prevention techniques, such as authentication and encryption
Second line of defense: Intrusion Detection,
Which determines whether unauthorized users are attempting to access, have already accessed, or have compromised the network.
![Page 5: A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e195503460f94b05cc9/html5/thumbnails/5.jpg)
Related work
Two types IDS: monitoring based and clustering based Monitoring: watchdog to detect misbehaving nodes
and pathrater to help avoid these nodes THE CONFIDANT: cooperation of nodes fairness in
dynamic ad-hoc network CORE:only positive reports passed unlike confidant Clustering: head monitoring agent and detection
agent Choosing cluster heads based on connectivity,
proximity, resistance to compromise accessibility, processing and storage power
UAV_MBN: UAV and MBN ZBIDS: Zone based intrusion detection system
![Page 6: A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e195503460f94b05cc9/html5/thumbnails/6.jpg)
BUSNet
A virtual mobile backbone infrastructure constructed using public buses.
Virtual infrastructure: Does not require the setup of any physical infrastructure.
can be deployed rapidly into any metropolitan environment with regular public bus service.
Mobile : the main nodes that form the BUSNet backbone are moving buses.
Backbone infrastructure : used to provide a reliable data bus for vehicles to interact with each other over a metropolitan coverage if needed.
![Page 7: A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e195503460f94b05cc9/html5/thumbnails/7.jpg)
BUSNet
![Page 8: A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e195503460f94b05cc9/html5/thumbnails/8.jpg)
IDS based on BUSNet
Three layers: 1. VANETs 2. Buses 3. Access points: road side communication infrastructure ID technique in two categories : 1. Misuse detection: Can find known attacks effectively by
signature comparing 2. Anomaly detection : Effective in finding out unknown
attacks by looking for anomaly means any deviation from normal behavior. But gives more false alarm
Anomaly detection main parts: Feature selection, model of normal behavior and comparison (Explain all of them)
Feature selection : features from routing control messages and data packets. Bus collects the data and transfers to access points
![Page 9: A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e195503460f94b05cc9/html5/thumbnails/9.jpg)
Hierarchical Architecture of BUSNet
![Page 10: A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e195503460f94b05cc9/html5/thumbnails/10.jpg)
Experiments
![Page 11: A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e195503460f94b05cc9/html5/thumbnails/11.jpg)
Experiments
During the simulation
time, Attacks happened 4
times as follows:1. 20-40
2. 80-1003. 140-1804. 260-280
![Page 12: A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e195503460f94b05cc9/html5/thumbnails/12.jpg)
Neural network training and detection results
![Page 13: A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e195503460f94b05cc9/html5/thumbnails/13.jpg)
Detection error: AODV vs. DSDV vs. DSR
![Page 14: A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e195503460f94b05cc9/html5/thumbnails/14.jpg)
Thank You