2018
DOI: 10.1016/j.cose.2018.06.008
|View full text |Cite
|
Sign up to set email alerts
|

Trust aware support vector machine intrusion detection and prevention system in vehicular ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
39
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 76 publications
(39 citation statements)
references
References 11 publications
0
39
0
Order By: Relevance
“…Guo et al [17] propose an approach that verifies information received via V2V in form of an IDS whose results are further used for decision-making. Other solutions on collaborative intrusion detection [28,35] consider only packet headers and parameters, such as packet drop rate and transfer delay, and investigate ways to exchange this information between neighboring vehicles.…”
Section: Related Workmentioning
confidence: 99%
“…Guo et al [17] propose an approach that verifies information received via V2V in form of an IDS whose results are further used for decision-making. Other solutions on collaborative intrusion detection [28,35] consider only packet headers and parameters, such as packet drop rate and transfer delay, and investigate ways to exchange this information between neighboring vehicles.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, several works have been published related to ML for intrusion detection in VANET. For instance, Shams et al [48] proposed an approach combining the promiscuous mode for data collection and SVM for IDS in VANET. They aimed to analyze data to create a trust value for vehicles on the network as trust aware SVM-based IDS.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, new branches of research allow us to innovate such as [33], which takes advantage of the fact that VANETs emissions are made using a modification of network in a promiscuous state to obtain all the data over VANETs and through algorithms of Support Vector Machine (SVM) using for data analysis to establish a shared trust value for every vehicle on the network as Trust Aware SVM-Based IDS (TSIDS). Another example of different technologies for the detection of intrusions in the system is raised in [34], which uses Artificial Neural Network (ANN) trained to be able to detect different types of attacks on networks.…”
Section: Detection and Correction Of Malicious Datamentioning
confidence: 99%