Skip to main content
Log in

Towards the Development of Realistic DoS Dataset for Intelligent Transportation Systems

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Vehicular ad-hoc networks (VANETs) present security vulnerabilities, which make them prone to diverse cyberattacks. Denial of Service (DoS) is one of the most prevalent and severe cyberattack that targets VANETs. To tackle this cyberattack and mitigate its effect, intrusion detection systems need to be developed. To this end, a realistic and representative dataset is essential to train and validate the systems. This paper proposes a new dataset, VDoS-LRS, which includes legitimate and simulated vehicular network traffic, along with different types of DoS cyberattack. We also present a realistic testbed environment instead of simulators, taking into consideration different environments (urban, highway and rural). In addition, we explore a wide range of traffic features for detecting and classifying vehicular traffic. We evaluate the reliability of the VDoS-LRS dataset using different machine learning algorithms for forensics purposes. The experimental results showed that it is possible to detect effectively different types of DoS cyberattack within diverse environments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Rehman, O. M. H., Bourdoucen, H., & Ould-Khaoua, M. (2015). Forward link quality estimation in VANETs for sender-oriented alert messages broadcast. Journal of Network and Computer Applications, 58, 23–41.

    Google Scholar 

  2. Mihaita, A.-E., Dobre, C., Pop, F., Mavromoustakis, C. X., & Mastorakis, G. (2016). Secure opportunistic vehicle-to-vehicle communication. In C. X. Mavromoustakis, G. Mastorakis, C. Dobre (Eds.), Studies in big data (pp. 229–268). Springer.

  3. Bektache, D., Tolba, C., & Zine, N. G. (2014). Forecasting approach in VANET based on vehicle kinematics for road safety. International Journal of Vehicle Safety, 7(2), 147.

    Google Scholar 

  4. Gadkari, M. Y., & Sambre, N. B. (2012). VANET: Routing protocols, security issues and simulation tools. IOSR Journal of Computer Engineering, 3(3), 28–38.

    Google Scholar 

  5. Malik, A., & Pandey, B. (2018). CIAS: A comprehensive identity authentication scheme for providing security in VANET. International Journal of Information Security and Privacy (IJISP), 12(1), 29–41.

    Google Scholar 

  6. Belenko, V., Krundyshev, V., & Kalinin, M. (2018). Synthetic datasets generation for intrusion detection in VANET. In Proceedings of the 11th international conference on security of information and networks (p. 9). ACM.

  7. Alheeti, K. M. A., Gruebler, A., & McDonald-Maier, K. D. (2015). On the detection of grey hole and rushing attacks in self-driving vehicular networks. In 2015 7th Computer science and electronic engineering conference (CEEC) (pp. 231–236). IEEE.

  8. Grover, J., Prajapati, N. K., Laxmi, V., & Gaur, M. S. (2011). Machine learning approach for multiple misbehavior detection in VANET. In International conference on advances in computing and communications (pp. 644–653). Berlin: Springer.

  9. Singh, P. K., Gupta, R. R., Nandi, S. K., & Nandi, S. (2019). Machine learning based approach to detect wormhole attack in VANETs. In Workshops of the international conference on advanced information networking and applications (pp. 651–661). Cham: Springer.

  10. Singh, P. K., Gupta, S., Vashistha, R., Nandi, S. K., & Nandi, S. (2019). Machine learning based approach to detect position falsification attack in VANETs. In International conference on security and privacy (pp. 166–178). Singapore: Springer.

  11. Hasrouny, H., Samhat, A. E., Bassil, C., & Laouiti, A. (2017). VANet security challenges and solutions: A survey. Vehicular Communications, 7, 7–20.

    Google Scholar 

  12. Quyoom, A., Ali, R., Gouttam, D. N., & Sharma, H. (2015). A novel mechanism of detection of denial of service attack (DoS) in VANET using Malicious and Irrelevant Packet Detection Algorithm (MIPDA). In International conference on computing, communication and automation (pp. 414–419). IEEE.

  13. Aloqaily, M., Otoum, S., Al Ridhawi, I., & Jararweh, Y. (2019). An intrusion detection system for connected vehicles in smart cities. Ad Hoc Networks, 90, 101842.

    Google Scholar 

  14. Anzer, A., & Elhadef, M. (2018). Deep learning-based intrusion detection systems for intelligent vehicular ad hoc networks. In J. J. Park, V. Loia, K.-K. R. Choo, & G. Yi (Eds.), Advanced multimedia and ubiquitous engineering (pp. 109–116). Singapore: Springer.

    Google Scholar 

  15. Gyawali, S., & Qian, Y. (2019). Misbehavior detection using machine learning in vehicular communication networks. In ICC 20192019 IEEE international conference on communications (ICC) (pp. 1–6). IEEE.

  16. Krundyshev, V., Kalinin, M., & Zegzhda, P. (2018). Artificial swarm algorithm for VANET protection against routing attacks. In 2018 IEEE industrial cyber-physical systems (ICPS) (pp. 795–800). IEEE.

  17. Kumar, S., & Mann, K. S. (2018). Detection of multiple malicious nodes using entropy for mitigating the effect of denial of service attack in VANETs. In 2018 4th International conference on computing sciences (ICCS) (pp. 72–79). IEEE.

  18. Lyamin, N., Kleyko, D., Delooz, Q., & Vinel, A. (2019). Real-time jamming DoS detection in safety-critical V2V C-ITS using data mining. IEEE Communications Letters, 23(3), 442–445.

    Google Scholar 

  19. Schmidt, D. A., Khan, M. S., & Bennett, B. T. (2019). Spline based intrusion detection in vehicular ad hoc networks (VANET). arXiv preprint arXiv:1903.08018.

  20. Tomandl, A., Fuchs, K. P., & Federrath, H. (2014). REST-Net: A dynamic rule-based IDS for VANETs. In 2014 7th IFIP wireless and mobile networking conference (WMNC) (pp. 1–8). IEEE.

  21. Kdd.ics.uci.edu. (1999). KDD cup 1999 data. Retrieved August 15, 2019, from http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.

  22. Analysis, C. (2019). Data collection, curation and sharing. [online] CAIDA. Retrieved August 15. 2019, from https://www.caida.org/data/.

  23. Unb.ca. (2019). NSL-KDD | Datasets | Research | Canadian Institute for Cybersecurity | UNB. Retrieved August 15, 2019, from https://www.unb.ca/cic/datasets/nsl.html.

  24. Iscx.ca. (2019). DatasetsISCX. Retrieved August 15, 2019, from http://www.iscx.ca/datasets/.

  25. Cicids.ca. (2019). IDS 2017 | Datasets | Research | Canadian Institute for Cybersecurity | UNB. Retrieved August 15, 2019, from https://www.unb.ca/cic/datasets/ids-2017.html.

  26. Unsw.adfa.edu.au. (2019). The UNSW-NB15 data set description. Retrieved August 15, 2019, from https://www.unsw.adfa.edu.au/unsw-canberra-cyber/cybersecurity/ADFA-NB15-Datasets/.

  27. ns-3. (2019). ns-3. Retrieved August 15, 2019, from https://www.nsnam.org/.

  28. Nsl.cs.nctu.edu.tw. (2019). EstiNet Network Simulator and Emulator (NCTUns). Retrieved August 15, 2019, from http://nsl.cs.nctu.edu.tw/NSL/nctuns.html.

  29. Nagle, D. (2019). Packet senderFree utility to for sending/receiving of network packets. TCP, UDP, SSL. [online] Packetsender.com. Retrieved August 15, 2019, from https://packetsender.com/.

  30. Wireshark.org. (2019). Wireshark · Go Deep. Retrieved August 15, 2019, from https://www.wireshark.org/.

  31. Netflowmeter.ca. (2019). NetFlowMeter. Retrieved August 15, 2019, from http://netflowmeter.ca/.

  32. Lashkari, A. H., Kadir, A. F. A., Gonzalez, H., Mbah, K. F., & Ghorbani, A. A. (2017). Towards a network-based framework for android malware detection and characterization. In 2017 15th Annual conference on privacy, security and trust (PST) (pp. 233–23309). IEEE.

  33. Raschka, S. (2019). Sequential feature selectormlxtend. [online] Rasbt.github.io. Retrieved August 15, 2019, from http://rasbt.github.io/mlxtend/user_guide/feature_selection/SequentialFeatureSelector/.

  34. Scikit-learn.org. (2019). 1.13. Feature selectionscikit-learn 0.21.3 documentation. Retrieved August 15, 2019, from https://scikit-learn.org/stable/modules/feature_selection.html#l1-based-feature-selection.

  35. Mitchell, T. M. (1997). Machine learning (1st ed.). New York, NY: McGraw-Hill, Inc.

    MATH  Google Scholar 

  36. Cortes, C., & Vapnik, V. (1995). Support-vector networks. Machine Learning, 20(3), 273–297.

    MATH  Google Scholar 

  37. Tan, S. (2005). Neighbor-weighted k-nearest neighbor for unbalanced text corpus. Expert Systems with Applications, 28(4), 667–671.

    Google Scholar 

  38. Breiman, L. (2017). Classification and regression trees. Abingdon: Routledge.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rabah Rahal.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rahal, R., Amara Korba, A. & Ghoualmi-Zine, N. Towards the Development of Realistic DoS Dataset for Intelligent Transportation Systems. Wireless Pers Commun 115, 1415–1444 (2020). https://doi.org/10.1007/s11277-020-07635-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07635-1

Keywords

Navigation