Many-objective optimization-based intrusion detection for in-vehicle network security
Zhang, Jiangjiang, Gong, Bei, Waqas, Muhammad ORCID: https://orcid.org/0000-0003-0814-7544, Tu, Shanshan and Chen, Sheng (2023) Many-objective optimization-based intrusion detection for in-vehicle network security. IEEE Transactions on Intelligent Transportation Systems. pp. 1-15. ISSN 1524-9050 (Print), 1558-0016 (Online) (doi:10.1109/TITS.2023.3296002)
Preview |
PDF (AAM)
44483_WAQAS_Many_objective_optimization_based_intrusion_detection_for_in_vehicle_network_security.pdf - Accepted Version Download (465kB) | Preview |
Abstract
In-vehicle network security plays a vital role in ensuring the secure information transfer between vehicle and Internet. And existing research is still facing great difficulties in balancing the conflicting factors for the in-vehicle network security and hence to improve intrusion detection performance. To challenge this issue, we construct a many-objective intrusion detection model by including information entropy, accuracy, false positive rate and response time of anomaly detection as the four objectives, which represent the key factors influencing intrusion detection performance. We then design an improved intrusion detection algorithm based on many-objective optimization to optimize the detection model parameters. The designed algorithm has double evolutionary selections. Specifically, an improved differential evolutionary operator produces new offspring of the internal population, and a spherical pruning mechanism selects the excellent internal solutions to form the selected pool of the external archive. The second evolutionary selection then produces new offspring of the archive, and an archive selection mechanism of the external archive selects and stores the optimal solutions in the whole detection process. An experiment is performed using a real-world in-vehicle network data set to verify the performance of our proposed model and algorithm. Experimental results obtained demonstrate that our algorithm can respond quickly to attacks and achieve high entropy and detection accuracy as well as very low false positive rate with a good trade-off in the conflicting objective landscape.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | many-objective optimization; intrusion detection; information entropy; in-vehicle network |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science T Technology > T Technology (General) |
Faculty / School / Research Centre / Research Group: | Faculty of Engineering & Science Faculty of Engineering & Science > School of Computing & Mathematical Sciences (CMS) |
Last Modified: | 18 Oct 2023 09:50 |
URI: | http://gala.gre.ac.uk/id/eprint/44483 |
Actions (login required)
View Item |
Downloads
Downloads per month over past year