Skip navigation

Many-objective optimization-based intrusion detection for in-vehicle network security

Many-objective optimization-based intrusion detection for in-vehicle network security

Zhang, Jiangjiang, Gong, Bei, Waqas, Muhammad ORCID: 0000-0003-0814-7544, Tu, Shanshan and Chen, Sheng (2023) Many-objective optimization-based intrusion detection for in-vehicle network security. IEEE Transactions on Intelligent Transportation Systems. pp. 1-15. ISSN 1524-9050 (Print), 1558-0016 (Online) (doi:https://doi.org/10.1109/TITS.2023.3296002)

[img]
Preview
PDF (AAM)
44483_WAQAS_Many_objective_optimization_based_intrusion_detection_for_in_vehicle_network_security.pdf - Accepted Version

Download (465kB) | Preview

Abstract

In-vehicle network security plays a vital role in ensuring the secure information transfer between vehicle and Internet. And existing research is still facing great difficulties in balancing the conflicting factors for the in-vehicle network security and hence to improve intrusion detection performance. To challenge this issue, we construct a many-objective intrusion detection model by including information entropy, accuracy, false positive rate and response time of anomaly detection as the four objectives, which represent the key factors influencing intrusion detection performance. We then design an improved intrusion detection algorithm based on many-objective optimization to optimize the detection model parameters. The designed algorithm has double evolutionary selections. Specifically, an improved differential evolutionary operator produces new offspring of the internal population, and a spherical pruning mechanism selects the excellent internal solutions to form the selected pool of the external archive. The second evolutionary selection then produces new offspring of the archive, and an archive selection mechanism of the external archive selects and stores the optimal solutions in the whole detection process. An experiment is performed using a real-world in-vehicle network data set to verify the performance of our proposed model and algorithm. Experimental results obtained demonstrate that our algorithm can respond quickly to attacks and achieve high entropy and detection accuracy as well as very low false positive rate with a good trade-off in the conflicting objective landscape.

Item Type: Article
Uncontrolled Keywords: many-objective optimization; intrusion detection; information entropy; in-vehicle network
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
T Technology > T Technology (General)
Faculty / School / Research Centre / Research Group: Faculty of Engineering & Science
Faculty of Engineering & Science > School of Computing & Mathematical Sciences (CMS)
Last Modified: 18 Oct 2023 09:50
URI: http://gala.gre.ac.uk/id/eprint/44483

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics