Volume 20 No 10 (2022)
 Download PDF
Deep learning-based intrusion detection in vehicular ad hoc networks
Dr.D.kamalakkannnan , Dr. J. RamaDevi , S.Gopakumar , Mubin Shoukat Tamboli , Dr. Manoj Ashok Wakchaure , Chavva Ravi Kishore Reddy
Abstract
In the event that intrusion detection could be flawlessly executed, all distant offices, data centres, and cloud properties would be safeguarded. There would be no disruption to the flow of traffic in any way. The only boundary would be metaphorically the sky.Although intrusion detection systems (IDSs) most commonly act as stand-alone devices, many contemporary and high-end firewalls incorporate IDS features. These more modern forms of protection are used in addition to traditional firewalls, which are primarily concerned with stopping known harmful traffic from accessing the network. They accomplish this by comparing the signatures or "fingerprints" in the network traffic to a larger threat database and finding complex attacks such as ransomware, data exfiltration, and network scanning. This allows them to protect the network more effectively. In many intrusion detection systems (IDSs), there is a feature known as "anomaly detection" that serves as a second layer of security and searches for deviations from regular traffic patterns that may indicate malicious intent. On the other hand, we are able to ensure the safety of intelligent transportation systems thanks to the rapid growth of mobile ad hoc networks and methods of machine learning. The authors of this work come up with an authentication technique in order to maintain the conditional privacy of vehicle users while also guaranteeing the integrity of transmitted communications. This is one of the contributions that they make. Deep learning strategies were utilized in the development of the suggested authentication solution. Researchers use the OMNeT++ application for testing the production of traffic on vehicle ad hoc network segments. Additionally, they use cutting-edge machine learning algorithms to hunt for malicious behaviour inside a specified simulated environment. With the use of this research, it was discovered that DDoS attacks may be identified with an extremely high degree of accuracy
Keywords
Intrusion, Detection, Vehicular Ad hoc Networks, Deep Learning, Deep Learning
Copyright
Copyright © Neuroquantology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.