C-V2X; Intrusion detection system; Edge computing; Federated deep learning
Abstract :
[en] Intrusion detection systems (IDS) have already demonstrated their effectiveness in detecting various attacks in cellular vehicle-to-everything (C-V2X) networks, especially when using machine learning (ML) techniques. However, it has been shown that generating ML-based models in a centralized way consumes a massive quantity of network resources, such as CPU/memory and bandwidth, which may represent a critical issue in such networks. To avoid this problem, the new concept of Federated Learning (FL) emerged to build ML-based models in a distributed and collaborative way. In such an approach, the set of nodes, e.g., vehicles or gNodeB, collaborate to create a global ML model trained across these multiple decentralized nodes, each one with its respective data samples that are not shared with any other nodes. In this way, FL enables, on the one hand, data privacy since sharing data with a central location is not always feasible and, on the other hand, network overhead reduction. This paper designs a new IDS for C-V2X networks based on FL. It leverages edge computing to not only build a prediction model in a distributed way but also to enable low-latency intrusion detection. Moreover, we build our FL-based IDS on top of the well-known CIC-IDS2018 dataset, which includes the main network attacks. Noting that, we first perform feature engineering on the dataset using the ANOVA method to consider only the most informative features. Simulation results show the efficiency of our system compared to the existing solutions in terms of attack detection accuracy while reducing network resource consumption.
Disciplines :
Computer science
Author, co-author :
Selamnia, Aymene
Brik, Bouziane
Senouci, Sidi-Mohammed
BOUALOUACHE, Abdelwahab ; University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS)
External co-authors :
yes
Language :
English
Title :
Edge Computing enabled Intrusion Detection for C-V2X Networks using Federated Learning
Publication date :
December 2022
Event name :
The 2022 IEEE Global Communications Conference (GLOBECOM)
Event date :
4-8 December 2022
Audience :
International
Main work title :
The 2022 IEEE Global Communications Conference (GLOBECOM)
Peer reviewed :
Peer reviewed
Focus Area :
Security, Reliability and Trust
FnR Project :
FNR14891397 - Intelligent Orchestrated Security And Privacy-aware Slicing For 5g And Beyond Vehicular Networks, 2020 (01/04/2021-31/03/2024) - Thomas Engel
B. Brik, K. Boutiba, and A. Ksentini, "Deep learning for b5g open radio access network: Evolution, survey, case studies, and challenges, " IEEE Open Journal of the Communications Society, vol. 3, pp. 228-250, 2022.
B. Brik, N. Lagraa, Y. Ghamri-Doudane, and A. Lakas, "Finding the most adequate public bus in vehicular clouds, " in 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM), 2016, pp. 67-74.
T. Eddine Toufik Djaidja, B. Brik, S. Mohammed Senouci, and Y. Ghamri-Doudane, "Adaptive resource reservation to survive against adversarial resource selection jamming attacks in 5g nr-v2x distributed mode 2, " in ICC 2022-IEEE International Conference on Communications, 2022, pp. 3406-3411.
F. Sabahi and A. Movaghar, "Intrusion detection: A survey, " in 2008 Third International Conference on Systems and Networks Communications, 2008, pp. 23-26.
H. Bangui and B. Buhnova, "Recent advances in machinelearning driven intrusion detection in transportation: Survey, " Procedia Computer Science, vol. 184, pp. 877-886, 2021.
Z. A. E. Houda, B. Brik, and L. Khoukhi, ""why should i trust your ids?": An explainable deep learning framework for intrusion detection systems in internet of things networks, " IEEE Open Journal of the Communications Society, vol. 3, pp. 1164-1176, 2022.
Z. Abou EI Houda, B. Brik, A. Ksentini, L. Khoukhi, and M. Guizani, "When federated learning meets game theory: A cooperative framework to secure iiot applications on edge computing, " IEEE Transactions on Industrial Informatics, pp. 1-1, 2022.
B. Brik and A. Ksentini, "Toward optimal mec resource dimensioning for a vehicle collision avoidance system: A deep learning approach, " IEEE Network, vol. 35, no. 3, pp. 74-80, 2021.
J. Shu, L. Zhou, W. Zhang, X. Du, and M. Guizani, "Collaborative intrusion detection for vanets: A deep learningbased distributed SDN approach, " IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 7, pp. 4519-4530, 2021.
I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and Y. Bengio, "Generative adversarial networks, " Advances in Neural Information Processing Systems, vol. 3, 06 2014.
H. Sedjelmaci and S.-M. Senouci, "A new intrusion detection framework for vehicular networks, " 2014 IEEE International Conference on Communications (ICC), pp. 538-543, 2014.
G. Creech and J. Hu, "Generation of a new ids test dataset: Time to retire the kdd collection, " in 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013, pp. 4487-4492.
M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, "A detailed analysis of the kdd cup 99 data set, " in 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009, pp. 1-6.
A. Shiravi, H. Shiravi, M. Tavallaee, and A. A. Ghorbani, "Toward developing a systematic approach to generate benchmark datasets for intrusion detection, " Comput. Secur., vol. 31, pp. 357-374, 2012.
G. Creech and J. Hu, "Generation of a new ids test dataset: Time to retire the kdd collection, " 2013 IEEE Wireless Communications and Networking Conference (WCNC), pp. 4487-4492, 2013.
I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, "Toward generating a new intrusion detection dataset and intrusion traffic characterization, " in ICISSP, 2018.
M. Malowidzki, P. Berezi, ski, and M. Mazur, "Network intrusion detection: Half a kingdom for a good dataset, " 2015.
I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, "Toward generating a new intrusion detection dataset and intrusion traffic characterization, " in ICISSP, 2018.
S. Zaman and F. Karray, "Features selection for intrusion detection systems based on support vector machines, " in 2009 6th IEEE Consumer Communications and Networking Conference, 2009, pp. 1-8.
T. Sun, D. Li, and B. Wang, "Decentralized federated averaging, " arXiv preprint arXiv: 2104. 11375, 2021.
L. N. Smith, "Cyclical learning rates for training neural networks, " in 2017 IEEE Winter Conference on Applications of Computer Vision (WACV), 2017, pp. 464-472.
Similar publications
Sorry the service is unavailable at the moment. Please try again later.