• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

使用局部可解释模型无关解释方法(LIME)实现车联网入侵检测的模型可解释性。

Achieving model explainability for intrusion detection in VANETs with LIME.

作者信息

Hassan Fayaz, Yu Jianguo, Syed Zafi Sherhan, Ahmed Nadeem, Reshan Mana Saleh Al, Shaikh Asadullah

机构信息

Beijing Key Laboratory of Work Safety Intelligent Monitoring, School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing, China.

Department of Telecommunication Engineering, Mehran University of Engineering and Technology Jamshoro, Jamshoro, Pakistan.

出版信息

PeerJ Comput Sci. 2023 Jun 22;9:e1440. doi: 10.7717/peerj-cs.1440. eCollection 2023.

DOI:10.7717/peerj-cs.1440
PMID:37409077
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10319271/
Abstract

Vehicular networks (VANETs) are intelligent transport subsystems; vehicles can communicate through a wireless medium in this system. There are many applications of VANETs such as traffic safety and preventing the accident of vehicles. Many attacks affect VANETs communication such as denial of service (DoS) and distributed denial of service (DDoS). In the past few years the number of DoS (denial of service) attacks are increasing, so network security and protection of the communication systems are challenging topics; intrusion detection systems need to be improved to identify these attacks effectively and efficiently. Many researchers are currently interested in enhancing the security of VANETs. Based on intrusion detection systems (IDS), machine learning (ML) techniques were employed to develop high-security capabilities. A massive dataset containing application layer network traffic is deployed for this purpose. Interpretability technique Local interpretable model-agnostic explanations (LIME) technique for better interpretation model functionality and accuracy. Experimental results demonstrate that utilizing a random forest (RF) classifier achieves 100% accuracy, demonstrating its capability to identify intrusion-based threats in a VANET setting. In addition, LIME is applied to the RF machine learning model to explain and interpret the classification, and the performance of machine learning models is evaluated in terms of accuracy, recall, and F1 score.

摘要

车载网络(VANETs)是智能交通子系统;在该系统中车辆可通过无线介质进行通信。VANETs有许多应用,如交通安全和预防车辆事故。许多攻击会影响VANETs通信,如拒绝服务(DoS)和分布式拒绝服务(DDoS)。在过去几年中,DoS(拒绝服务)攻击的数量不断增加,因此网络安全和通信系统保护是具有挑战性的课题;入侵检测系统需要改进以有效且高效地识别这些攻击。目前许多研究人员对增强VANETs的安全性感兴趣。基于入侵检测系统(IDS),采用机器学习(ML)技术来开发高安全能力。为此部署了一个包含应用层网络流量的海量数据集。采用可解释性技术局部可解释模型无关解释(LIME)技术来更好地解释模型功能和准确性。实验结果表明,使用随机森林(RF)分类器可实现100%的准确率,证明其在VANET环境中识别基于入侵的威胁的能力。此外,将LIME应用于RF机器学习模型以解释分类,并根据准确率、召回率和F1分数评估机器学习模型的性能。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39c4/10319271/521b6ed588ee/peerj-cs-09-1440-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39c4/10319271/75dde0e23f24/peerj-cs-09-1440-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39c4/10319271/b944c3c0b02a/peerj-cs-09-1440-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39c4/10319271/b92ee5c7635f/peerj-cs-09-1440-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39c4/10319271/3afee8db2c14/peerj-cs-09-1440-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39c4/10319271/549d820b54a6/peerj-cs-09-1440-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39c4/10319271/71cb875a25e6/peerj-cs-09-1440-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39c4/10319271/3bb28f4a18d9/peerj-cs-09-1440-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39c4/10319271/4af801e1937e/peerj-cs-09-1440-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39c4/10319271/568ac513b852/peerj-cs-09-1440-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39c4/10319271/305273916c86/peerj-cs-09-1440-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39c4/10319271/edb45cd78bf8/peerj-cs-09-1440-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39c4/10319271/521b6ed588ee/peerj-cs-09-1440-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39c4/10319271/75dde0e23f24/peerj-cs-09-1440-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39c4/10319271/b944c3c0b02a/peerj-cs-09-1440-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39c4/10319271/b92ee5c7635f/peerj-cs-09-1440-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39c4/10319271/3afee8db2c14/peerj-cs-09-1440-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39c4/10319271/549d820b54a6/peerj-cs-09-1440-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39c4/10319271/71cb875a25e6/peerj-cs-09-1440-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39c4/10319271/3bb28f4a18d9/peerj-cs-09-1440-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39c4/10319271/4af801e1937e/peerj-cs-09-1440-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39c4/10319271/568ac513b852/peerj-cs-09-1440-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39c4/10319271/305273916c86/peerj-cs-09-1440-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39c4/10319271/edb45cd78bf8/peerj-cs-09-1440-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39c4/10319271/521b6ed588ee/peerj-cs-09-1440-g012.jpg

相似文献

1
Achieving model explainability for intrusion detection in VANETs with LIME.使用局部可解释模型无关解释方法(LIME)实现车联网入侵检测的模型可解释性。
PeerJ Comput Sci. 2023 Jun 22;9:e1440. doi: 10.7717/peerj-cs.1440. eCollection 2023.
2
Advanced machine learning approach for DoS attack resilience in internet of vehicles security.用于车辆互联网安全中抵御拒绝服务攻击的先进机器学习方法。
Heliyon. 2024 Mar 29;10(8):e28844. doi: 10.1016/j.heliyon.2024.e28844. eCollection 2024 Apr 30.
3
RSU-Based Online Intrusion Detection and Mitigation for VANET.基于 RSU 的车联网在线入侵检测与缓解
Sensors (Basel). 2022 Oct 8;22(19):7612. doi: 10.3390/s22197612.
4
An Adaptive Real-Time Malicious Node Detection Framework Using Machine Learning in Vehicular Ad-Hoc Networks (VANETs).基于机器学习的车联网自适应实时恶意节点检测框架。
Sensors (Basel). 2023 Feb 26;23(5):2594. doi: 10.3390/s23052594.
5
Vehicular Network Intrusion Detection Using a Cascaded Deep Learning Approach with Multi-Variant Metaheuristic.基于多变量元启发式的级联深度学习方法的车辆网络入侵检测
Sensors (Basel). 2023 Oct 27;23(21):8772. doi: 10.3390/s23218772.
6
Conditional Tabular Generative Adversarial Based Intrusion Detection System for Detecting Ddos and Dos Attacks on the Internet of Things Networks.基于条件表格生成对抗的物联网网络 DDoS 和 DOS 攻击入侵检测系统。
Sensors (Basel). 2023 Jun 16;23(12):5644. doi: 10.3390/s23125644.
7
A Survey of Security Services, Attacks, and Applications for Vehicular Ad Hoc Networks (VANETs).车载自组织网络(VANETs)的安全服务、攻击及应用综述
Sensors (Basel). 2019 Aug 17;19(16):3589. doi: 10.3390/s19163589.
8
Blockchain-Assisted Privacy-Preserving and Context-Aware Trust Management Framework for Secure Communications in VANETs.用于车载自组网安全通信的区块链辅助隐私保护与上下文感知信任管理框架
Sensors (Basel). 2023 Jun 20;23(12):5766. doi: 10.3390/s23125766.
9
Distributed Denial of Service Attack Detection in Network Traffic Using Deep Learning Algorithm.基于深度学习算法的网络流量分布式拒绝服务攻击检测
Sensors (Basel). 2023 Oct 23;23(20):8642. doi: 10.3390/s23208642.
10
An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks.基于机器学习的物联网网络攻击分类的实验分析。
Sensors (Basel). 2021 Jan 10;21(2):446. doi: 10.3390/s21020446.

引用本文的文献

1
Vision-Language Model-Based Local Interpretable Model-Agnostic Explanations Analysis for Explainable In-Vehicle Controller Area Network Intrusion Detection.基于视觉语言模型的局部可解释模型无关解释分析,用于可解释的车载控制器局域网入侵检测。
Sensors (Basel). 2025 May 10;25(10):3020. doi: 10.3390/s25103020.

本文引用的文献

1
DeepMoney: counterfeit money detection using generative adversarial networks.深度货币:使用生成对抗网络进行假币检测。
PeerJ Comput Sci. 2019 Sep 2;5:e216. doi: 10.7717/peerj-cs.216. eCollection 2019.
2
XAI-Explainable artificial intelligence.可解释人工智能
Sci Robot. 2019 Dec 18;4(37). doi: 10.1126/scirobotics.aay7120.