Hybrid Algorithm to Detect DDoS Attacks in VANETs

Security and safety are fundamental issues in any wireless network. The problem becomes serious when the specified network is Vehicular Adhoc Network (VANET). VANET faces Distributed Denial of Service (DDoS) attacks, when several vehicles carry out various types of Denial of Service (DoS) attacks to...

Full description

Saved in:
Bibliographic Details
Published inWireless personal communications Vol. 114; no. 4; pp. 3613 - 3634
Main Authors Adhikary, Kaushik, Bhushan, Shashi, Kumar, Sunil, Dutta, Kamlesh
Format Journal Article
LanguageEnglish
Published New York Springer US 01.10.2020
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN0929-6212
1572-834X
DOI10.1007/s11277-020-07549-y

Cover

Abstract Security and safety are fundamental issues in any wireless network. The problem becomes serious when the specified network is Vehicular Adhoc Network (VANET). VANET faces Distributed Denial of Service (DDoS) attacks, when several vehicles carry out various types of Denial of Service (DoS) attacks to disrupt the normal functioning of network, thereby endangering human lives. A highly efficient and reliable algorithm is required to be developed to detect and prevent DDoS attacks in VANET. This paper presents a hybrid detection algorithm based on the SVM kernel methods of AnovaDot and RBFDot for detecting DDoS attacks in VANETs. In this hybrid algorithm, features like collisions, packet drop, jitter etc. have been used to simulate real time network communication scenario where the network is operating under normal conditions, as well as under DDoS attacks. These features are used both for training and for testing the model based on the proposed hybrid algorithm. The performance of the model based on the proposed hybrid algorithm is compared with the models based on single SVM kernel algorithms AnovaDot and RBFDot based on Accuracy, Gini, KS, MER and H. The experimental results show that the model based on the proposed hybrid algorithm is superior to detect DDoS attacks as compared to the models based on single SVM kernel algorithms AnovaDot and RBFDot. The results also prove that by combining the the SVM kernel algorithms, an efficient and effective hybrid algorithm can be developed.
AbstractList Security and safety are fundamental issues in any wireless network. The problem becomes serious when the specified network is Vehicular Adhoc Network (VANET). VANET faces Distributed Denial of Service (DDoS) attacks, when several vehicles carry out various types of Denial of Service (DoS) attacks to disrupt the normal functioning of network, thereby endangering human lives. A highly efficient and reliable algorithm is required to be developed to detect and prevent DDoS attacks in VANET. This paper presents a hybrid detection algorithm based on the SVM kernel methods of AnovaDot and RBFDot for detecting DDoS attacks in VANETs. In this hybrid algorithm, features like collisions, packet drop, jitter etc. have been used to simulate real time network communication scenario where the network is operating under normal conditions, as well as under DDoS attacks. These features are used both for training and for testing the model based on the proposed hybrid algorithm. The performance of the model based on the proposed hybrid algorithm is compared with the models based on single SVM kernel algorithms AnovaDot and RBFDot based on Accuracy, Gini, KS, MER and H. The experimental results show that the model based on the proposed hybrid algorithm is superior to detect DDoS attacks as compared to the models based on single SVM kernel algorithms AnovaDot and RBFDot. The results also prove that by combining the the SVM kernel algorithms, an efficient and effective hybrid algorithm can be developed.
Author Adhikary, Kaushik
Dutta, Kamlesh
Bhushan, Shashi
Kumar, Sunil
Author_xml – sequence: 1
  givenname: Kaushik
  orcidid: 0000-0001-6514-0395
  surname: Adhikary
  fullname: Adhikary, Kaushik
  email: kaushik.nith@gmail.com
  organization: I.K.G. Punjab Technical University
– sequence: 2
  givenname: Shashi
  surname: Bhushan
  fullname: Bhushan, Shashi
  organization: Chandigarh Engineering College
– sequence: 3
  givenname: Sunil
  surname: Kumar
  fullname: Kumar, Sunil
  organization: Maharaja Agarsen University
– sequence: 4
  givenname: Kamlesh
  surname: Dutta
  fullname: Dutta, Kamlesh
  organization: National Institute of Technology
BookMark eNp9kEFLwzAUx4NMcE6_gKeA5-hL0jbJsWzTCUMPTvEW2jSdnVszk-zQb2-1guBhpweP_-__Hr9zNGpdaxG6onBDAcRtoJQJQYABAZEminQnaExTwYjkydsIjUExRTJG2Rk6D2ED0GOKjRFddKVvKpxv18438X2Ho8MzG62JeDZzzziPsTAfATctfs0f56twgU7rYhvs5e-coJe7-Wq6IMun-4dpviSGUxVJWTGqEuCFAWsgsVJkwsjMMqgFpIbypE5lai0vU5bWyvbLipaVVCXNwFLJJ-h66N1793mwIeqNO_i2P6lZIrgEqljWp-SQMt6F4G2tTROL2Lg2-qLZagr6W5AeBOlekP4RpLseZf_QvW92he-OQ3yAQh9u19b_fXWE-gKsRHhg
CitedBy_id crossref_primary_10_3390_sym13020227
crossref_primary_10_1016_j_iot_2023_100809
crossref_primary_10_1016_j_micpro_2022_104726
crossref_primary_10_1007_s11277_024_11525_1
crossref_primary_10_3390_electronics12040894
crossref_primary_10_3390_s22197612
crossref_primary_10_1007_s00607_022_01072_7
crossref_primary_10_1109_TVT_2023_3244077
crossref_primary_10_1016_j_adhoc_2022_103026
crossref_primary_10_1109_ACCESS_2025_3552544
crossref_primary_10_1016_j_vehcom_2024_100787
crossref_primary_10_1155_2022_4725805
crossref_primary_10_35193_bseufbd_1102897
crossref_primary_10_3390_app11104682
crossref_primary_10_3390_math10214030
crossref_primary_10_1155_2021_8891758
crossref_primary_10_37394_23209_2022_19_1
crossref_primary_10_3390_app13074591
crossref_primary_10_29130_dubited_1372131
crossref_primary_10_3390_fi16060185
crossref_primary_10_1002_spy2_433
crossref_primary_10_1049_itr2_12504
crossref_primary_10_3103_S0146411624700986
crossref_primary_10_1109_JIOT_2022_3199712
crossref_primary_10_3390_electronics10192403
crossref_primary_10_1007_s10723_024_09747_5
crossref_primary_10_20473_jisebi_9_2_136_146
crossref_primary_10_1016_j_compeleceng_2024_109448
crossref_primary_10_3390_electronics12081757
crossref_primary_10_1109_JAS_2021_1003862
crossref_primary_10_1007_s42979_024_02603_z
Cites_doi 10.1007/s11277-017-4663-8
10.1007/s10994-009-5119-5
10.1016/j.vehcom.2018.04.005
10.35940/ijitee.E2652.039520
10.1145/2695664.2695844
10.1109/ICROIT.2014.6798334
10.1109/COMST.2018.2873088
10.1016/bs.adcom.2018.03.010
10.1016/j.jnca.2013.02.036
10.17485/ijst/2016/v9i47/106865
10.1016/j.comnet.2019.04.027
10.1016/j.adhoc.2018.10.002
10.1007/s11277-019-06864-3
10.1109/JSAC.2011.110308
10.1002/jae.1278
10.1016/j.vehcom.2019.100182
10.1007/s11277-019-07022-5
10.1109/VTCFall.2015.7391111
10.1007/s11277-018-5804-4
10.1016/j.procs.2015.03.174
10.1007/s11235-010-9400-5
10.1016/j.adhoc.2017.03.006
10.1109/JSAC.2007.071006
10.1109/ICONSTEM.2016.7560946
10.1142/S0219720015500055
10.1007/s11277-013-1161-5
10.1016/j.camwa.2009.01.038
10.1007/978-3-642-34478-7_65
10.1016/S1005-8885(08)60108-9
10.1186/s13677-017-0102-3
10.1155/2015/745303
10.1109/EISIC.2011.19
10.1029/JB076i008p01905
10.1016/j.vehcom.2019.100164
10.1016/j.eswa.2015.07.015
10.1016/j.eswa.2011.06.013
10.1007/s11277-020-07395-y
10.1007/s11277-017-4643-z
ContentType Journal Article
Copyright Springer Science+Business Media, LLC, part of Springer Nature 2020
Springer Science+Business Media, LLC, part of Springer Nature 2020.
Copyright_xml – notice: Springer Science+Business Media, LLC, part of Springer Nature 2020
– notice: Springer Science+Business Media, LLC, part of Springer Nature 2020.
DBID AAYXX
CITATION
JQ2
DOI 10.1007/s11277-020-07549-y
DatabaseName CrossRef
ProQuest Computer Science Collection
DatabaseTitle CrossRef
ProQuest Computer Science Collection
DatabaseTitleList
ProQuest Computer Science Collection
DeliveryMethod fulltext_linktorsrc
Discipline Journalism & Communications
Engineering
EISSN 1572-834X
EndPage 3634
ExternalDocumentID 10_1007_s11277_020_07549_y
GroupedDBID -5B
-5G
-BR
-EM
-Y2
-~C
.4S
.86
.DC
.VR
06D
0R~
0VY
123
1N0
1SB
2.D
203
28-
29R
29~
2J2
2JN
2JY
2KG
2KM
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5QI
5VS
67Z
6NX
8TC
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTD
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACREN
ACZOJ
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADMLS
ADRFC
ADTPH
ADURQ
ADYFF
ADYOE
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEGXH
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFGCZ
AFLOW
AFQWF
AFWTZ
AFYQB
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMTXH
AMXSW
AMYLF
AMYQR
AOCGG
ARCEE
ARCSS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
BA0
BBWZM
BDATZ
BGNMA
BSONS
CAG
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
EBLON
EBS
EDO
EIOEI
EJD
ESBYG
FD6
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GQ8
GXS
H13
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I-F
I09
IHE
IJ-
IKXTQ
ITG
ITH
ITM
IWAJR
IXC
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
KDC
KOV
KOW
LAK
LLZTM
M4Y
MA-
N2Q
N9A
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
OVD
P19
P9P
PF0
PT4
PT5
QOK
QOS
R4E
R89
R9I
RHV
RIG
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCLPG
SCV
SDH
SDM
SEG
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TEORI
TSG
TSK
TSV
TUC
TUS
U2A
U5U
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z7R
Z7S
Z7X
Z7Z
Z81
Z83
Z88
Z8M
Z8N
Z8R
Z8T
Z8U
Z8W
Z92
ZMTXR
_50
~A9
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
ADHKG
AEZWR
AFDZB
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
JQ2
ID FETCH-LOGICAL-c319t-bd219403ac0ec04e8767c86e20f705c134f585ee3b525f9e705d1bd89b160e183
IEDL.DBID U2A
ISSN 0929-6212
IngestDate Thu Sep 25 00:47:31 EDT 2025
Wed Oct 01 03:57:36 EDT 2025
Thu Apr 24 22:58:40 EDT 2025
Fri Feb 21 02:40:27 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 4
Keywords VANETs
SVM kernels
DDoS attacks
DDoS attack detection
Hybrid algorithm
Machine learning
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c319t-bd219403ac0ec04e8767c86e20f705c134f585ee3b525f9e705d1bd89b160e183
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-6514-0395
PQID 2473801926
PQPubID 2043826
PageCount 22
ParticipantIDs proquest_journals_2473801926
crossref_citationtrail_10_1007_s11277_020_07549_y
crossref_primary_10_1007_s11277_020_07549_y
springer_journals_10_1007_s11277_020_07549_y
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2020-10-01
PublicationDateYYYYMMDD 2020-10-01
PublicationDate_xml – month: 10
  year: 2020
  text: 2020-10-01
  day: 01
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
– name: Dordrecht
PublicationSubtitle An International Journal
PublicationTitle Wireless personal communications
PublicationTitleAbbrev Wireless Pers Commun
PublicationYear 2020
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References Adhikary, Bhushan, Kumar, Dutta (CR41) 2020; 5
Islabudeen, Kavitha Devi (CR12) 2020; 112
CR31
Ayyappan, Mohan Kumar (CR2) 2016; 2016
Hui Yang, Chuan Wang (CR37) 2008; 15
Sharanya, Karthikeyan (CR45) 2017; 12
CR3
Sharma, Kaul (CR34) 2018; 12
Sakiz, Sen (CR35) 2017; 61
Zeadally, Hunt, Chen, Irwin, Hassan (CR20) 2012; 50
CR43
Ravale, Marathe, Padiya (CR44) 2015; 45
Adhikary, Bhushan, Kumar (CR29) 2019; 12
Zhou, Choudhury, Ning, Chakrabarty (CR24) 2011; 29
Kumar, Dutta (CR11) 2018; 101
Ahmed, Elfeshawy, Elzoghdy, El-sayed, Faragallah (CR14) 2017; 97
Rampaul, Kumar Patial, Kumar (CR17) 2016; 9
Racine (CR47) 2012; 27
Van Der Heijden, Dietzel, Leinmüller, Kargl (CR36) 2019; 21
Sivatha Sindhu, Geetha, Kannan (CR40) 2012; 39
CR19
Kaur, Kaur, Mahajan (CR16) 2017; 97
Singh, Kumar, Singla (CR32) 2015; 42
Hand (CR49) 2009; 77
Ho, Hua (CR5) 2010; 25
CR10
Loukas, Karapistoli, Panaousis, Sarigiannidis, Bezemskij, Vuong (CR28) 2019; 84
Abusitta, Bellaiche, Dagenais (CR33) 2018; 7
Kim (CR8) 2018; 111
Sarkar, Sana (CR39) 2009; 58
Raya, Papadimitratos, Aad, Jungels, Hubaux (CR21) 2007; 25
Al-Sultan, Al-Doori, Al-Bayatti, Zedan (CR4) 2014; 37
Pathre, Agrawal, Jain (CR22) 2013; 4
Sharma, Kaushik (CR27) 2019; 20
Ghazy, El-Rabaie, Dessouky, El-Fishawy, El-Samie (CR13) 2020; 111
Hardy (CR46) 1971; 76
Bouk, Ahmed, Kim (CR9) 2015; 13–17
Verma, Hasbullah, Kumar (CR15) 2013; 73
Rana, Sharma, Bhattacharya, Shukla (CR48) 2015; 13
Shabbir, Khan, Khan, Saqib (CR18) 2017; 2016
CR23
Liang, Li, Zhang, Wang, Bie (CR1) 2015; 2015
Kait, Chauhan (CR7) 2011; 1
Adhikary, Bhushan (CR25) 2017; 2017
Agrawal, Gupta, Jain (CR30) 2011; 2011
Hosseini, Azizi (CR42) 2019; 158
Singh, Nandi, Nandi (CR26) 2019; 18
Kale, Choudhari (CR38) 2014; 14
Saha, Roy, Sinha (CR6) 2013; 3
A Pathre (7549_CR22) 2013; 4
YH Ho (7549_CR5) 2010; 25
7549_CR19
PK Singh (7549_CR26) 2019; 18
R Kait (7549_CR7) 2011; 1
K Adhikary (7549_CR41) 2020; 5
S Kim (7549_CR8) 2018; 111
DJ Hand (7549_CR49) 2009; 77
RL Hardy (7549_CR46) 1971; 76
7549_CR10
S Sharanya (7549_CR45) 2017; 12
PS Rana (7549_CR48) 2015; 13
S Hosseini (7549_CR42) 2019; 158
B Ayyappan (7549_CR2) 2016; 2016
K Adhikary (7549_CR29) 2019; 12
M Hui Yang (7549_CR37) 2008; 15
S Sharma (7549_CR27) 2019; 20
S Kumar (7549_CR11) 2018; 101
PK Agrawal (7549_CR30) 2011; 2011
D Rampaul (7549_CR17) 2016; 9
7549_CR43
S Saha (7549_CR6) 2013; 3
M Raya (7549_CR21) 2007; 25
P Kaur (7549_CR16) 2017; 97
F Sakiz (7549_CR35) 2017; 61
S Zeadally (7549_CR20) 2012; 50
K Adhikary (7549_CR25) 2017; 2017
K Verma (7549_CR15) 2013; 73
7549_CR31
S Sharma (7549_CR34) 2018; 12
7549_CR3
M Shabbir (7549_CR18) 2017; 2016
R Singh (7549_CR32) 2015; 42
T Zhou (7549_CR24) 2011; 29
U Ravale (7549_CR44) 2015; 45
SS Sivatha Sindhu (7549_CR40) 2012; 39
S Al-Sultan (7549_CR4) 2014; 37
JS Racine (7549_CR47) 2012; 27
W Liang (7549_CR1) 2015; 2015
M Kale (7549_CR38) 2014; 14
SH Bouk (7549_CR9) 2015; 13–17
HI Ahmed (7549_CR14) 2017; 97
7549_CR23
A Abusitta (7549_CR33) 2018; 7
RW Van Der Heijden (7549_CR36) 2019; 21
M Islabudeen (7549_CR12) 2020; 112
RA Ghazy (7549_CR13) 2020; 111
G Loukas (7549_CR28) 2019; 84
BK Sarkar (7549_CR39) 2009; 58
References_xml – volume: 101
  start-page: 2029
  issue: 4
  year: 2018
  end-page: 2052
  ident: CR11
  article-title: Trust based intrusion detection technique to detect selfish nodes in mobile ad hoc networks
  publication-title: Wireless Personal Communications
– volume: 97
  start-page: 2939
  issue: 2
  year: 2017
  end-page: 2950
  ident: CR16
  article-title: Wormhole attack detection technique in mobile ad hoc networks
  publication-title: Wireless Personal Communications
– volume: 77
  start-page: 103
  issue: 1
  year: 2009
  end-page: 123
  ident: CR49
  article-title: Measuring classifier performance: A coherent alternative to the area under the ROC curve
  publication-title: Machine Learning
– volume: 12
  start-page: 138
  issue: April
  year: 2018
  end-page: 164
  ident: CR34
  article-title: A survey on Intrusion detection systems and honeypot based proactive security mechanisms in VANETs and VANET Cloud
  publication-title: Vehicular Communications
– volume: 29
  start-page: 582
  issue: 3
  year: 2011
  end-page: 594
  ident: CR24
  article-title: P2DAP & #x2014; sybil attacks detection in vehicular ad hoc networks
  publication-title: IEEE Journal on Selected Areas in Communications
– volume: 20
  start-page: 100182
  year: 2019
  ident: CR27
  article-title: A survey on internet of vehicles: Applications, security issues and solutions
  publication-title: Vehicular Communications
– ident: CR19
– volume: 2017
  start-page: 564
  year: 2017
  end-page: 569
  ident: CR25
  article-title: “Recent techniques used for preventing DOS attacks in VANETs
  publication-title: Proceeding—IEEE International Conference on Computing, Communication and Automation ICCCA
– volume: 13
  start-page: 1550005
  issue: 2
  year: 2015
  ident: CR48
  article-title: Quality assessment of modeled protein structure using physicochemical properties
  publication-title: Journal of Bioinformatics and Computational Biology
– volume: 42
  start-page: 8609
  issue: 22
  year: 2015
  end-page: 8624
  ident: CR32
  article-title: An intrusion detection system using network traffic profiling and online sequential extreme learning machine
  publication-title: Expert Systems with Applications
– volume: 58
  start-page: 65
  issue: 1
  year: 2009
  end-page: 73
  ident: CR39
  article-title: A hybrid approach to design efficient learning classifiers
  publication-title: Computers and Mathematics with Applications
– volume: 111
  start-page: 43
  year: 2018
  end-page: 68
  ident: CR8
  article-title: Blockchain for a trust network among intelligent vehicles
  publication-title: Advances in Computers
– volume: 14
  start-page: 122
  issue: 7
  year: 2014
  ident: CR38
  article-title: DDOS attack detection based on an ensemble of neural classifier
  publication-title: International Journal of Computer Science and Network Security (IJCSNS)
– volume: 39
  start-page: 129
  issue: 1
  year: 2012
  end-page: 141
  ident: CR40
  article-title: Decision tree based light weight intrusion detection using a wrapper approach
  publication-title: Expert Systems with applications
– volume: 5
  start-page: 669
  year: 2020
  end-page: 675
  ident: CR41
  article-title: Decision tree and neural network based hybrid algorithm for detecting and preventing Ddos attacks in VANETS
  publication-title: International Journal of Innovative Technology and Exploring Engineering
– volume: 61
  start-page: 33
  year: 2017
  end-page: 50
  ident: CR35
  article-title: A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV
  publication-title: Ad Hoc Networks
– volume: 9
  start-page: 1
  issue: 47
  year: 2016
  end-page: 6
  ident: CR17
  article-title: Detection of DoS attack in VANETs
  publication-title: Indian Journal of Science and Technology
– volume: 111
  start-page: 375
  issue: 1
  year: 2020
  end-page: 393
  ident: CR13
  article-title: Feature selection ranking and subset-based techniques with different classifiers for intrusion detection
  publication-title: Wireless Personal Communications
– volume: 25
  start-page: 336
  issue: 8
  year: 2010
  end-page: 339
  ident: CR5
  article-title: Failure-resilient vehicular networks
  publication-title: In 35th Annual IEEE Conference on Local Computer Networks, LCN
– volume: 18
  start-page: 100164
  year: 2019
  ident: CR26
  article-title: A tutorial survey on vehicular communication state of the art, and future research directions
  publication-title: Vehicular Communications
– volume: 2016
  start-page: 970
  year: 2017
  end-page: 974
  ident: CR18
  article-title: Detection and prevention of distributed denial of service attacks in VANETs
  publication-title: In 2016 International Conference on Computational Science and Computational Intelligence (CSCI)
– volume: 2011
  start-page: 178
  year: 2011
  end-page: 182
  ident: CR30
  article-title: SVM based scheme for predicting number of zombies in a DDoS attack
  publication-title: Proceeding 2011 European Intelligence and Security Informatics Conference EISIC
– ident: CR43
– volume: 1
  start-page: 53
  year: 2011
  end-page: 61
  ident: CR7
  article-title: Networks on road—challenges in securing vehicular Adhoc networks
  publication-title: An International Journal of Engineering Sciences
– volume: 4
  start-page: 1
  issue: 6
  year: 2013
  end-page: 5
  ident: CR22
  article-title: Identification of malicious vehicle in vanet environment from Ddos attack
  publication-title: Journal of Global Research in Computer Science
– volume: 50
  start-page: 217
  issue: 4
  year: 2012
  end-page: 241
  ident: CR20
  article-title: Vehicular ad hoc networks (VANETS): Status, results, and challenges
  publication-title: Telecommunication Systems
– volume: 21
  start-page: 779
  issue: 1
  year: 2019
  end-page: 811
  ident: CR36
  article-title: Survey on misbehavior detection in cooperative intelligent transportation systems
  publication-title: IEEE Communications Surveys and Tutorials
– volume: 97
  start-page: 3097
  issue: 2
  year: 2017
  end-page: 3112
  ident: CR14
  article-title: A neural network-based learning algorithm for intrusion detection systems
  publication-title: Wireless Personal Communications
– volume: 25
  start-page: 1557
  issue: 8
  year: 2007
  end-page: 1568
  ident: CR21
  article-title: Eviction of misbehaving and faulty nodes in vehicular networks
  publication-title: IEEE Journal on Selected Areas in Communications
– volume: 37
  start-page: 380
  issue: 1
  year: 2014
  end-page: 392
  ident: CR4
  article-title: A comprehensive survey on vehicular ad hoc network
  publication-title: Journal of Network and Computer Applications
– ident: CR10
– volume: 158
  start-page: 35
  year: 2019
  end-page: 45
  ident: CR42
  article-title: The hybrid technique for DDoS detection with supervised learning algorithms
  publication-title: Computer Networks
– volume: 3
  start-page: 1221
  issue: 9
  year: 2013
  end-page: 1228
  ident: CR6
  article-title: VANET simulation in diffrent indian city scenario
  publication-title: Advance in Electronic and Electric Engineering, ISSN
– volume: 112
  start-page: 193
  issue: 1
  year: 2020
  end-page: 224
  ident: CR12
  article-title: A smart approach for intrusion detection and prevention system in mobile ad hoc networks against security attacks
  publication-title: Wireless Personal Communications
– volume: 15
  start-page: 59
  issue: 3
  year: 2008
  end-page: 63
  ident: CR37
  article-title: DDoS detection based on wavelet kernel support vector machine
  publication-title: The Journal of China Universities of Posts and Telecommunications
– ident: CR23
– volume: 12
  start-page: 478
  issue: 5
  year: 2019
  end-page: 486
  ident: CR29
  article-title: Evaluating the performance of various machine learning algorithms for detecting DDOS attacks in vanets
  publication-title: International Journal of Control Automation
– volume: 7
  start-page: 1
  issue: 1
  year: 2018
  end-page: 18
  ident: CR33
  article-title: An SVM-based framework for detecting DoS attacks in virtualized clouds under changing environment
  publication-title: Journal of Cloud Computing
– volume: 73
  start-page: 95
  issue: 1
  year: 2013
  end-page: 126
  ident: CR15
  article-title: Prevention of DoS attacks in VANET
  publication-title: Wireless Personal Communications.
– volume: 2016
  start-page: 177
  year: 2016
  end-page: 180
  ident: CR2
  article-title: Vehicular ad hoc networks (VANET): Architectures, methodologies and design issues
  publication-title: 2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM).
– ident: CR3
– volume: 76
  start-page: 1905
  issue: 8
  year: 1971
  end-page: 1915
  ident: CR46
  article-title: Multiquadric equations of topography and other irregular surfaces
  publication-title: Journal of Geophysical Research
– ident: CR31
– volume: 27
  start-page: 167
  issue: 1
  year: 2012
  end-page: 172
  ident: CR47
  article-title: RSTUDIO: A platform-independent IDE for R and sweave
  publication-title: Journal of Applied Econometrics
– volume: 2015
  start-page: 745303
  year: 2015
  ident: CR1
  article-title: Vehicular ad hoc networks: Architectures, research issues, methodologies, challenges, and trends
  publication-title: International Journal of Distributed Sensor Networks
– volume: 45
  start-page: 428
  year: 2015
  end-page: 435
  ident: CR44
  article-title: Feature selection based hybrid anomaly intrusion detection system using K Means and RBF kernel function
  publication-title: Procedia Computer Science
– volume: 84
  start-page: 124
  year: 2019
  end-page: 147
  ident: CR28
  article-title: A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles
  publication-title: Ad Hoc Networks
– volume: 13–17
  start-page: 695
  year: 2015
  end-page: 700
  ident: CR9
  article-title: Vehicular content centric network (VCCN): a survey and research challenges
  publication-title: Proceedings of the 30th Annual ACM Symposium on Applied Computing
– volume: 12
  start-page: 171
  issue: 1
  year: 2017
  end-page: 176
  ident: CR45
  article-title: Classifying malicious nodes in VANETs using support vector machines with modified fading memory
  publication-title: ARPN Journal of Engineering and Applied Sciences
– volume: 3
  start-page: 1221
  issue: 9
  year: 2013
  ident: 7549_CR6
  publication-title: Advance in Electronic and Electric Engineering, ISSN
– volume: 97
  start-page: 3097
  issue: 2
  year: 2017
  ident: 7549_CR14
  publication-title: Wireless Personal Communications
  doi: 10.1007/s11277-017-4663-8
– volume: 77
  start-page: 103
  issue: 1
  year: 2009
  ident: 7549_CR49
  publication-title: Machine Learning
  doi: 10.1007/s10994-009-5119-5
– volume: 4
  start-page: 1
  issue: 6
  year: 2013
  ident: 7549_CR22
  publication-title: Journal of Global Research in Computer Science
– volume: 12
  start-page: 138
  issue: April
  year: 2018
  ident: 7549_CR34
  publication-title: Vehicular Communications
  doi: 10.1016/j.vehcom.2018.04.005
– volume: 5
  start-page: 669
  year: 2020
  ident: 7549_CR41
  publication-title: International Journal of Innovative Technology and Exploring Engineering
  doi: 10.35940/ijitee.E2652.039520
– volume: 13–17
  start-page: 695
  year: 2015
  ident: 7549_CR9
  publication-title: Proceedings of the 30th Annual ACM Symposium on Applied Computing
  doi: 10.1145/2695664.2695844
– volume: 2017
  start-page: 564
  year: 2017
  ident: 7549_CR25
  publication-title: Proceeding—IEEE International Conference on Computing, Communication and Automation ICCCA
– ident: 7549_CR23
  doi: 10.1109/ICROIT.2014.6798334
– volume: 21
  start-page: 779
  issue: 1
  year: 2019
  ident: 7549_CR36
  publication-title: IEEE Communications Surveys and Tutorials
  doi: 10.1109/COMST.2018.2873088
– volume: 111
  start-page: 43
  year: 2018
  ident: 7549_CR8
  publication-title: Advances in Computers
  doi: 10.1016/bs.adcom.2018.03.010
– volume: 12
  start-page: 171
  issue: 1
  year: 2017
  ident: 7549_CR45
  publication-title: ARPN Journal of Engineering and Applied Sciences
– volume: 1
  start-page: 53
  year: 2011
  ident: 7549_CR7
  publication-title: An International Journal of Engineering Sciences
– volume: 37
  start-page: 380
  issue: 1
  year: 2014
  ident: 7549_CR4
  publication-title: Journal of Network and Computer Applications
  doi: 10.1016/j.jnca.2013.02.036
– volume: 9
  start-page: 1
  issue: 47
  year: 2016
  ident: 7549_CR17
  publication-title: Indian Journal of Science and Technology
  doi: 10.17485/ijst/2016/v9i47/106865
– volume: 158
  start-page: 35
  year: 2019
  ident: 7549_CR42
  publication-title: Computer Networks
  doi: 10.1016/j.comnet.2019.04.027
– volume: 12
  start-page: 478
  issue: 5
  year: 2019
  ident: 7549_CR29
  publication-title: International Journal of Control Automation
– volume: 84
  start-page: 124
  year: 2019
  ident: 7549_CR28
  publication-title: Ad Hoc Networks
  doi: 10.1016/j.adhoc.2018.10.002
– volume: 111
  start-page: 375
  issue: 1
  year: 2020
  ident: 7549_CR13
  publication-title: Wireless Personal Communications
  doi: 10.1007/s11277-019-06864-3
– volume: 29
  start-page: 582
  issue: 3
  year: 2011
  ident: 7549_CR24
  publication-title: IEEE Journal on Selected Areas in Communications
  doi: 10.1109/JSAC.2011.110308
– volume: 27
  start-page: 167
  issue: 1
  year: 2012
  ident: 7549_CR47
  publication-title: Journal of Applied Econometrics
  doi: 10.1002/jae.1278
– volume: 2016
  start-page: 970
  year: 2017
  ident: 7549_CR18
  publication-title: In 2016 International Conference on Computational Science and Computational Intelligence (CSCI)
– ident: 7549_CR10
– volume: 20
  start-page: 100182
  year: 2019
  ident: 7549_CR27
  publication-title: Vehicular Communications
  doi: 10.1016/j.vehcom.2019.100182
– volume: 112
  start-page: 193
  issue: 1
  year: 2020
  ident: 7549_CR12
  publication-title: Wireless Personal Communications
  doi: 10.1007/s11277-019-07022-5
– ident: 7549_CR3
  doi: 10.1109/VTCFall.2015.7391111
– volume: 25
  start-page: 336
  issue: 8
  year: 2010
  ident: 7549_CR5
  publication-title: In 35th Annual IEEE Conference on Local Computer Networks, LCN
– volume: 101
  start-page: 2029
  issue: 4
  year: 2018
  ident: 7549_CR11
  publication-title: Wireless Personal Communications
  doi: 10.1007/s11277-018-5804-4
– volume: 45
  start-page: 428
  year: 2015
  ident: 7549_CR44
  publication-title: Procedia Computer Science
  doi: 10.1016/j.procs.2015.03.174
– volume: 50
  start-page: 217
  issue: 4
  year: 2012
  ident: 7549_CR20
  publication-title: Telecommunication Systems
  doi: 10.1007/s11235-010-9400-5
– volume: 61
  start-page: 33
  year: 2017
  ident: 7549_CR35
  publication-title: Ad Hoc Networks
  doi: 10.1016/j.adhoc.2017.03.006
– volume: 25
  start-page: 1557
  issue: 8
  year: 2007
  ident: 7549_CR21
  publication-title: IEEE Journal on Selected Areas in Communications
  doi: 10.1109/JSAC.2007.071006
– volume: 2016
  start-page: 177
  year: 2016
  ident: 7549_CR2
  publication-title: 2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM).
  doi: 10.1109/ICONSTEM.2016.7560946
– volume: 13
  start-page: 1550005
  issue: 2
  year: 2015
  ident: 7549_CR48
  publication-title: Journal of Bioinformatics and Computational Biology
  doi: 10.1142/S0219720015500055
– ident: 7549_CR19
– volume: 73
  start-page: 95
  issue: 1
  year: 2013
  ident: 7549_CR15
  publication-title: Wireless Personal Communications.
  doi: 10.1007/s11277-013-1161-5
– volume: 58
  start-page: 65
  issue: 1
  year: 2009
  ident: 7549_CR39
  publication-title: Computers and Mathematics with Applications
  doi: 10.1016/j.camwa.2009.01.038
– ident: 7549_CR31
  doi: 10.1007/978-3-642-34478-7_65
– volume: 15
  start-page: 59
  issue: 3
  year: 2008
  ident: 7549_CR37
  publication-title: The Journal of China Universities of Posts and Telecommunications
  doi: 10.1016/S1005-8885(08)60108-9
– volume: 7
  start-page: 1
  issue: 1
  year: 2018
  ident: 7549_CR33
  publication-title: Journal of Cloud Computing
  doi: 10.1186/s13677-017-0102-3
– volume: 2015
  start-page: 745303
  year: 2015
  ident: 7549_CR1
  publication-title: International Journal of Distributed Sensor Networks
  doi: 10.1155/2015/745303
– volume: 14
  start-page: 122
  issue: 7
  year: 2014
  ident: 7549_CR38
  publication-title: International Journal of Computer Science and Network Security (IJCSNS)
– volume: 2011
  start-page: 178
  year: 2011
  ident: 7549_CR30
  publication-title: Proceeding 2011 European Intelligence and Security Informatics Conference EISIC
  doi: 10.1109/EISIC.2011.19
– volume: 76
  start-page: 1905
  issue: 8
  year: 1971
  ident: 7549_CR46
  publication-title: Journal of Geophysical Research
  doi: 10.1029/JB076i008p01905
– volume: 18
  start-page: 100164
  year: 2019
  ident: 7549_CR26
  publication-title: Vehicular Communications
  doi: 10.1016/j.vehcom.2019.100164
– volume: 42
  start-page: 8609
  issue: 22
  year: 2015
  ident: 7549_CR32
  publication-title: Expert Systems with Applications
  doi: 10.1016/j.eswa.2015.07.015
– volume: 39
  start-page: 129
  issue: 1
  year: 2012
  ident: 7549_CR40
  publication-title: Expert Systems with applications
  doi: 10.1016/j.eswa.2011.06.013
– ident: 7549_CR43
  doi: 10.1007/s11277-020-07395-y
– volume: 97
  start-page: 2939
  issue: 2
  year: 2017
  ident: 7549_CR16
  publication-title: Wireless Personal Communications
  doi: 10.1007/s11277-017-4643-z
SSID ssj0010092
Score 2.435928
Snippet Security and safety are fundamental issues in any wireless network. The problem becomes serious when the specified network is Vehicular Adhoc Network (VANET)....
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 3613
SubjectTerms Algorithms
Communications Engineering
Computer Communication Networks
Denial of service attacks
Engineering
Kernels
Mobile ad hoc networks
Model testing
Networks
Security management
Signal,Image and Speech Processing
Vibration
Wireless networks
Title Hybrid Algorithm to Detect DDoS Attacks in VANETs
URI https://link.springer.com/article/10.1007/s11277-020-07549-y
https://www.proquest.com/docview/2473801926
Volume 114
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 1572-834X
  dateEnd: 20241101
  omitProxy: false
  ssIdentifier: ssj0010092
  issn: 0929-6212
  databaseCode: ADMLS
  dateStart: 20080101
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
– providerCode: PRVLSH
  databaseName: SpringerLink Journals
  customDbUrl:
  mediaType: online
  eissn: 1572-834X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0010092
  issn: 0929-6212
  databaseCode: AFBBN
  dateStart: 19970101
  isFulltext: true
  providerName: Library Specific Holdings
– providerCode: PRVAVX
  databaseName: SpringerLINK - Czech Republic Consortium
  customDbUrl:
  eissn: 1572-834X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0010092
  issn: 0929-6212
  databaseCode: AGYKE
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: http://link.springer.com
  providerName: Springer Nature
– providerCode: PRVAVX
  databaseName: SpringerLink Journals (ICM)
  customDbUrl:
  eissn: 1572-834X
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0010092
  issn: 0929-6212
  databaseCode: U2A
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: http://www.springerlink.com/journals/
  providerName: Springer Nature
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NT8IwFH9RuOjBKGpEkPRgvOiSruu-josDiQoXwOBpWUunJLAZNw_897ZjY2LUxNOS7bWH176vvf5-BbikBiXcclxNwT41aoau5rhCaKFBIkENHNKcTGcwtPoTej81pwUoLC1Pu5ctydxTV2A3XbUbVbkjwxx1tdUu1E1F5yV38YR4m96BohHKGfbUwQ7pmQuozM9zbIejKsf81hbNo03vEA6KNBF563U9gh0RN2D_C3lgA1qF0Dxdoiu0BfRIj0HvrxQWC3mLl0TW_69LlCXIF6plgHw_GSEvyxS8Hs1j9OQNu-P0BCa97vi2rxXXI2hc2k2msZn0NhQbIceCYyqkX7O5YwmCIxubXDdoJGsBIQxmEjNyhXw509nMcZluYSFN-RRqcRKLM0CWNHMRUptEbEYtpm4axDyUyVfkMvWjsAl6qaWAF9zh6gqLRVCxHivNBlKzQa7ZYNWE682YtzVzxp_S7VL5QWFFaUCobTgqB7WacFMuSPX599nO_yfegj2i9kR-Rq8Ntez9Q1zIXCNjHah7_uBxpJ53zw_dTr7VPgFdNcn1
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8JAEJ4oHNSDD9SIoO7BeNGSPralPTYCojwugsFT091ulQjF0HLAX-9uaakQNeHaTjftzO7sTGe-bwGusYZVapiWJGCfEtZdSzItxiRXU32GNdnFMZlOp2s0-_hpoA8SUFiYdrunJcnYU2dgN0WUG0W6w7c5bEnzbchjnqCoOcjbD6-t-rJ6IIiEYo490drBfXMClvl9lNUNKYsy1wqj8X7TOIB--qaLNpOPyiwiFfq1RuK46accwn4SgCJ7MWOOYIsFBdj7QUtYgFIiNAzH6AatQEjCY1Cac4HyQvbobTIdRu9jFE1QjYliBKrVJs_IjiIB3EfDAL3Y3XovPIF-o967b0rJwQsS5SsykojH_RiWNZfKjMqYcY9ZpabBVNmvyjpVNOzzLIMxjeiq7luMX_QU4pkWUQyZcSdxCrlgErAzQAZ3IMzFVdUnHjaIOMNQpi4P63yLiF-QRVBS7Ts0YSUXh2OMnIxPWSjL4cpyYmU58yLcLp_5XHBy_CtdTo3qJOszdFRc1UwR3RpFuEttlN3-e7TzzcSvYKfZ67Sd9mO3VYJdVZg87gQsQy6aztgFj2gicplM4G8dJOb3
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8JAEJ4oJkYPRlEjgroH40U39rF9HRsLwRcxEQy3prvdKgm0hNYD_97d0lIwauK1ne5hdl7b2e8bgEuiE42ZtoMl7BMTI3Cw7XCOA12LONGVgORkOs89szsgD0NjuILiz2-7ly3JBaZBsjTF2e00jG4r4JsqW4_y6CNSHnHwfBO2iCRKEBY90NxlH0FSCuVse_KSh4jSBWzm5zXWU1NVb35rkeaZp7MPe0XJiNzFHh_ABo_rsLtCJFiHZiE0SifoCq2BPtJDULtzictC7vg9mY2yjwnKEuRx2T5Anpe8IjfLJNQejWL05vba_fQIBp12_66Li1EJmAkfyjANReQhih4whTOFcBHjLGabXFMiSzGYqpNInAs416mhGZHDxcNQpaHtUNVUuHDrY6jFScxPAJnC5XlALC2iITGpnDqosEAUYpFD5U_DBqillnxW8IjLcRZjv2JAlpr1hWb9XLP-vAHXy2-mCxaNP6VbpfL9wqNSXyOWbst61GzATbkh1evfVzv9n_gFbL94Hf_pvvfYhB1Nmkd-da8FtWz2yc9ECZLR89zKvgBhI831
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Hybrid+Algorithm+to+Detect+DDoS+Attacks+in+VANETs&rft.jtitle=Wireless+personal+communications&rft.au=Adhikary+Kaushik&rft.au=Bhushan+Shashi&rft.au=Kumar%2C+Sunil&rft.au=Dutta+Kamlesh&rft.date=2020-10-01&rft.pub=Springer+Nature+B.V&rft.issn=0929-6212&rft.eissn=1572-834X&rft.volume=114&rft.issue=4&rft.spage=3613&rft.epage=3634&rft_id=info:doi/10.1007%2Fs11277-020-07549-y&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0929-6212&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0929-6212&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0929-6212&client=summon