Hybrid Algorithm to Detect DDoS Attacks in VANETs
Security and safety are fundamental issues in any wireless network. The problem becomes serious when the specified network is Vehicular Adhoc Network (VANET). VANET faces Distributed Denial of Service (DDoS) attacks, when several vehicles carry out various types of Denial of Service (DoS) attacks to...
Saved in:
| Published in | Wireless personal communications Vol. 114; no. 4; pp. 3613 - 3634 |
|---|---|
| Main Authors | , , , |
| Format | Journal Article |
| Language | English |
| Published |
New York
Springer US
01.10.2020
Springer Nature B.V |
| Subjects | |
| Online Access | Get full text |
| ISSN | 0929-6212 1572-834X |
| DOI | 10.1007/s11277-020-07549-y |
Cover
| Abstract | Security and safety are fundamental issues in any wireless network. The problem becomes serious when the specified network is Vehicular Adhoc Network (VANET). VANET faces Distributed Denial of Service (DDoS) attacks, when several vehicles carry out various types of Denial of Service (DoS) attacks to disrupt the normal functioning of network, thereby endangering human lives. A highly efficient and reliable algorithm is required to be developed to detect and prevent DDoS attacks in VANET. This paper presents a hybrid detection algorithm based on the SVM kernel methods of AnovaDot and RBFDot for detecting DDoS attacks in VANETs. In this hybrid algorithm, features like collisions, packet drop, jitter etc. have been used to simulate real time network communication scenario where the network is operating under normal conditions, as well as under DDoS attacks. These features are used both for training and for testing the model based on the proposed hybrid algorithm. The performance of the model based on the proposed hybrid algorithm is compared with the models based on single SVM kernel algorithms AnovaDot and RBFDot based on Accuracy, Gini, KS, MER and H. The experimental results show that the model based on the proposed hybrid algorithm is superior to detect DDoS attacks as compared to the models based on single SVM kernel algorithms AnovaDot and RBFDot. The results also prove that by combining the the SVM kernel algorithms, an efficient and effective hybrid algorithm can be developed. |
|---|---|
| AbstractList | Security and safety are fundamental issues in any wireless network. The problem becomes serious when the specified network is Vehicular Adhoc Network (VANET). VANET faces Distributed Denial of Service (DDoS) attacks, when several vehicles carry out various types of Denial of Service (DoS) attacks to disrupt the normal functioning of network, thereby endangering human lives. A highly efficient and reliable algorithm is required to be developed to detect and prevent DDoS attacks in VANET. This paper presents a hybrid detection algorithm based on the SVM kernel methods of AnovaDot and RBFDot for detecting DDoS attacks in VANETs. In this hybrid algorithm, features like collisions, packet drop, jitter etc. have been used to simulate real time network communication scenario where the network is operating under normal conditions, as well as under DDoS attacks. These features are used both for training and for testing the model based on the proposed hybrid algorithm. The performance of the model based on the proposed hybrid algorithm is compared with the models based on single SVM kernel algorithms AnovaDot and RBFDot based on Accuracy, Gini, KS, MER and H. The experimental results show that the model based on the proposed hybrid algorithm is superior to detect DDoS attacks as compared to the models based on single SVM kernel algorithms AnovaDot and RBFDot. The results also prove that by combining the the SVM kernel algorithms, an efficient and effective hybrid algorithm can be developed. |
| Author | Adhikary, Kaushik Dutta, Kamlesh Bhushan, Shashi Kumar, Sunil |
| Author_xml | – sequence: 1 givenname: Kaushik orcidid: 0000-0001-6514-0395 surname: Adhikary fullname: Adhikary, Kaushik email: kaushik.nith@gmail.com organization: I.K.G. Punjab Technical University – sequence: 2 givenname: Shashi surname: Bhushan fullname: Bhushan, Shashi organization: Chandigarh Engineering College – sequence: 3 givenname: Sunil surname: Kumar fullname: Kumar, Sunil organization: Maharaja Agarsen University – sequence: 4 givenname: Kamlesh surname: Dutta fullname: Dutta, Kamlesh organization: National Institute of Technology |
| BookMark | eNp9kEFLwzAUx4NMcE6_gKeA5-hL0jbJsWzTCUMPTvEW2jSdnVszk-zQb2-1guBhpweP_-__Hr9zNGpdaxG6onBDAcRtoJQJQYABAZEminQnaExTwYjkydsIjUExRTJG2Rk6D2ED0GOKjRFddKVvKpxv18438X2Ho8MzG62JeDZzzziPsTAfATctfs0f56twgU7rYhvs5e-coJe7-Wq6IMun-4dpviSGUxVJWTGqEuCFAWsgsVJkwsjMMqgFpIbypE5lai0vU5bWyvbLipaVVCXNwFLJJ-h66N1793mwIeqNO_i2P6lZIrgEqljWp-SQMt6F4G2tTROL2Lg2-qLZagr6W5AeBOlekP4RpLseZf_QvW92he-OQ3yAQh9u19b_fXWE-gKsRHhg |
| CitedBy_id | crossref_primary_10_3390_sym13020227 crossref_primary_10_1016_j_iot_2023_100809 crossref_primary_10_1016_j_micpro_2022_104726 crossref_primary_10_1007_s11277_024_11525_1 crossref_primary_10_3390_electronics12040894 crossref_primary_10_3390_s22197612 crossref_primary_10_1007_s00607_022_01072_7 crossref_primary_10_1109_TVT_2023_3244077 crossref_primary_10_1016_j_adhoc_2022_103026 crossref_primary_10_1109_ACCESS_2025_3552544 crossref_primary_10_1016_j_vehcom_2024_100787 crossref_primary_10_1155_2022_4725805 crossref_primary_10_35193_bseufbd_1102897 crossref_primary_10_3390_app11104682 crossref_primary_10_3390_math10214030 crossref_primary_10_1155_2021_8891758 crossref_primary_10_37394_23209_2022_19_1 crossref_primary_10_3390_app13074591 crossref_primary_10_29130_dubited_1372131 crossref_primary_10_3390_fi16060185 crossref_primary_10_1002_spy2_433 crossref_primary_10_1049_itr2_12504 crossref_primary_10_3103_S0146411624700986 crossref_primary_10_1109_JIOT_2022_3199712 crossref_primary_10_3390_electronics10192403 crossref_primary_10_1007_s10723_024_09747_5 crossref_primary_10_20473_jisebi_9_2_136_146 crossref_primary_10_1016_j_compeleceng_2024_109448 crossref_primary_10_3390_electronics12081757 crossref_primary_10_1109_JAS_2021_1003862 crossref_primary_10_1007_s42979_024_02603_z |
| Cites_doi | 10.1007/s11277-017-4663-8 10.1007/s10994-009-5119-5 10.1016/j.vehcom.2018.04.005 10.35940/ijitee.E2652.039520 10.1145/2695664.2695844 10.1109/ICROIT.2014.6798334 10.1109/COMST.2018.2873088 10.1016/bs.adcom.2018.03.010 10.1016/j.jnca.2013.02.036 10.17485/ijst/2016/v9i47/106865 10.1016/j.comnet.2019.04.027 10.1016/j.adhoc.2018.10.002 10.1007/s11277-019-06864-3 10.1109/JSAC.2011.110308 10.1002/jae.1278 10.1016/j.vehcom.2019.100182 10.1007/s11277-019-07022-5 10.1109/VTCFall.2015.7391111 10.1007/s11277-018-5804-4 10.1016/j.procs.2015.03.174 10.1007/s11235-010-9400-5 10.1016/j.adhoc.2017.03.006 10.1109/JSAC.2007.071006 10.1109/ICONSTEM.2016.7560946 10.1142/S0219720015500055 10.1007/s11277-013-1161-5 10.1016/j.camwa.2009.01.038 10.1007/978-3-642-34478-7_65 10.1016/S1005-8885(08)60108-9 10.1186/s13677-017-0102-3 10.1155/2015/745303 10.1109/EISIC.2011.19 10.1029/JB076i008p01905 10.1016/j.vehcom.2019.100164 10.1016/j.eswa.2015.07.015 10.1016/j.eswa.2011.06.013 10.1007/s11277-020-07395-y 10.1007/s11277-017-4643-z |
| ContentType | Journal Article |
| Copyright | Springer Science+Business Media, LLC, part of Springer Nature 2020 Springer Science+Business Media, LLC, part of Springer Nature 2020. |
| Copyright_xml | – notice: Springer Science+Business Media, LLC, part of Springer Nature 2020 – notice: Springer Science+Business Media, LLC, part of Springer Nature 2020. |
| DBID | AAYXX CITATION JQ2 |
| DOI | 10.1007/s11277-020-07549-y |
| DatabaseName | CrossRef ProQuest Computer Science Collection |
| DatabaseTitle | CrossRef ProQuest Computer Science Collection |
| DatabaseTitleList | ProQuest Computer Science Collection |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Journalism & Communications Engineering |
| EISSN | 1572-834X |
| EndPage | 3634 |
| ExternalDocumentID | 10_1007_s11277_020_07549_y |
| GroupedDBID | -5B -5G -BR -EM -Y2 -~C .4S .86 .DC .VR 06D 0R~ 0VY 123 1N0 1SB 2.D 203 28- 29R 29~ 2J2 2JN 2JY 2KG 2KM 2LR 2P1 2VQ 2~H 30V 4.4 406 408 409 40D 40E 5QI 5VS 67Z 6NX 8TC 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTD ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACREN ACZOJ ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADMLS ADRFC ADTPH ADURQ ADYFF ADYOE ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEGXH AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFGCZ AFLOW AFQWF AFWTZ AFYQB AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGWIL AGWZB AGYKE AHAVH AHBYD AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMTXH AMXSW AMYLF AMYQR AOCGG ARCEE ARCSS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN B-. BA0 BBWZM BDATZ BGNMA BSONS CAG COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 EBLON EBS EDO EIOEI EJD ESBYG FD6 FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 GXS H13 HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I-F I09 IHE IJ- IKXTQ ITG ITH ITM IWAJR IXC IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ KDC KOV KOW LAK LLZTM M4Y MA- N2Q N9A NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM OVD P19 P9P PF0 PT4 PT5 QOK QOS R4E R89 R9I RHV RIG RNI RNS ROL RPX RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCLPG SCV SDH SDM SEG SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TSG TSK TSV TUC TUS U2A U5U UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z7R Z7S Z7X Z7Z Z81 Z83 Z88 Z8M Z8N Z8R Z8T Z8U Z8W Z92 ZMTXR _50 ~A9 ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADHKG AEZWR AFDZB AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION JQ2 |
| ID | FETCH-LOGICAL-c319t-bd219403ac0ec04e8767c86e20f705c134f585ee3b525f9e705d1bd89b160e183 |
| IEDL.DBID | U2A |
| ISSN | 0929-6212 |
| IngestDate | Thu Sep 25 00:47:31 EDT 2025 Wed Oct 01 03:57:36 EDT 2025 Thu Apr 24 22:58:40 EDT 2025 Fri Feb 21 02:40:27 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 4 |
| Keywords | VANETs SVM kernels DDoS attacks DDoS attack detection Hybrid algorithm Machine learning |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c319t-bd219403ac0ec04e8767c86e20f705c134f585ee3b525f9e705d1bd89b160e183 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0001-6514-0395 |
| PQID | 2473801926 |
| PQPubID | 2043826 |
| PageCount | 22 |
| ParticipantIDs | proquest_journals_2473801926 crossref_citationtrail_10_1007_s11277_020_07549_y crossref_primary_10_1007_s11277_020_07549_y springer_journals_10_1007_s11277_020_07549_y |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2020-10-01 |
| PublicationDateYYYYMMDD | 2020-10-01 |
| PublicationDate_xml | – month: 10 year: 2020 text: 2020-10-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York – name: Dordrecht |
| PublicationSubtitle | An International Journal |
| PublicationTitle | Wireless personal communications |
| PublicationTitleAbbrev | Wireless Pers Commun |
| PublicationYear | 2020 |
| Publisher | Springer US Springer Nature B.V |
| Publisher_xml | – name: Springer US – name: Springer Nature B.V |
| References | Adhikary, Bhushan, Kumar, Dutta (CR41) 2020; 5 Islabudeen, Kavitha Devi (CR12) 2020; 112 CR31 Ayyappan, Mohan Kumar (CR2) 2016; 2016 Hui Yang, Chuan Wang (CR37) 2008; 15 Sharanya, Karthikeyan (CR45) 2017; 12 CR3 Sharma, Kaul (CR34) 2018; 12 Sakiz, Sen (CR35) 2017; 61 Zeadally, Hunt, Chen, Irwin, Hassan (CR20) 2012; 50 CR43 Ravale, Marathe, Padiya (CR44) 2015; 45 Adhikary, Bhushan, Kumar (CR29) 2019; 12 Zhou, Choudhury, Ning, Chakrabarty (CR24) 2011; 29 Kumar, Dutta (CR11) 2018; 101 Ahmed, Elfeshawy, Elzoghdy, El-sayed, Faragallah (CR14) 2017; 97 Rampaul, Kumar Patial, Kumar (CR17) 2016; 9 Racine (CR47) 2012; 27 Van Der Heijden, Dietzel, Leinmüller, Kargl (CR36) 2019; 21 Sivatha Sindhu, Geetha, Kannan (CR40) 2012; 39 CR19 Kaur, Kaur, Mahajan (CR16) 2017; 97 Singh, Kumar, Singla (CR32) 2015; 42 Hand (CR49) 2009; 77 Ho, Hua (CR5) 2010; 25 CR10 Loukas, Karapistoli, Panaousis, Sarigiannidis, Bezemskij, Vuong (CR28) 2019; 84 Abusitta, Bellaiche, Dagenais (CR33) 2018; 7 Kim (CR8) 2018; 111 Sarkar, Sana (CR39) 2009; 58 Raya, Papadimitratos, Aad, Jungels, Hubaux (CR21) 2007; 25 Al-Sultan, Al-Doori, Al-Bayatti, Zedan (CR4) 2014; 37 Pathre, Agrawal, Jain (CR22) 2013; 4 Sharma, Kaushik (CR27) 2019; 20 Ghazy, El-Rabaie, Dessouky, El-Fishawy, El-Samie (CR13) 2020; 111 Hardy (CR46) 1971; 76 Bouk, Ahmed, Kim (CR9) 2015; 13–17 Verma, Hasbullah, Kumar (CR15) 2013; 73 Rana, Sharma, Bhattacharya, Shukla (CR48) 2015; 13 Shabbir, Khan, Khan, Saqib (CR18) 2017; 2016 CR23 Liang, Li, Zhang, Wang, Bie (CR1) 2015; 2015 Kait, Chauhan (CR7) 2011; 1 Adhikary, Bhushan (CR25) 2017; 2017 Agrawal, Gupta, Jain (CR30) 2011; 2011 Hosseini, Azizi (CR42) 2019; 158 Singh, Nandi, Nandi (CR26) 2019; 18 Kale, Choudhari (CR38) 2014; 14 Saha, Roy, Sinha (CR6) 2013; 3 A Pathre (7549_CR22) 2013; 4 YH Ho (7549_CR5) 2010; 25 7549_CR19 PK Singh (7549_CR26) 2019; 18 R Kait (7549_CR7) 2011; 1 K Adhikary (7549_CR41) 2020; 5 S Kim (7549_CR8) 2018; 111 DJ Hand (7549_CR49) 2009; 77 RL Hardy (7549_CR46) 1971; 76 7549_CR10 S Sharanya (7549_CR45) 2017; 12 PS Rana (7549_CR48) 2015; 13 S Hosseini (7549_CR42) 2019; 158 B Ayyappan (7549_CR2) 2016; 2016 K Adhikary (7549_CR29) 2019; 12 M Hui Yang (7549_CR37) 2008; 15 S Sharma (7549_CR27) 2019; 20 S Kumar (7549_CR11) 2018; 101 PK Agrawal (7549_CR30) 2011; 2011 D Rampaul (7549_CR17) 2016; 9 7549_CR43 S Saha (7549_CR6) 2013; 3 M Raya (7549_CR21) 2007; 25 P Kaur (7549_CR16) 2017; 97 F Sakiz (7549_CR35) 2017; 61 S Zeadally (7549_CR20) 2012; 50 K Adhikary (7549_CR25) 2017; 2017 K Verma (7549_CR15) 2013; 73 7549_CR31 S Sharma (7549_CR34) 2018; 12 7549_CR3 M Shabbir (7549_CR18) 2017; 2016 R Singh (7549_CR32) 2015; 42 T Zhou (7549_CR24) 2011; 29 U Ravale (7549_CR44) 2015; 45 SS Sivatha Sindhu (7549_CR40) 2012; 39 S Al-Sultan (7549_CR4) 2014; 37 JS Racine (7549_CR47) 2012; 27 W Liang (7549_CR1) 2015; 2015 M Kale (7549_CR38) 2014; 14 SH Bouk (7549_CR9) 2015; 13–17 HI Ahmed (7549_CR14) 2017; 97 7549_CR23 A Abusitta (7549_CR33) 2018; 7 RW Van Der Heijden (7549_CR36) 2019; 21 M Islabudeen (7549_CR12) 2020; 112 RA Ghazy (7549_CR13) 2020; 111 G Loukas (7549_CR28) 2019; 84 BK Sarkar (7549_CR39) 2009; 58 |
| References_xml | – volume: 101 start-page: 2029 issue: 4 year: 2018 end-page: 2052 ident: CR11 article-title: Trust based intrusion detection technique to detect selfish nodes in mobile ad hoc networks publication-title: Wireless Personal Communications – volume: 97 start-page: 2939 issue: 2 year: 2017 end-page: 2950 ident: CR16 article-title: Wormhole attack detection technique in mobile ad hoc networks publication-title: Wireless Personal Communications – volume: 77 start-page: 103 issue: 1 year: 2009 end-page: 123 ident: CR49 article-title: Measuring classifier performance: A coherent alternative to the area under the ROC curve publication-title: Machine Learning – volume: 12 start-page: 138 issue: April year: 2018 end-page: 164 ident: CR34 article-title: A survey on Intrusion detection systems and honeypot based proactive security mechanisms in VANETs and VANET Cloud publication-title: Vehicular Communications – volume: 29 start-page: 582 issue: 3 year: 2011 end-page: 594 ident: CR24 article-title: P2DAP & #x2014; sybil attacks detection in vehicular ad hoc networks publication-title: IEEE Journal on Selected Areas in Communications – volume: 20 start-page: 100182 year: 2019 ident: CR27 article-title: A survey on internet of vehicles: Applications, security issues and solutions publication-title: Vehicular Communications – ident: CR19 – volume: 2017 start-page: 564 year: 2017 end-page: 569 ident: CR25 article-title: “Recent techniques used for preventing DOS attacks in VANETs publication-title: Proceeding—IEEE International Conference on Computing, Communication and Automation ICCCA – volume: 13 start-page: 1550005 issue: 2 year: 2015 ident: CR48 article-title: Quality assessment of modeled protein structure using physicochemical properties publication-title: Journal of Bioinformatics and Computational Biology – volume: 42 start-page: 8609 issue: 22 year: 2015 end-page: 8624 ident: CR32 article-title: An intrusion detection system using network traffic profiling and online sequential extreme learning machine publication-title: Expert Systems with Applications – volume: 58 start-page: 65 issue: 1 year: 2009 end-page: 73 ident: CR39 article-title: A hybrid approach to design efficient learning classifiers publication-title: Computers and Mathematics with Applications – volume: 111 start-page: 43 year: 2018 end-page: 68 ident: CR8 article-title: Blockchain for a trust network among intelligent vehicles publication-title: Advances in Computers – volume: 14 start-page: 122 issue: 7 year: 2014 ident: CR38 article-title: DDOS attack detection based on an ensemble of neural classifier publication-title: International Journal of Computer Science and Network Security (IJCSNS) – volume: 39 start-page: 129 issue: 1 year: 2012 end-page: 141 ident: CR40 article-title: Decision tree based light weight intrusion detection using a wrapper approach publication-title: Expert Systems with applications – volume: 5 start-page: 669 year: 2020 end-page: 675 ident: CR41 article-title: Decision tree and neural network based hybrid algorithm for detecting and preventing Ddos attacks in VANETS publication-title: International Journal of Innovative Technology and Exploring Engineering – volume: 61 start-page: 33 year: 2017 end-page: 50 ident: CR35 article-title: A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV publication-title: Ad Hoc Networks – volume: 9 start-page: 1 issue: 47 year: 2016 end-page: 6 ident: CR17 article-title: Detection of DoS attack in VANETs publication-title: Indian Journal of Science and Technology – volume: 111 start-page: 375 issue: 1 year: 2020 end-page: 393 ident: CR13 article-title: Feature selection ranking and subset-based techniques with different classifiers for intrusion detection publication-title: Wireless Personal Communications – volume: 25 start-page: 336 issue: 8 year: 2010 end-page: 339 ident: CR5 article-title: Failure-resilient vehicular networks publication-title: In 35th Annual IEEE Conference on Local Computer Networks, LCN – volume: 18 start-page: 100164 year: 2019 ident: CR26 article-title: A tutorial survey on vehicular communication state of the art, and future research directions publication-title: Vehicular Communications – volume: 2016 start-page: 970 year: 2017 end-page: 974 ident: CR18 article-title: Detection and prevention of distributed denial of service attacks in VANETs publication-title: In 2016 International Conference on Computational Science and Computational Intelligence (CSCI) – volume: 2011 start-page: 178 year: 2011 end-page: 182 ident: CR30 article-title: SVM based scheme for predicting number of zombies in a DDoS attack publication-title: Proceeding 2011 European Intelligence and Security Informatics Conference EISIC – ident: CR43 – volume: 1 start-page: 53 year: 2011 end-page: 61 ident: CR7 article-title: Networks on road—challenges in securing vehicular Adhoc networks publication-title: An International Journal of Engineering Sciences – volume: 4 start-page: 1 issue: 6 year: 2013 end-page: 5 ident: CR22 article-title: Identification of malicious vehicle in vanet environment from Ddos attack publication-title: Journal of Global Research in Computer Science – volume: 50 start-page: 217 issue: 4 year: 2012 end-page: 241 ident: CR20 article-title: Vehicular ad hoc networks (VANETS): Status, results, and challenges publication-title: Telecommunication Systems – volume: 21 start-page: 779 issue: 1 year: 2019 end-page: 811 ident: CR36 article-title: Survey on misbehavior detection in cooperative intelligent transportation systems publication-title: IEEE Communications Surveys and Tutorials – volume: 97 start-page: 3097 issue: 2 year: 2017 end-page: 3112 ident: CR14 article-title: A neural network-based learning algorithm for intrusion detection systems publication-title: Wireless Personal Communications – volume: 25 start-page: 1557 issue: 8 year: 2007 end-page: 1568 ident: CR21 article-title: Eviction of misbehaving and faulty nodes in vehicular networks publication-title: IEEE Journal on Selected Areas in Communications – volume: 37 start-page: 380 issue: 1 year: 2014 end-page: 392 ident: CR4 article-title: A comprehensive survey on vehicular ad hoc network publication-title: Journal of Network and Computer Applications – ident: CR10 – volume: 158 start-page: 35 year: 2019 end-page: 45 ident: CR42 article-title: The hybrid technique for DDoS detection with supervised learning algorithms publication-title: Computer Networks – volume: 3 start-page: 1221 issue: 9 year: 2013 end-page: 1228 ident: CR6 article-title: VANET simulation in diffrent indian city scenario publication-title: Advance in Electronic and Electric Engineering, ISSN – volume: 112 start-page: 193 issue: 1 year: 2020 end-page: 224 ident: CR12 article-title: A smart approach for intrusion detection and prevention system in mobile ad hoc networks against security attacks publication-title: Wireless Personal Communications – volume: 15 start-page: 59 issue: 3 year: 2008 end-page: 63 ident: CR37 article-title: DDoS detection based on wavelet kernel support vector machine publication-title: The Journal of China Universities of Posts and Telecommunications – ident: CR23 – volume: 12 start-page: 478 issue: 5 year: 2019 end-page: 486 ident: CR29 article-title: Evaluating the performance of various machine learning algorithms for detecting DDOS attacks in vanets publication-title: International Journal of Control Automation – volume: 7 start-page: 1 issue: 1 year: 2018 end-page: 18 ident: CR33 article-title: An SVM-based framework for detecting DoS attacks in virtualized clouds under changing environment publication-title: Journal of Cloud Computing – volume: 73 start-page: 95 issue: 1 year: 2013 end-page: 126 ident: CR15 article-title: Prevention of DoS attacks in VANET publication-title: Wireless Personal Communications. – volume: 2016 start-page: 177 year: 2016 end-page: 180 ident: CR2 article-title: Vehicular ad hoc networks (VANET): Architectures, methodologies and design issues publication-title: 2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM). – ident: CR3 – volume: 76 start-page: 1905 issue: 8 year: 1971 end-page: 1915 ident: CR46 article-title: Multiquadric equations of topography and other irregular surfaces publication-title: Journal of Geophysical Research – ident: CR31 – volume: 27 start-page: 167 issue: 1 year: 2012 end-page: 172 ident: CR47 article-title: RSTUDIO: A platform-independent IDE for R and sweave publication-title: Journal of Applied Econometrics – volume: 2015 start-page: 745303 year: 2015 ident: CR1 article-title: Vehicular ad hoc networks: Architectures, research issues, methodologies, challenges, and trends publication-title: International Journal of Distributed Sensor Networks – volume: 45 start-page: 428 year: 2015 end-page: 435 ident: CR44 article-title: Feature selection based hybrid anomaly intrusion detection system using K Means and RBF kernel function publication-title: Procedia Computer Science – volume: 84 start-page: 124 year: 2019 end-page: 147 ident: CR28 article-title: A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles publication-title: Ad Hoc Networks – volume: 13–17 start-page: 695 year: 2015 end-page: 700 ident: CR9 article-title: Vehicular content centric network (VCCN): a survey and research challenges publication-title: Proceedings of the 30th Annual ACM Symposium on Applied Computing – volume: 12 start-page: 171 issue: 1 year: 2017 end-page: 176 ident: CR45 article-title: Classifying malicious nodes in VANETs using support vector machines with modified fading memory publication-title: ARPN Journal of Engineering and Applied Sciences – volume: 3 start-page: 1221 issue: 9 year: 2013 ident: 7549_CR6 publication-title: Advance in Electronic and Electric Engineering, ISSN – volume: 97 start-page: 3097 issue: 2 year: 2017 ident: 7549_CR14 publication-title: Wireless Personal Communications doi: 10.1007/s11277-017-4663-8 – volume: 77 start-page: 103 issue: 1 year: 2009 ident: 7549_CR49 publication-title: Machine Learning doi: 10.1007/s10994-009-5119-5 – volume: 4 start-page: 1 issue: 6 year: 2013 ident: 7549_CR22 publication-title: Journal of Global Research in Computer Science – volume: 12 start-page: 138 issue: April year: 2018 ident: 7549_CR34 publication-title: Vehicular Communications doi: 10.1016/j.vehcom.2018.04.005 – volume: 5 start-page: 669 year: 2020 ident: 7549_CR41 publication-title: International Journal of Innovative Technology and Exploring Engineering doi: 10.35940/ijitee.E2652.039520 – volume: 13–17 start-page: 695 year: 2015 ident: 7549_CR9 publication-title: Proceedings of the 30th Annual ACM Symposium on Applied Computing doi: 10.1145/2695664.2695844 – volume: 2017 start-page: 564 year: 2017 ident: 7549_CR25 publication-title: Proceeding—IEEE International Conference on Computing, Communication and Automation ICCCA – ident: 7549_CR23 doi: 10.1109/ICROIT.2014.6798334 – volume: 21 start-page: 779 issue: 1 year: 2019 ident: 7549_CR36 publication-title: IEEE Communications Surveys and Tutorials doi: 10.1109/COMST.2018.2873088 – volume: 111 start-page: 43 year: 2018 ident: 7549_CR8 publication-title: Advances in Computers doi: 10.1016/bs.adcom.2018.03.010 – volume: 12 start-page: 171 issue: 1 year: 2017 ident: 7549_CR45 publication-title: ARPN Journal of Engineering and Applied Sciences – volume: 1 start-page: 53 year: 2011 ident: 7549_CR7 publication-title: An International Journal of Engineering Sciences – volume: 37 start-page: 380 issue: 1 year: 2014 ident: 7549_CR4 publication-title: Journal of Network and Computer Applications doi: 10.1016/j.jnca.2013.02.036 – volume: 9 start-page: 1 issue: 47 year: 2016 ident: 7549_CR17 publication-title: Indian Journal of Science and Technology doi: 10.17485/ijst/2016/v9i47/106865 – volume: 158 start-page: 35 year: 2019 ident: 7549_CR42 publication-title: Computer Networks doi: 10.1016/j.comnet.2019.04.027 – volume: 12 start-page: 478 issue: 5 year: 2019 ident: 7549_CR29 publication-title: International Journal of Control Automation – volume: 84 start-page: 124 year: 2019 ident: 7549_CR28 publication-title: Ad Hoc Networks doi: 10.1016/j.adhoc.2018.10.002 – volume: 111 start-page: 375 issue: 1 year: 2020 ident: 7549_CR13 publication-title: Wireless Personal Communications doi: 10.1007/s11277-019-06864-3 – volume: 29 start-page: 582 issue: 3 year: 2011 ident: 7549_CR24 publication-title: IEEE Journal on Selected Areas in Communications doi: 10.1109/JSAC.2011.110308 – volume: 27 start-page: 167 issue: 1 year: 2012 ident: 7549_CR47 publication-title: Journal of Applied Econometrics doi: 10.1002/jae.1278 – volume: 2016 start-page: 970 year: 2017 ident: 7549_CR18 publication-title: In 2016 International Conference on Computational Science and Computational Intelligence (CSCI) – ident: 7549_CR10 – volume: 20 start-page: 100182 year: 2019 ident: 7549_CR27 publication-title: Vehicular Communications doi: 10.1016/j.vehcom.2019.100182 – volume: 112 start-page: 193 issue: 1 year: 2020 ident: 7549_CR12 publication-title: Wireless Personal Communications doi: 10.1007/s11277-019-07022-5 – ident: 7549_CR3 doi: 10.1109/VTCFall.2015.7391111 – volume: 25 start-page: 336 issue: 8 year: 2010 ident: 7549_CR5 publication-title: In 35th Annual IEEE Conference on Local Computer Networks, LCN – volume: 101 start-page: 2029 issue: 4 year: 2018 ident: 7549_CR11 publication-title: Wireless Personal Communications doi: 10.1007/s11277-018-5804-4 – volume: 45 start-page: 428 year: 2015 ident: 7549_CR44 publication-title: Procedia Computer Science doi: 10.1016/j.procs.2015.03.174 – volume: 50 start-page: 217 issue: 4 year: 2012 ident: 7549_CR20 publication-title: Telecommunication Systems doi: 10.1007/s11235-010-9400-5 – volume: 61 start-page: 33 year: 2017 ident: 7549_CR35 publication-title: Ad Hoc Networks doi: 10.1016/j.adhoc.2017.03.006 – volume: 25 start-page: 1557 issue: 8 year: 2007 ident: 7549_CR21 publication-title: IEEE Journal on Selected Areas in Communications doi: 10.1109/JSAC.2007.071006 – volume: 2016 start-page: 177 year: 2016 ident: 7549_CR2 publication-title: 2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM). doi: 10.1109/ICONSTEM.2016.7560946 – volume: 13 start-page: 1550005 issue: 2 year: 2015 ident: 7549_CR48 publication-title: Journal of Bioinformatics and Computational Biology doi: 10.1142/S0219720015500055 – ident: 7549_CR19 – volume: 73 start-page: 95 issue: 1 year: 2013 ident: 7549_CR15 publication-title: Wireless Personal Communications. doi: 10.1007/s11277-013-1161-5 – volume: 58 start-page: 65 issue: 1 year: 2009 ident: 7549_CR39 publication-title: Computers and Mathematics with Applications doi: 10.1016/j.camwa.2009.01.038 – ident: 7549_CR31 doi: 10.1007/978-3-642-34478-7_65 – volume: 15 start-page: 59 issue: 3 year: 2008 ident: 7549_CR37 publication-title: The Journal of China Universities of Posts and Telecommunications doi: 10.1016/S1005-8885(08)60108-9 – volume: 7 start-page: 1 issue: 1 year: 2018 ident: 7549_CR33 publication-title: Journal of Cloud Computing doi: 10.1186/s13677-017-0102-3 – volume: 2015 start-page: 745303 year: 2015 ident: 7549_CR1 publication-title: International Journal of Distributed Sensor Networks doi: 10.1155/2015/745303 – volume: 14 start-page: 122 issue: 7 year: 2014 ident: 7549_CR38 publication-title: International Journal of Computer Science and Network Security (IJCSNS) – volume: 2011 start-page: 178 year: 2011 ident: 7549_CR30 publication-title: Proceeding 2011 European Intelligence and Security Informatics Conference EISIC doi: 10.1109/EISIC.2011.19 – volume: 76 start-page: 1905 issue: 8 year: 1971 ident: 7549_CR46 publication-title: Journal of Geophysical Research doi: 10.1029/JB076i008p01905 – volume: 18 start-page: 100164 year: 2019 ident: 7549_CR26 publication-title: Vehicular Communications doi: 10.1016/j.vehcom.2019.100164 – volume: 42 start-page: 8609 issue: 22 year: 2015 ident: 7549_CR32 publication-title: Expert Systems with Applications doi: 10.1016/j.eswa.2015.07.015 – volume: 39 start-page: 129 issue: 1 year: 2012 ident: 7549_CR40 publication-title: Expert Systems with applications doi: 10.1016/j.eswa.2011.06.013 – ident: 7549_CR43 doi: 10.1007/s11277-020-07395-y – volume: 97 start-page: 2939 issue: 2 year: 2017 ident: 7549_CR16 publication-title: Wireless Personal Communications doi: 10.1007/s11277-017-4643-z |
| SSID | ssj0010092 |
| Score | 2.435928 |
| Snippet | Security and safety are fundamental issues in any wireless network. The problem becomes serious when the specified network is Vehicular Adhoc Network (VANET).... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 3613 |
| SubjectTerms | Algorithms Communications Engineering Computer Communication Networks Denial of service attacks Engineering Kernels Mobile ad hoc networks Model testing Networks Security management Signal,Image and Speech Processing Vibration Wireless networks |
| Title | Hybrid Algorithm to Detect DDoS Attacks in VANETs |
| URI | https://link.springer.com/article/10.1007/s11277-020-07549-y https://www.proquest.com/docview/2473801926 |
| Volume | 114 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 1572-834X dateEnd: 20241101 omitProxy: false ssIdentifier: ssj0010092 issn: 0929-6212 databaseCode: ADMLS dateStart: 20080101 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost – providerCode: PRVLSH databaseName: SpringerLink Journals customDbUrl: mediaType: online eissn: 1572-834X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0010092 issn: 0929-6212 databaseCode: AFBBN dateStart: 19970101 isFulltext: true providerName: Library Specific Holdings – providerCode: PRVAVX databaseName: SpringerLINK - Czech Republic Consortium customDbUrl: eissn: 1572-834X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0010092 issn: 0929-6212 databaseCode: AGYKE dateStart: 19970101 isFulltext: true titleUrlDefault: http://link.springer.com providerName: Springer Nature – providerCode: PRVAVX databaseName: SpringerLink Journals (ICM) customDbUrl: eissn: 1572-834X dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0010092 issn: 0929-6212 databaseCode: U2A dateStart: 19970101 isFulltext: true titleUrlDefault: http://www.springerlink.com/journals/ providerName: Springer Nature |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NT8IwFH9RuOjBKGpEkPRgvOiSruu-josDiQoXwOBpWUunJLAZNw_897ZjY2LUxNOS7bWH176vvf5-BbikBiXcclxNwT41aoau5rhCaKFBIkENHNKcTGcwtPoTej81pwUoLC1Pu5ctydxTV2A3XbUbVbkjwxx1tdUu1E1F5yV38YR4m96BohHKGfbUwQ7pmQuozM9zbIejKsf81hbNo03vEA6KNBF563U9gh0RN2D_C3lgA1qF0Dxdoiu0BfRIj0HvrxQWC3mLl0TW_69LlCXIF6plgHw_GSEvyxS8Hs1j9OQNu-P0BCa97vi2rxXXI2hc2k2msZn0NhQbIceCYyqkX7O5YwmCIxubXDdoJGsBIQxmEjNyhXw509nMcZluYSFN-RRqcRKLM0CWNHMRUptEbEYtpm4axDyUyVfkMvWjsAl6qaWAF9zh6gqLRVCxHivNBlKzQa7ZYNWE682YtzVzxp_S7VL5QWFFaUCobTgqB7WacFMuSPX599nO_yfegj2i9kR-Rq8Ntez9Q1zIXCNjHah7_uBxpJ53zw_dTr7VPgFdNcn1 |
| linkProvider | Springer Nature |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8JAEJ4oHNSDD9SIoO7BeNGSPralPTYCojwugsFT091ulQjF0HLAX-9uaakQNeHaTjftzO7sTGe-bwGusYZVapiWJGCfEtZdSzItxiRXU32GNdnFMZlOp2s0-_hpoA8SUFiYdrunJcnYU2dgN0WUG0W6w7c5bEnzbchjnqCoOcjbD6-t-rJ6IIiEYo490drBfXMClvl9lNUNKYsy1wqj8X7TOIB--qaLNpOPyiwiFfq1RuK46accwn4SgCJ7MWOOYIsFBdj7QUtYgFIiNAzH6AatQEjCY1Cac4HyQvbobTIdRu9jFE1QjYliBKrVJs_IjiIB3EfDAL3Y3XovPIF-o967b0rJwQsS5SsykojH_RiWNZfKjMqYcY9ZpabBVNmvyjpVNOzzLIMxjeiq7luMX_QU4pkWUQyZcSdxCrlgErAzQAZ3IMzFVdUnHjaIOMNQpi4P63yLiF-QRVBS7Ts0YSUXh2OMnIxPWSjL4cpyYmU58yLcLp_5XHBy_CtdTo3qJOszdFRc1UwR3RpFuEttlN3-e7TzzcSvYKfZ67Sd9mO3VYJdVZg87gQsQy6aztgFj2gicplM4G8dJOb3 |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8JAEJ4oJkYPRlEjgroH40U39rF9HRsLwRcxEQy3prvdKgm0hNYD_97d0lIwauK1ne5hdl7b2e8bgEuiE42ZtoMl7BMTI3Cw7XCOA12LONGVgORkOs89szsgD0NjuILiz2-7ly3JBaZBsjTF2e00jG4r4JsqW4_y6CNSHnHwfBO2iCRKEBY90NxlH0FSCuVse_KSh4jSBWzm5zXWU1NVb35rkeaZp7MPe0XJiNzFHh_ABo_rsLtCJFiHZiE0SifoCq2BPtJDULtzictC7vg9mY2yjwnKEuRx2T5Anpe8IjfLJNQejWL05vba_fQIBp12_66Li1EJmAkfyjANReQhih4whTOFcBHjLGabXFMiSzGYqpNInAs416mhGZHDxcNQpaHtUNVUuHDrY6jFScxPAJnC5XlALC2iITGpnDqosEAUYpFD5U_DBqillnxW8IjLcRZjv2JAlpr1hWb9XLP-vAHXy2-mCxaNP6VbpfL9wqNSXyOWbst61GzATbkh1evfVzv9n_gFbL94Hf_pvvfYhB1Nmkd-da8FtWz2yc9ECZLR89zKvgBhI831 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Hybrid+Algorithm+to+Detect+DDoS+Attacks+in+VANETs&rft.jtitle=Wireless+personal+communications&rft.au=Adhikary+Kaushik&rft.au=Bhushan+Shashi&rft.au=Kumar%2C+Sunil&rft.au=Dutta+Kamlesh&rft.date=2020-10-01&rft.pub=Springer+Nature+B.V&rft.issn=0929-6212&rft.eissn=1572-834X&rft.volume=114&rft.issue=4&rft.spage=3613&rft.epage=3634&rft_id=info:doi/10.1007%2Fs11277-020-07549-y&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0929-6212&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0929-6212&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0929-6212&client=summon |