Enhanced Smart Vehicle Intrusion Detection Using Random Forest Classifier
Keywords:
Random Forest, Gradient Boosting, Adaboost, LSTM, CatBoost classifiersAbstract
This research introduces a newly developed Intrusion Detection System (IDS) for smart vehicles that leverages sophisticated machine learning techniques. The system has been engineered to identify and categorize various cybersecurity threats, including Distributed Denial of Service (DDoS) attacks, Fuzzy attacks, and Impersonation attacks, while also recognizing normal "Free" traffic patterns. For training and testing the models, researchers utilized the CAN-intrusion-dataset, which incorporates essential vehicle communication elements such as Message_ID, signal data at the byte level, and corresponding Target classifications. The investigation implements several machine learning approaches—Random Forest, Gradient Boosting, Adaboost, LSTM, and CatBoost classifiers—to detect and counter potential security threats. By harnessing these advanced algorithms, the system strives to deliver dependable and instantaneous detection of suspicious activities within vehicle networks, thereby strengthening the security posture and operational dependability of smart vehicle technologies. The ultimate goal is to develop an efficient and scalable IDS capable of protecting smart vehicles from evolving cyber threats.
Downloads
References
C. Chen, C. Wang, T. Qiu, M. Atiquzzaman, and D. O. Wu, ‘‘Caching in vehicular named data networking: Architecture, schemes and future directions,’’ IEEE Commun. Surveys Tuts., vol. 22, no. 4, pp. 2378–2407, 4th Quart., 2020, doi: 10.1109/COMST.2020.3005361.
Z. Lv, D. Chen, and Q. Wang, ‘‘Diversified technologies in Internet of Vehicles under intelligent edge computing,’’ IEEE Trans. Intell. Transp. Syst., vol. 22, no. 4, pp. 2048–2059, Apr. 2021, doi: 10.1109/TITS.2020.3019756.
H. Gao, D. Fang, J. Xiao, W. Hussain, and J. Y. Kim, ‘‘CAMRL: A joint method of channel attention and multidimensional regression loss for 3D object detection in automated vehicles,’’ IEEE Trans. Intell. Transp. Syst., vol. 24, no. 8, pp. 8831–8845, Aug. 2023, doi: 10.1109/TITS.2022.3219474.
L. Xing, P. Zhao, J. Gao, H. Wu, and H. Ma, ‘‘A survey of the social Internet of Vehicles: Secure data issues, solutions, and federated learning,’’ IEEE Intell. Transp. Syst. Mag., vol. 15, no. 2, pp. 70–84, Mar. 2023, doi: 10.1109/MITS.2022.3190036.
F. Lone, H. K. Verma, and K. P. Sharma, ‘‘A systematic study on the challenges, characteristics and security issues in vehicular networks,’’ Int. J. Pervasive Comput. Commun., vol. 20, no. 1, pp. 56–98, Jan. 2024, doi: 10.1108/ijpcc-04-2022-0164.
S. Xu, Y. Qian, and R. Q. Hu, ‘‘Data-driven edge intelligence for robust network anomaly detection,’’ IEEE Trans. Netw. Sci. Eng., vol. 7, no. 3, pp. 1481–1492, Jul. 2020, doi: 10.1109/TNSE.2019.2936466.
F. Fakhfakh, M. Tounsi, and M. Mosbah, ‘‘Cybersecurity attacks on CAN bus based vehicles: A review and open challenges,’’ Library Hi Tech, vol. 40, no. 5, pp. 1179–1203, Nov. 2022, doi: 10.1108/lht-01-2021- 0013.
L. Lihua, ‘‘Energy-aware intrusion detection model for Internet of Vehicles using machine learning methods,’’ Wireless Commun. Mobile Comput., vol. 2022, pp. 1–8, May 2022, doi: 10.1155/2022/9865549.
I. Aliyu, S. Van Engelenburg, M. B. Mu’Azu, J. Kim, and C. G. Lim, ‘‘Statistical detection of adversarial examples in blockchainbased federated forest in-vehicle network intrusion detection systems,’’ IEEE Access, vol. 10, pp. 109366–109384, 2022, doi: 10.1109/ACCESS.2022.3212412.
G. O. Anyanwu, C. I. Nwakanma, J. M. Lee, and D.-S. Kim, ‘‘Novel hyper-tuned ensemble random forest algorithm for the detection of false basic safety messages in Internet of Vehicles,’’ ICT Exp., vol. 9, no. 1, pp. 122–129, Feb. 2023, doi: 10.1016/j.icte.2022.06.003.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Journal of Scientific Research in Science, Engineering and Technology

This work is licensed under a Creative Commons Attribution 4.0 International License.