LSTM-GRU
LSTM-GRU
Article
HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion
Detection in the Internet of Vehicles
Safi Ullah 1 , Muazzam A. Khan 1,2 , Jawad Ahmad 3, * , Sajjad Shaukat Jamal 4 , Zil e Huma 5 ,
Muhammad Tahir Hassan 6 , Nikolaos Pitropakis 3 , Arshad 7 and William J. Buchanan 3
Abstract: Internet of Vehicles (IoV) is an application of the Internet of Things (IoT) network that
connects smart vehicles to the internet, and vehicles with each other. With the emergence of IoV
technology, customers have placed great attention on smart vehicles. However, the rapid growth of
IoV has also caused many security and privacy challenges that can lead to fatal accidents. To reduce
smart vehicle accidents and detect malicious attacks in vehicular networks, several researchers have
Citation: Ullah, S.; Khan, M.A.;
presented machine learning (ML)-based models for intrusion detection in IoT networks. However,
Ahmad, J.; Jamal, S.S.; e Huma, Z.;
Hassan, M.T.; Pitropakis, N.; Arshad;
a proficient and real-time faster algorithm is needed to detect malicious attacks in IoV. This article
Buchanan, W.J. HDL-IDS: A Hybrid proposes a hybrid deep learning (DL) model for cyber attack detection in IoV. The proposed model
Deep Learning Architecture for is based on long short-term memory (LSTM) and gated recurrent unit (GRU). The performance of
Intrusion Detection in the Internet of the proposed model is analyzed by using two datasets—a combined DDoS dataset that contains
Vehicles. Sensors 2022, 22, 1340. CIC DoS, CI-CIDS 2017, and CSE-CIC-IDS 2018, and a car-hacking dataset. The experimental results
https://doi.org/10.3390/s22041340 demonstrate that the proposed algorithm achieves higher attack detection accuracy of 99.5% and
Academic Editor: Yuh-Shyan Chen 99.9% for DDoS and car hacks, respectively. The other performance scores, precision, recall, and
F1-score, also verify the superior performance of the proposed framework.
Received: 10 January 2022
Accepted: 8 February 2022
Keywords: deep learning; gated recurrent units; Internet of Things; Internet of Vehicles; long short-
Published: 10 February 2022
term memory; machine learning
Publisher’s Note: MDPI stays neutral
with regard to jurisdictional claims in
published maps and institutional affil-
iations. 1. Introduction
Internet of Things (IoT) is an advanced technology that connects smart devices to
the internet, such as the Internet of Vehicles (IoV), wireless cameras, and other electronic
devices. Due to the rapid increase of connected vehicles, several security and privacy
Copyright: © 2022 by the authors.
Licensee MDPI, Basel, Switzerland.
challenges have been introduced [1–3]. A basic framework for communications between
This article is an open access article
vehicular networks is IoV [4]. It establishes a dependable network transmission between
distributed under the terms and vehicles [5]. The IoV network consists of two sub-networks—intra-vehicle network and
conditions of the Creative Commons inter-vehicular network. The intra-vehicle network involves internal electronic devices
Attribution (CC BY) license (https:// and sensors of a vehicle, which are connected to a centralized controller for message
creativecommons.org/licenses/by/ transmission and performing a specific task [6]. While an inter-vehicular network connects
4.0/). a vehicle to external devices using vehicle-to-everything (V2X) technology. V2X allows
communication between vehicles and other communicative devices, such as signal antennas
and other roadside infrastructure [7,8].
The security risks increase with the rapid growth in the connectivity of smart vehicles.
An attack on the IoV network can affect stability, reliability, and cause accidents in vehicles.
In June 2021, the World Health Organization (WHO) stated that every year 1.3 million
deaths occur due to car accidents [9]. In a real-life example, two hackers hacked a vehicle,
took control of steering and brakes, and performed dangerous actions at high speed [10].
During a cyber attack on a vehicle network, the attacker takes control of a vehicle,
where he/she can perform dangerous stunts. A hacker has the ability to disable the brakes
or jerk the steering wheel at a high speed, which may potentially lead to an accident. The
attacker can also carry out a distributed denial of service (DDoS) attack, which engages
the car controller area network (CAN) bus and prevents IoV-based vehicles from accessing
the brakes at crucial times [11,12]. DDoS attacks on inter-vehicle networks keep channels
busy, such as not letting traffic signal lights turn red and keeping them green in dangerous
places that may lead to accidents [13].
An intrusion detection system (IDS) is needed to monitor network traffic and detect
malicious attacks. The performance of IDS depends on the accuracy of the detection algo-
rithm. Improving the accuracy of IDS will reduce the false alarm rate. Existing IDSs have
difficulty in improving performance and detecting unknown attacks. Machine learning
(ML) techniques provide automated detection systems with impressive performance. More-
over, ML techniques have general capabilities to detect unknown attacks. Deep learning
(DL) is a branch of ML, whose performance is remarkable. On the basis of performance,
DL methods have become a research “hotspot” [14–16].
The purpose of IDS is to identify different types of malicious network traffic and
computer activities that a regular firewall might miss [17]. From a trained set, ML can
learn essential details. Moreover, ML algorithms handle nonlinear data and are easy to
train [18–20]. A generic cyber attack scenario on smart vehicles is presented in Figure 1.
Several researchers have suggested ML techniques for reducing issues related to smart
vehicles. A proficient and fast algorithm is needed to detect malicious attacks in IoV. DL
algorithms provide more efficient performances than traditional ML algorithms [21–23].
For IDS, some commonly used DL algorithms are convolutional neural network (CNN),
recurrent neural network (RNN), LSTM, and GRU. The CCN is more complex than other
DL algorithms, because it requires data-like images in matrix form; the data must be
normalized and converted into the form of an image matrix [24–29]. The LSTM and GRU
algorithms are effective at detecting malicious assaults over other ML and DL algorithms.
Moreover, in IoV, some vehicles are connected for long time periods in which conventional
ML models fail to convey long-term results. LSTM and GRU algorithms provide good
accuracy in detecting malicious attacks [30].
For better performance, every DL algorithm requires more than one layer. The LSTM
performance on multiple layers is much better than GRU, but the training and response
time is high, while GRU training and response time are better than LSTM, but performance
Sensors 2022, 22, 1340 3 of 20
is low [31]. Improving GRU performance and reducing the response time of LSTM in
multi-layers, this paper presents an HDL-IDS scheme that combines LSTM and GRU
algorithms. This hybrid combination can provide better performance in terms of accuracy
and response time.
Multiple real-time datasets available are generated by different researchers for the
detection of malicious attacks. Some old datasets have data for old attack detections, and
some new datasets have data for new attack detections. In this paper, we used two datasets,
a combined DDoS of CIC DoS, CI-CIDS 2017, and CSE-CIC-IDS 2018 for detection of DDoS
attacks in inter-vehicular networks, and a car-hacking dataset for the detection of DDoS,
fuzzing, and spoofing in an intra-vehicular network [32,33].
Contribution
• This paper suggests pre-processing techniques that include cleaning, shuffling, feature
filtering, and normalization. In pre-processing, the shuffling technique applies to
the dataset that shuffles the dataset in random fashion for training and testing of the
model and improves the performance of the model.
• A novel hybrid technique of LSTM-GRU is presented for intrusion detection in IoV.
• The proposed approach reduces the training and response time and significantly
improves the attack detection accuracy.
The remaining paper is organized as follows. Section 2 presents some of the latest re-
search related to the intrusion detection in IoV. Section 3 comprises mathematical modeling
and overall flow of the proposed architecture. Section 4 discusses the experimental method-
ology. Section 5 presents a brief discussion on experimental findings of the proposed model.
Finally, a brief conclusion is presented in Section 6.
2. Related Work
This section presents some of the latest research contributions related to intrusion
detection in IoV. Ashraf et al. [34] presented a DL-based IDS for intelligent transporta-
tion systems (ITS) that learns the behaviour of regular network traffic in an intra-vehicle
network, V2V communications, and V2I networks. The proposed IDS is based on the
LSTM autoencoder, which recognize anomalous events in IoV from the main gateway.
The evaluation of the model was done with the car-hacking and UNSWNB15 datasets
for intra-vehicle and inter-vehicle communications. Injadat et al. [35] proposed a novel
multi-stage optimized ML-based model for detection of cyber attacks. The main purpose of
this model was to reduce the computational power and provide better performance of the
system. Researchers evaluated the performance of the proposed scheme using CICIDS2017
and UNSW-NB15 datasets.
In another study, Zaidi et al. [36] applied statistical methods to examine the flow
of IoV traffic to find rogue and more malicious nodes. In this technique, the flow of
network traffic was first collected and then intrusion detection was assessed. The proposed
IDS can decide to approve or disapprove the coming data on the basis of traffic flow
insight analysis. The performance of this method is better for detecting rogue and more
malicious nodes. Whenever multiple malicious events occur, the accuracy of this method
becomes low. Anbalagan et al. [37] proposed a memetic-based RSU (M-RSU) model for fast
communications in a wide area. Researchers also proposed a distributed ML (DML) model
for the detection of attacks in the IoV network. Nie et al. [38] proposed a traditional CNN
model to extract the features from RSU and detect the attacks in IoV. Olufowobi et al. [39]
developed an effective algorithm to estimate the real-time arguments of response time
analysis (RTA) model using a black box technique. They presented the SAIDuCANT
IDS paradigm, which specifies desired the behavior of the CAN bus, and then identifies
violations as indicators of a negotiated network. Researchers discussed two new measures,
time to detection (TD) and false positives before attack (FPBA), which assess an IDS
performance, for which SAIDuCANT outperforms existing detection algorithms in terms
of accuracy and consistency.
Sensors 2022, 22, 1340 4 of 20
Zhang et al. [40] generated their own dataset from a real-time vehicular network
and proposed an ANN model for IDS in intra-vehicle networks. The proposed algorithm
improved the accuracy of IDS up to 98% by using gradient descent with momentum (GDM),
and GDM with adaptive gain. Kang et al. [41] developed a deep learning paradigm for IDS
in intra-vehicle networks. The main purpose of the paradigm was to improve the accuracy
of IDS. Researchers worked on binary classifications that were benign and assault data. For
the classification, they calculated the probability of each packet to classify it is an anomaly
or normal packet. Researchers utilized their own generated datasets for training and testing
of the model. Comparisons of the existing study with state-of-the-art models are shown in
Tables 1 and 2. These tables show the existing models with various features in the related
work. The proposed study includes missing features of previous models.
Authors Inter-Vehicle Detection Intra-Vehicle Detection Multiclass Detection Features Filtering Response Time
Ashraf et al. [34] × × High
Injadat et al. [35] × × Low
Zaidi et al. [36] × × × High
Anbalagan et al. [37] × × × Low
Nie et al. [38] × × High
Olufowobi et al. [39] × × × Low
Zhang et al. [40] × × Low
Kang et al. [41] × × Low
Proposed Study Low
3. The Proposed Hybrid Deep Learning Model for Intrusion Detection in IoV
Intrusion in IoV is very dangerous to human life. An attack on inter-vehicular net-
works can disturb the communication between smart vehicles. The vehicle cannot get any
information about road situations. Moreover, an intra-vehicular network is more sensitive
than an inter-vehicular network because, in a vehicle, the main target of the attacker is the
CAN bus. A black hacker can attack the CAN bus of a vehicle that takes control of the
internal main controller of the vehicle, which may cause an accident. To protect human
life, it is essential to deploy the security firewalls against these types of cyber attacks.
Several researchers suggested ML techniques to reduce issues related to smart vehicles. For
multiple layer models, many researchers used LSTM or GRU or combined it with other DL
algorithms for the improvement of performance on the detection rate of malicious attacks
in IoV, but the response time of the system becomes high. LSTM and GRU work on time
series data and always learn from previous time steps.
Sensors 2022, 22, 1340 5 of 20
The vanishing gradient problem of RNN is addressed by the LSTM and GRU. The
performance of multiple layer LSTM for intrusion detection is better, However, the response
time is high. Moreover, the response time of GRU is less, but the performance is not as
good as LSTM [31]. In this paper, we propose a hybrid DL model that combines LSTM
and GRU. The block diagram of the proposed architecture is presented in Figure 2. This
framework contains three layers—LSTM, DENSE, and GRU. The proposed model reduces
the training and response times of multiple layers on LSTM and gives better performance
in detecting malicious attacks in IoV.
Figure 2. Block diagram of the proposed model for intrusion detection in IoV.
3.1. LSTM
LSTM is the first hidden layer of the proposed model. The input to the first hidden
layer is given as (none, 48, 1) for the combined DDoS dataset, and (none, 10, 1) for the car-
hacking dataset. Here, “none” is the dynamic size number of instances, “48” is the number
of features, and “1” is the third dimension value. The output shape of this layer is (none, 48,
24) for combined DDoS and (none, 10, 20) for the car-hacking dataset, which is the input to
the next layer. LSTM has a series of gates for the flow control of information, for example,
how data come in, saves it, and leaves. Moreover, there are two more states—cell state
and hidden state. Typically, LSTM has five activation functions, three sigmoid functions
(one in each gate), and two Tanh functions (one with the input gate and the second with
output gate). Mainly, there are three gates in LSTM—forget, input, and output gates, as
shown in Figure 3. The forget, input, and output gates are mathematically described in
Equations (1)–(3), respectively.
ft = σ w h f h t −1 + w x f x t + b f (1)
Sensors 2022, 22, 1340 6 of 20
ht = tanh(Ct + bh ) ∗ ot (6)
Ct−1 ht
× +
Ct
tanh
×
×
~
ft it Ct ot
σ σ tanh σ
ht−1
Xt ht
3.2. DENSE
DENSE is the second layer in the proposed model to join LSTM with GRU, and gives
quick responses. The DENSE layer gets the values from the previously hidden layer in
the (none, 48, 24) shape for the combined DDoS dataset and the (none, 10, 20) shape for
the car-hacking dataset. This layer is connected to the previous layer. The output shape of
this layer is (none, 48, 12) and (none, 10, 10) for the above-mentioned datasets, respectively,
which is the input to the next layer. We used the rectified linear activation unit (ReLU) in
this layer. The ReLU activation function worked on positive values. In this experiment,
the positive values are between 0 and 1. The speed of the ReLU function is faster than
other activation functions and it also reduces the vanishing gradient problem. The ReLU is
described in Equation (7).
Rx = max(0, x ) (7)
3.3. GRU
GRU is the third layer in the proposed model that takes values from the previous
DENSE layer and produces the final output. The GRU layer gets the values from the
previous layer in the (none, 48, 12) shape for the combined DDoS dataset and the (none,
10, 10) shape for the car-hacking dataset. This layer produces the output probability. GRU
has two gates—reset gate and update gate, and one hidden state. There are two sigmoid
activation functions in GRU (one in each gate) and one Tanh function for the output shown
Sensors 2022, 22, 1340 7 of 20
in Figure 4. For multi-class detection, the softmax activation function is used. The reset and
updated gates are described in Equations (8) and (9), respectively.
× +
ht−1 ht
1-
× ×
~
rt ut ht
σ σ tanh
Xt
Figure 4. Basic architecture of GRU.
4. Experimental Methodology
In this section, a detailed experimental methodology is presented. This section contains
dataset description, preprocessing, and feature selection process.
4.1. Datasets
There are multiple real-time network datasets available for intrusion detection, such
as DARPA, NSL-KDD, CIC DoS dataset 2016, CICIDS 2017, CSE-CIC-IDS 2018 AWS, and
CIC-DDoS 2019. For this experiment, we used two datasets—a combined DDoS dataset
for the inter-vehicular network and a car-hacking dataset for the intra-vehicle network, as
shown in Table 3.
4.2. Cleaning
Each dataset has multiple records. A dataset must be checked before training the
model for empty and undefined records. For the cleaning, we used python libraries (Pandas
and NumPy) and functions to check the dataset for missing and infinite values, which
returned Boolean values, true or false. True meant there were some missing or infinite
values and false meant the dataset was clean. In our experiments, two datasets were
utilized that had some undefined and empty records. To clean these datasets, all undefined
records were converted into empty records. After conversion of undefined values to empty,
all empty records were removed from the datasets.
4.3. Shuffling
This technique is used to shuffle dataset tuples. In our experiments, the combined
balance DDoS dataset was used for the inter-vehicular network that had two classes—
benign and DDoS. The second was the car-hacking dataset, which was used for intra-
vehicle networks. Data in the combined dataset were arranged in a sequential form, such as
complete data of one class then complete data of the second class. The training and testing
of the model required both types of data. To improve the performance of the model, and
for better testing, it required shuffled data. The shuffling method was used to shuffle all of
the data in a random fashion.
When we trained the proposed model with all 84 features of the combined dataset
and all 12 features of the car-hacking dataset, the performance of the model declined and
gave 49.71% and 82.35% accuracies, respectively. To improve the performance of the model,
the features of the dataset have to be reduced and the unimportant features have to be
eliminated. There are mainly three methods for feature selection—wrapper, filter, and
intrinsic methods. In this work, the filter method was used. The extra tree classifier (ETC)
method was used in the feature filtering. This method ranks all features according to
their entropy, as shown in Figures 5 and 6. All features with values greater than 0.0017
were selected. After ranking removed the unimportant and very low-rank features that
could not affect the output class, the remaining important features were 48; one was the
label of the combined dataset and 10 important features, and one was the label of the
car-hacking dataset.
4.6. Normalization
Normalization is a technique to scale the numeric values between the common scale
ranges and remove problems from the dataset, such as different values in different features;
for example, one feature values between 0 and 1 and the other feature values 100 and
1000, so it can affect the training of the model. In our experiments, the dataset has very
large values in some features and very small values, such as negative values. To address
this problem, firstly, the categorical features were converted into numerical values. Each
feature had multiple categories, for which one-hot-encoding required larger memory and
was time-consuming [44]. In this experiment, we used the label encoder technique for the
conversion of categorical attributes to numerical. After the conversion, we used the min–
max normalization technique to normalized values between 0 and 1 by using Equation (12).
x − xmin
Xnorm = (12)
xmax − xmin
TP + TN
Accuracy = (13)
TP + TN + FP + FN
TP
Precision = (14)
TP + FP
TP
Recall = (15)
TP + FN
2 ∗ ( Pression ∗ Recall )
F1-measure = (16)
Pression + Recall
The model performance was tested for the response time on the combined DDoS
dataset. Testing of the model was conducted with 20% of pre-processed data of the dataset.
The time testing was is also conducted for three models—LSTM, GRU, and the proposed
model. The proposed model was tested with 2,549,370 instances of the combined DDoS
dataset, which were 79,668 batches of size 32. The total testing time was 692 s, as shown
in Figure 13, and each batch took 8.7 ms. There were 32 instances in each batch and the
response time of each instance was 0.27 ms. The total testing times of LSTM and GRU for
the same instances were 1307.33 and 1116 s, respectively. The testing response time shows
that the proposed model is faster than LSTM and GRU.
(a) (b)
Figure 10. Adam training on the combined DDoS dataset. (a) Adam training accuracy on the
combined dataset, (b) Adam training loss on the combined dataset.
(a) (b)
Figure 11. Nadam Training on Combined DDoS dataset. (a) Nadam Training Accuracy on Combined
dataset, (b) Nadam Training Loss on Combined dataset.
(a) (b)
Figure 12. Adamax training on the combined DDoS dataset. (a) Adamax training accuracy on the
combined dataset, (b) Adamax training loss on the combined dataset.
Sensors 2022, 22, 1340 14 of 20
(a) (b)
Figure 17. Adam training on the car-hacking dataset. (a) Adam training accuracy on car-hacking.
Dataset; (b) Adam training loss on car-hacking. Dataset.
(a) (b)
Figure 18. Nadam Training on the car-hacking dataset. (a) Nadam training accuracy on car-hacking.
dataset; (b) Nadam training loss on car-hacking. dataset.
(a) (b)
Figure 19. Adamax training on car-hacking dataset. (a) Adamax training accuracy on car-hacking.
dataset; (b) Adamax training loss on car-hacking. dataset.
Sensors 2022, 22, 1340 17 of 20
The model performance was tested for the response time on the car-hacking dataset.
Testing of the model was conducted with 20% of the pre-processed data of the dataset. The
time testing process was also conducted for three models, such as LSTM GRU and the
proposed model. The proposed model was tested with 1,001,720 instances of the dataset,
which are 31,304 batches of size 32. The total testing time was 51 s, as shown in Figure 20,
and each batch took 1.62 ms. There were 32 instances in each batch and the response time of
each instance was 0.05 ms. The total testing time of LSTM and GRU for the same instances
were 72 and 67 s, respectively. The testing response time shows that the proposed model is
faster than LSTM and GRU.
5.5. Discussion
The experimental results show that the proposed model gives better performance in
less response time as compared to other models. The proposed scheme can detect both
binary and multi-class cyber attacks in less response time. We observed the proposed
model with different optimizers for both datasets. The results show different values for
each optimizer. The Adam and Nadam optimizers give better results than the Adamax
optimizer. In this experiment, we obtained the highest results with Nadam on the proposed
model and LSTM for both binary and multi-classification. In this work, we used k-fold cross-
validations to test the performance of the proposed system. Moreover, 3-fold, 5-fold, and
7-fold for both DDoS and car-hacking datasets were used. The performance of the proposed
system remained the same and the results are tabulated in Tables 4 and 5. Comparison
of the proposed study with other ML algorithms are highlighted in Tables 4 and 5. The
performance of LSTM is equivalent to the proposed model, but the response time is high,
while the GRU model gives less performance than LSTM and the proposed model. The
combination of LSTM and GRU with the ReLU DENSE layer gave a quick response.
Deep layers of LSTM and GRU gave better results, but were time consuming. From the
experimental results, the propose model gave above 99% results for binary and multi-
class classification.
Table 4. Comparison of the HDL-IDS with other ML algorithms on the combined DDoS dataset.
Table 5. Comparison of the HDL-IDS with other ML algorithms on the car-hacking 2020 dataset.
6. Conclusions
The extensive growth of smart vehicular networks has opened up several doors for
cybercriminals. Attacks on intra-vehicle networks can cause deaths and severe accidents.
This research proposes a hybrid DL-based model for intrusion detection in IoV. The pro-
posed scheme contains a hybrid combination of LSTM and GRU that reduces the training
and response time. The performance of the proposed approach was evaluated by con-
ducting extensive experiments on a combined dataset of CIC DoS 2016, CICIDS 2017, and
CSE-CIC-IDS 2018, and car-hacking datasets. The experimental results demonstrate that
the proposed model achieves 99.5% accuracy for the combined DDoS dataset and 99.9% for
the car-hacking dataset, respectively.
Author Contributions: Data curation, S.U., M.A.K., M.T.H. and A.; Formal analysis, S.U.; Funding
acquisition, J.A., A. and N.P.; Investigation, J.A., S.S.J., Z.e.H., M.T.H. and N.P.; Methodology, S.U.
and Z.e.H.; Project administration, S.U.; Resources, S.U., M.A.K., J.A., S.S.J. and N.P.; Software,
S.U.; Supervision, M.A.K., J.A., S.S.J., N.P. and W.J.B.; Validation, M.T.H. and A.; Visualization, S.S.J.
and Z.e.H.; Writing—original draft, S.U.; Writing—review & editing, J.A., S.S.J., N.P. and W.J.B. All
authors have read and agreed to the published version of the manuscript.
Funding: Sajjad Shaukat Jamal extends his gratitude to the Deanship of Scientific Research at King
Khalid University for funding this work through a research group program, under grant number R.
G. P. 1/399/42.
Institutional Review Board Statement: Not applicable.
Informed Consent Statement: Not applicable.
Data Availability Statement: The publicly available data set can be found at: https://ocslab.
hksecurity.net/Datasets/CAN-intrusion-dataset and https://www.kaggle.com/devendra416/ddos-
datasets.
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Mehedi, S.; Anwar, A.; Rahman, Z.; Ahmed, K. Deep Transfer Learning Based Intrusion Detection System for Electric Vehicular
Networks. Sensors 2021, 21, 4736. [CrossRef] [PubMed]
2. Li, J.; Zhao, Z.; Li, R.; Zhang, H. Ai-based two-stage intrusion detection for software defined iot networks. IEEE Internet Things J.
2018, 6, 2093–2102. [CrossRef]
3. Lydia, E.L.; Jovith, A.A.; Devaraj, A.F.S.; Seo, C.; Joshi, G.P. Green Energy Efficient Routing with Deep Learning Based Anomaly
Detection for Internet of Things (IoT) Communications. Mathematics 2021, 9, 500. doi: 10.3390/math9050500. [CrossRef]
4. Kim, D.Y.; Jung, M.; Kim, S. An internet of vehicles (IoV) access gateway design considering the efficiency of the in-vehicle
ethernet backbone. Sensors 2021, 21, 98. [CrossRef] [PubMed]
5. Yang, L.; Moubayed, A.; Shami, A. MTH-IDS: A Multi-Tiered Hybrid Intrusion Detection System for Internet of Vehicles. IEEE
Internet Things J. 2021, 9, 616–632. [CrossRef]
6. Liu, J.; Zhang, S.; Sun, W.; Shi, Y. In-vehicle network attacks and countermeasures: Challenges and future directions. IEEE Netw.
2017, 31, 50–58. [CrossRef]
7. Yang, L. Comprehensive Visibility Indicator Algorithm for Adaptable Speed Limit Control in Intelligent Transportation Systems.
Ph.D. Thesis, University of Guelph, Guelph, ON, Canada, 2018.
Sensors 2022, 22, 1340 19 of 20
8. Xiao, Z.; Dai, X.; Jiang, H.; Wang, D.; Chen, H.; Yang, L.; Zeng, F. Vehicular task offloading via heat-aware MEC cooperation
using game-theoretic method. IEEE Internet Things J. 2019, 7, 2038–2052. [CrossRef]
9. WHO. Global Status Report on Road Safety. 2021. Available online: https://www.who.int/news-room/fact-sheets/detail/road-
traffic-injuries (accessed on 26 January 2022).
10. Golson, J. Jeep Hackers at It Again, This Time Taking Control of Steering and Braking Systems. 2 August 2016. Available
online: https://www.theverge.com/2016/8/2/12353186/car-hack-jeep-cherokee-vulnerability-miller-valasek (accessed on 26
January 2022).
11. Nie, S.; Liu, L.; Du, Y. Free-fall: Hacking tesla from wireless to can bus. Brief. Black Hat USA 2017, 25, 1–16.
12. Miller, C.; Valasek, C. Adventures in automotive networks and control units. Def Con 2013, 21, 15–31.
13. Liu, J.; Li, J.; Zhang, L.; Dai, F.; Zhang, Y.; Meng, X.; Shen, J. Secure intelligent traffic light control using fog computing. Future
Gener. Comput. Syst. 2018, 78, 817–824. [CrossRef]
14. Liu, H.; Lang, B. Machine learning and deep learning methods for intrusion detection systems: A survey. Appl. Sci. 2019, 9, 4396.
[CrossRef]
15. Chen, X.; Zhang, H.; Wu, C.; Mao, S.; Ji, Y.; Bennis, M. Optimized computation offloading performance in virtual edge computing
systems via deep reinforcement learning. IEEE Internet Things J. 2018, 6, 4005–4018. [CrossRef]
16. Yang, Q.; Liu, Y.; Chen, T.; Tong, Y. Federated machine learning: Concept and applications. ACM Trans. Intell. Syst. Technol.
(TIST) 2019, 10, 12. [CrossRef]
17. Khraisat, A.; Gondal, I.; Vamplew, P.; Kamruzzaman, J. Survey of intrusion detection systems: Techniques, datasets and challenges.
Cybersecurity 2019, 2, 20. [CrossRef]
18. Gao, Z.J.; Pansare, N.; Jermaine, C. Declarative Parameterizations of User-Defined Functions for Large-Scale Machine Learning
and Optimization. IEEE Trans. Knowl. Data Eng. 2018, 31, 2079–2092. [CrossRef]
19. Golovin, D.; Solnik, B.; Moitra, S.; Kochanski, G.; Karro, J.; Sculley, D. Google vizier: A service for black-box optimization. In
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada,
13–17 August 2017; pp. 1487–1495.
20. Singh, A.; Kotiyal, V.; Sharma, S.; Nagar, J.; Lee, C.C. A Machine Learning Approach to Predict the Average Localization Error
With Applications to Wireless Sensor Networks. IEEE Access 2020, 8, 208253–208263. doi: 10.1109/ACCESS.2020.3038645.
[CrossRef]
21. Latif, S.; e Huma, Z.; Jamal, S.S.; Ahmed, F.; Ahmad, J.; Zahid, A.; Dashtipour, K.; Muhmmad, U.A.; Ahmad, M.; Abbasi, Q.H.
Intrusion Detection Framework for the Internet of Things using a Dense Random Neural Network. IEEE Trans. Ind. Inform. 2021,
1–10. [CrossRef]
22. Ferrag, M.A.; Maglaras, L.; Moschoyiannis, S.; Janicke, H. Deep learning for cyber security intrusion detection: Approaches,
datasets, and comparative study. J. Inf. Secur. Appl. 2020, 50, 102419. [CrossRef]
23. Zhang, S.; Xie, X.; Xu, Y. A Practical Method to Attack Deep Learning Based Host Intrusion Detection Systems. Int. J. Netw. Secur.
2021, 23, 663–676.
24. Thapa, K.N.K.; Duraipandian, N. Malicious Traffic classification Using Long Short-Term Memory (LSTM) Model. Wirel. Pers.
Commun. 2021, 119, 2707–2724. [CrossRef]
25. Latif, S.; Driss, M.; Boulila, W.; Jamal, S.S.; Idrees, Z.; Ahmad, J. Deep Learning for the Industrial Internet of Things (IIoT): A
Comprehensive Survey of Techniques, Implementation Frameworks, Potential Applications, and Future Directions. Sensors 2021,
21, 7518. [CrossRef] [PubMed]
26. Bai, J.; Ding, B.; Xiao, Z.; Jiao, L.; Chen, H.; Regan, A.C. Hyperspectral Image Classification Based on Deep Attention Graph
Convolutional Network. IEEE Trans. Geosci. Remote Sens. 2021, 60, 5504316. [CrossRef]
27. Goodfellow, I.; Bengio, Y.; Courville, A. Deep Learning; MIT Press: Cambridge, MA, USA, 2016.
28. Liu, W.; Chen, L.; Chen, Y.; Zhang, W. Accelerating Federated Learning via Momentum Gradient Descent. IEEE Trans. Parallel
Distrib. Syst. 2020, 31, 1754–1766. doi: 10.1109/TPDS.2020.2975189. [CrossRef]
29. Fanjiang, Y.Y.; Lee, C.C.; Du, Y.T.; Horng, S.J. Palm Vein Recognition Based on Convolutional Neural Network. Informatica 2021,
32, 687–708. [CrossRef]
30. Putchala, M.K. Deep Learning Approach for Intrusion Detection System (IDS) in the Internet of Things (IoT) Network Using
Gated Recurrent Neural Networks (GRU). Master’s Thesis, Wright State University, Dayton, OH, USA, 2017 .
31. Chawla, A.; Lee, B.; Fallon, S.; Jacob, P. Host based intrusion detection system with combined CNN/RNN model. In Proceedings
of the Joint European Conference on Machine Learning and Knowledge Discovery in Databases, Dublin, Ireland, 10–14 September
2018; pp. 149–158.
32. Prasad, M.D.; Babu, V.P.; Amarnath, C. Machine Learning DDoS Detection Using Stochastic Gradient Boosting. Int. J. Comput.
Sci. Eng. 2019, 7, 157–166. doi: doi: 10.26438/ijcse/v7i4.157166. [CrossRef]
33. Hossain, M.D.; Inoue, H.; Ochiai, H.; Fall, D.; Kadobayashi, Y. LSTM-based intrusion detection system for in-vehicle can bus
communications. IEEE Access 2020, 8, 185489–185502. [CrossRef]
34. Ashraf, J.; Bakhshi, A.D.; Moustafa, N.; Khurshid, H.; Javed, A.; Beheshti, A. Novel Deep Learning-Enabled LSTM Autoencoder
Architecture for Discovering Anomalous Events From Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 2021,
22, 4507–4518. doi: 10.1109/TITS.2020.3017882. [CrossRef]
Sensors 2022, 22, 1340 20 of 20
35. Injadat, M.; Moubayed, A.; Nassif, A.B.; Shami, A. Multi-stage optimized machine learning framework for network intrusion
detection. IEEE Trans. Netw. Serv. Manag. 2020, 18, 1803–1816. [CrossRef]
36. Zaidi, K.; Milojevic, M.B.; Rakocevic, V.; Nallanathan, A.; Rajarajan, M. Host-based intrusion detection for vanets: A statistical
approach to rogue node detection. IEEE Trans. Veh. Technol. 2015, 65, 6703–6714. [CrossRef]
37. Anbalagan, S.; Bashir, A.K.; Raja, G.; Dhanasekaran, P.; Vijayaraghavan, G.; Tariq, U.; Guizani, M. Machine Learning-based
Efficient and Secure RSU Placement Mechanism for Software Defined-IoV. IEEE Internet Things J. 2021, 8, 13950–13957. [CrossRef]
38. Nie, L.; Ning, Z.; Wang, X.; Hu, X.; Cheng, J.; Li, Y. Data-driven intrusion detection for intelligent Internet of vehicles: A deep
convolutional neural network-based method. IEEE Trans. Netw. Sci. Eng. 2020, 7, 2219–2230. [CrossRef]
39. Olufowobi, H.; Young, C.; Zambreno, J.; Bloom, G. SAIDuCANT: Specification-based automotive intrusion detection using
controller area network (can) timing. IEEE Trans. Veh. Technol. 2020, 69, 1484–1494 doi: 10.1109/TVT.2019.2961344. [CrossRef]
40. Zhang, Y.; Li, P.; Wang, X. Intrusion detection for IoT based on improved genetic algorithm and deep belief network. IEEE Access
2019, 7, 31711–31722. [CrossRef]
41. Kang, M.J.; Kang, J.W. Intrusion detection system using deep neural network for in-vehicle network security. PLoS ONE 2016,
11, e0155781. [CrossRef] [PubMed]
42. Salim, M.M.; Rathore, S.; Park, J.H. Distributed denial of service attacks and its defenses in IoT: A survey. J. Supercomput. 2020,
76, 5320–5363. [CrossRef]
43. Lohachab, A.; Karambir, B. Critical analysis of DDoS—An emerging security threat over IoT networks. J. Commun. Inf. Netw.
2018, 3, 57–78. [CrossRef]
44. Dahouda, M.K.; Joe, I. A Deep-Learned Embedding Technique for Categorical Features Encoding. IEEE Access 2021, 9, 114381–
114391. [CrossRef]
45. Li, J.; Liu, M.; Xue, Z.; Fan, X.; He, X. RTVD: A Real-Time Volumetric Detection Scheme for DDoS in the Internet of Things. IEEE
Access 2020, 8, 36191–36201. doi: 10.1109/ACCESS.2020.2974293. [CrossRef]
46. Osibo, B.K.; Zhang, C.; Xia, C.; Zhao, G.; Jin, Z. Security and Privacy in 5G Internet of Vehicles (IoV) Environment. J. Internet
Things 2021, 3, 77. [CrossRef]
47. Li, Z.; Kong, Y.; Wang, C.; Jiang, C. DDoS Mitigation Based on Space-Time Flow Regularities in IoV: A Feature Adaption
Reinforcement Learning Approach. IEEE Trans. Intell. Transp. Syst. 2021, 1–17. doi: 10.1109/TITS.2021.3066404. [CrossRef]
48. Lee, H.; Jeong, S.H.; Kim, H.K. OTIDS: A Novel Intrusion Detection System for In-vehicle Network by Using Remote Frame. In
Proceedings of the 2017 15th Annual Conference on Privacy, Security and Trust (PST), Calgary, AB, Canada, 28–30 August 2017;
pp. 57–5709. doi: 10.1109/PST.2017.00017. [CrossRef]