0% found this document useful (0 votes)
9 views

LSTM-GRU

The document presents HDL-IDS, a hybrid deep learning architecture combining LSTM and GRU for intrusion detection in the Internet of Vehicles (IoV), addressing security challenges posed by increasing connectivity of smart vehicles. The proposed model demonstrates high accuracy in detecting cyber attacks, achieving 99.5% for DDoS and 99.9% for car hacks, while also improving response times compared to traditional models. The study emphasizes the need for efficient algorithms to enhance the safety and reliability of vehicular networks against malicious threats.

Uploaded by

maabmaab303
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

LSTM-GRU

The document presents HDL-IDS, a hybrid deep learning architecture combining LSTM and GRU for intrusion detection in the Internet of Vehicles (IoV), addressing security challenges posed by increasing connectivity of smart vehicles. The proposed model demonstrates high accuracy in detecting cyber attacks, achieving 99.5% for DDoS and 99.9% for car hacks, while also improving response times compared to traditional models. The study emphasizes the need for efficient algorithms to enhance the safety and reliability of vehicular networks against malicious threats.

Uploaded by

maabmaab303
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

sensors

Article
HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion
Detection in the Internet of Vehicles
Safi Ullah 1 , Muazzam A. Khan 1,2 , Jawad Ahmad 3, * , Sajjad Shaukat Jamal 4 , Zil e Huma 5 ,
Muhammad Tahir Hassan 6 , Nikolaos Pitropakis 3 , Arshad 7 and William J. Buchanan 3

1 Department of Computer Science, Quaid-i-Azam University, Islamabad 44000, Pakistan;


[email protected] (S.U.); [email protected] (M.A.K.)
2 Pakistan Academy of Sciences, Islamabad 44000, Pakistan
3 School of Computing, Edinburgh Napier University, Edinburgh EH10 5DT, UK;
[email protected] (N.P.); [email protected] (W.J.B.)
4 Department of Mathematics, College of Science, King Khalid University, Abha 61413, Saudi Arabia;
[email protected]
5 Department of Electrical Engineering, Institute of Space Technology, Islamabad 44000, Pakistan;
[email protected]
6 Department of Mechanical Engineering, Bahauddin Zakariya University, Multan 66000, Pakistan;
[email protected]
7 Institute for Energy and Environment, University of Strathclyde, Glasgow G1 1XQ, UK;
[email protected]
* Correspondence: [email protected]

Abstract: Internet of Vehicles (IoV) is an application of the Internet of Things (IoT) network that
connects smart vehicles to the internet, and vehicles with each other. With the emergence of IoV
technology, customers have placed great attention on smart vehicles. However, the rapid growth of
 IoV has also caused many security and privacy challenges that can lead to fatal accidents. To reduce

smart vehicle accidents and detect malicious attacks in vehicular networks, several researchers have
Citation: Ullah, S.; Khan, M.A.;
presented machine learning (ML)-based models for intrusion detection in IoT networks. However,
Ahmad, J.; Jamal, S.S.; e Huma, Z.;
Hassan, M.T.; Pitropakis, N.; Arshad;
a proficient and real-time faster algorithm is needed to detect malicious attacks in IoV. This article
Buchanan, W.J. HDL-IDS: A Hybrid proposes a hybrid deep learning (DL) model for cyber attack detection in IoV. The proposed model
Deep Learning Architecture for is based on long short-term memory (LSTM) and gated recurrent unit (GRU). The performance of
Intrusion Detection in the Internet of the proposed model is analyzed by using two datasets—a combined DDoS dataset that contains
Vehicles. Sensors 2022, 22, 1340. CIC DoS, CI-CIDS 2017, and CSE-CIC-IDS 2018, and a car-hacking dataset. The experimental results
https://doi.org/10.3390/s22041340 demonstrate that the proposed algorithm achieves higher attack detection accuracy of 99.5% and
Academic Editor: Yuh-Shyan Chen 99.9% for DDoS and car hacks, respectively. The other performance scores, precision, recall, and
F1-score, also verify the superior performance of the proposed framework.
Received: 10 January 2022
Accepted: 8 February 2022
Keywords: deep learning; gated recurrent units; Internet of Things; Internet of Vehicles; long short-
Published: 10 February 2022
term memory; machine learning
Publisher’s Note: MDPI stays neutral
with regard to jurisdictional claims in
published maps and institutional affil-
iations. 1. Introduction
Internet of Things (IoT) is an advanced technology that connects smart devices to
the internet, such as the Internet of Vehicles (IoV), wireless cameras, and other electronic
devices. Due to the rapid increase of connected vehicles, several security and privacy
Copyright: © 2022 by the authors.
Licensee MDPI, Basel, Switzerland.
challenges have been introduced [1–3]. A basic framework for communications between
This article is an open access article
vehicular networks is IoV [4]. It establishes a dependable network transmission between
distributed under the terms and vehicles [5]. The IoV network consists of two sub-networks—intra-vehicle network and
conditions of the Creative Commons inter-vehicular network. The intra-vehicle network involves internal electronic devices
Attribution (CC BY) license (https:// and sensors of a vehicle, which are connected to a centralized controller for message
creativecommons.org/licenses/by/ transmission and performing a specific task [6]. While an inter-vehicular network connects
4.0/). a vehicle to external devices using vehicle-to-everything (V2X) technology. V2X allows

Sensors 2022, 22, 1340. https://doi.org/10.3390/s22041340 https://www.mdpi.com/journal/sensors


Sensors 2022, 22, 1340 2 of 20

communication between vehicles and other communicative devices, such as signal antennas
and other roadside infrastructure [7,8].
The security risks increase with the rapid growth in the connectivity of smart vehicles.
An attack on the IoV network can affect stability, reliability, and cause accidents in vehicles.
In June 2021, the World Health Organization (WHO) stated that every year 1.3 million
deaths occur due to car accidents [9]. In a real-life example, two hackers hacked a vehicle,
took control of steering and brakes, and performed dangerous actions at high speed [10].
During a cyber attack on a vehicle network, the attacker takes control of a vehicle,
where he/she can perform dangerous stunts. A hacker has the ability to disable the brakes
or jerk the steering wheel at a high speed, which may potentially lead to an accident. The
attacker can also carry out a distributed denial of service (DDoS) attack, which engages
the car controller area network (CAN) bus and prevents IoV-based vehicles from accessing
the brakes at crucial times [11,12]. DDoS attacks on inter-vehicle networks keep channels
busy, such as not letting traffic signal lights turn red and keeping them green in dangerous
places that may lead to accidents [13].
An intrusion detection system (IDS) is needed to monitor network traffic and detect
malicious attacks. The performance of IDS depends on the accuracy of the detection algo-
rithm. Improving the accuracy of IDS will reduce the false alarm rate. Existing IDSs have
difficulty in improving performance and detecting unknown attacks. Machine learning
(ML) techniques provide automated detection systems with impressive performance. More-
over, ML techniques have general capabilities to detect unknown attacks. Deep learning
(DL) is a branch of ML, whose performance is remarkable. On the basis of performance,
DL methods have become a research “hotspot” [14–16].
The purpose of IDS is to identify different types of malicious network traffic and
computer activities that a regular firewall might miss [17]. From a trained set, ML can
learn essential details. Moreover, ML algorithms handle nonlinear data and are easy to
train [18–20]. A generic cyber attack scenario on smart vehicles is presented in Figure 1.
Several researchers have suggested ML techniques for reducing issues related to smart
vehicles. A proficient and fast algorithm is needed to detect malicious attacks in IoV. DL
algorithms provide more efficient performances than traditional ML algorithms [21–23].
For IDS, some commonly used DL algorithms are convolutional neural network (CNN),
recurrent neural network (RNN), LSTM, and GRU. The CCN is more complex than other
DL algorithms, because it requires data-like images in matrix form; the data must be
normalized and converted into the form of an image matrix [24–29]. The LSTM and GRU
algorithms are effective at detecting malicious assaults over other ML and DL algorithms.
Moreover, in IoV, some vehicles are connected for long time periods in which conventional
ML models fail to convey long-term results. LSTM and GRU algorithms provide good
accuracy in detecting malicious attacks [30].

Figure 1. A cyber attack scenario in smart vehicle.

For better performance, every DL algorithm requires more than one layer. The LSTM
performance on multiple layers is much better than GRU, but the training and response
time is high, while GRU training and response time are better than LSTM, but performance
Sensors 2022, 22, 1340 3 of 20

is low [31]. Improving GRU performance and reducing the response time of LSTM in
multi-layers, this paper presents an HDL-IDS scheme that combines LSTM and GRU
algorithms. This hybrid combination can provide better performance in terms of accuracy
and response time.
Multiple real-time datasets available are generated by different researchers for the
detection of malicious attacks. Some old datasets have data for old attack detections, and
some new datasets have data for new attack detections. In this paper, we used two datasets,
a combined DDoS of CIC DoS, CI-CIDS 2017, and CSE-CIC-IDS 2018 for detection of DDoS
attacks in inter-vehicular networks, and a car-hacking dataset for the detection of DDoS,
fuzzing, and spoofing in an intra-vehicular network [32,33].

Contribution
• This paper suggests pre-processing techniques that include cleaning, shuffling, feature
filtering, and normalization. In pre-processing, the shuffling technique applies to
the dataset that shuffles the dataset in random fashion for training and testing of the
model and improves the performance of the model.
• A novel hybrid technique of LSTM-GRU is presented for intrusion detection in IoV.
• The proposed approach reduces the training and response time and significantly
improves the attack detection accuracy.
The remaining paper is organized as follows. Section 2 presents some of the latest re-
search related to the intrusion detection in IoV. Section 3 comprises mathematical modeling
and overall flow of the proposed architecture. Section 4 discusses the experimental method-
ology. Section 5 presents a brief discussion on experimental findings of the proposed model.
Finally, a brief conclusion is presented in Section 6.

2. Related Work
This section presents some of the latest research contributions related to intrusion
detection in IoV. Ashraf et al. [34] presented a DL-based IDS for intelligent transporta-
tion systems (ITS) that learns the behaviour of regular network traffic in an intra-vehicle
network, V2V communications, and V2I networks. The proposed IDS is based on the
LSTM autoencoder, which recognize anomalous events in IoV from the main gateway.
The evaluation of the model was done with the car-hacking and UNSWNB15 datasets
for intra-vehicle and inter-vehicle communications. Injadat et al. [35] proposed a novel
multi-stage optimized ML-based model for detection of cyber attacks. The main purpose of
this model was to reduce the computational power and provide better performance of the
system. Researchers evaluated the performance of the proposed scheme using CICIDS2017
and UNSW-NB15 datasets.
In another study, Zaidi et al. [36] applied statistical methods to examine the flow
of IoV traffic to find rogue and more malicious nodes. In this technique, the flow of
network traffic was first collected and then intrusion detection was assessed. The proposed
IDS can decide to approve or disapprove the coming data on the basis of traffic flow
insight analysis. The performance of this method is better for detecting rogue and more
malicious nodes. Whenever multiple malicious events occur, the accuracy of this method
becomes low. Anbalagan et al. [37] proposed a memetic-based RSU (M-RSU) model for fast
communications in a wide area. Researchers also proposed a distributed ML (DML) model
for the detection of attacks in the IoV network. Nie et al. [38] proposed a traditional CNN
model to extract the features from RSU and detect the attacks in IoV. Olufowobi et al. [39]
developed an effective algorithm to estimate the real-time arguments of response time
analysis (RTA) model using a black box technique. They presented the SAIDuCANT
IDS paradigm, which specifies desired the behavior of the CAN bus, and then identifies
violations as indicators of a negotiated network. Researchers discussed two new measures,
time to detection (TD) and false positives before attack (FPBA), which assess an IDS
performance, for which SAIDuCANT outperforms existing detection algorithms in terms
of accuracy and consistency.
Sensors 2022, 22, 1340 4 of 20

Zhang et al. [40] generated their own dataset from a real-time vehicular network
and proposed an ANN model for IDS in intra-vehicle networks. The proposed algorithm
improved the accuracy of IDS up to 98% by using gradient descent with momentum (GDM),
and GDM with adaptive gain. Kang et al. [41] developed a deep learning paradigm for IDS
in intra-vehicle networks. The main purpose of the paradigm was to improve the accuracy
of IDS. Researchers worked on binary classifications that were benign and assault data. For
the classification, they calculated the probability of each packet to classify it is an anomaly
or normal packet. Researchers utilized their own generated datasets for training and testing
of the model. Comparisons of the existing study with state-of-the-art models are shown in
Tables 1 and 2. These tables show the existing models with various features in the related
work. The proposed study includes missing features of previous models.

Table 1. A comparison of existing studies related to intrusion detection in IoV.

Authors Inter-Vehicle Detection Intra-Vehicle Detection Multiclass Detection Features Filtering Response Time
Ashraf et al. [34] × × High
Injadat et al. [35] × × Low
Zaidi et al. [36] × × × High
Anbalagan et al. [37] × × × Low
Nie et al. [38] × × High
Olufowobi et al. [39] × × × Low
Zhang et al. [40] × × Low
Kang et al. [41] × × Low
Proposed Study Low

Table 2. Comparison of the HDL-IDS with the state-of-the-art models.

Authors Dataset Attack Detection Mechanism


Ashraf et al. [34] Car Hack and UNSWNB15 LSTM
Injadat et al. [35] CICIDS 2017 and UNSW-NB 2015 NIDS
Anbalagan et al. [37] Network traffic ANN base SD-IoV
Nie et al. [38] Network traffic CNN
Olufowobi et al. [39] CAN SAIDuCANT
Zhang et al. [40] NSL-KDD Deep Belief Network (DBN)
Kang et al. [41] CAN DBN
Proposed Study Combined DDoS and Car Hack2020 HDL-IDS

3. The Proposed Hybrid Deep Learning Model for Intrusion Detection in IoV
Intrusion in IoV is very dangerous to human life. An attack on inter-vehicular net-
works can disturb the communication between smart vehicles. The vehicle cannot get any
information about road situations. Moreover, an intra-vehicular network is more sensitive
than an inter-vehicular network because, in a vehicle, the main target of the attacker is the
CAN bus. A black hacker can attack the CAN bus of a vehicle that takes control of the
internal main controller of the vehicle, which may cause an accident. To protect human
life, it is essential to deploy the security firewalls against these types of cyber attacks.
Several researchers suggested ML techniques to reduce issues related to smart vehicles. For
multiple layer models, many researchers used LSTM or GRU or combined it with other DL
algorithms for the improvement of performance on the detection rate of malicious attacks
in IoV, but the response time of the system becomes high. LSTM and GRU work on time
series data and always learn from previous time steps.
Sensors 2022, 22, 1340 5 of 20

The vanishing gradient problem of RNN is addressed by the LSTM and GRU. The
performance of multiple layer LSTM for intrusion detection is better, However, the response
time is high. Moreover, the response time of GRU is less, but the performance is not as
good as LSTM [31]. In this paper, we propose a hybrid DL model that combines LSTM
and GRU. The block diagram of the proposed architecture is presented in Figure 2. This
framework contains three layers—LSTM, DENSE, and GRU. The proposed model reduces
the training and response times of multiple layers on LSTM and gives better performance
in detecting malicious attacks in IoV.

Figure 2. Block diagram of the proposed model for intrusion detection in IoV.

3.1. LSTM
LSTM is the first hidden layer of the proposed model. The input to the first hidden
layer is given as (none, 48, 1) for the combined DDoS dataset, and (none, 10, 1) for the car-
hacking dataset. Here, “none” is the dynamic size number of instances, “48” is the number
of features, and “1” is the third dimension value. The output shape of this layer is (none, 48,
24) for combined DDoS and (none, 10, 20) for the car-hacking dataset, which is the input to
the next layer. LSTM has a series of gates for the flow control of information, for example,
how data come in, saves it, and leaves. Moreover, there are two more states—cell state
and hidden state. Typically, LSTM has five activation functions, three sigmoid functions
(one in each gate), and two Tanh functions (one with the input gate and the second with
output gate). Mainly, there are three gates in LSTM—forget, input, and output gates, as
shown in Figure 3. The forget, input, and output gates are mathematically described in
Equations (1)–(3), respectively.
 
ft = σ w h f h t −1 + w x f x t + b f (1)
Sensors 2022, 22, 1340 6 of 20

it = σ(whi ht−1 + wxi xt + bi ) (2)


ot = σ (wht ht−1 + wxt xt + bt ) (3)
The new hidden state value is calculated by using Equation (4) and the cell state value
by using Equations (5) and (6). The input, output, and forget gates are represented by ‘i’,
‘o’, and ‘f ’, respectively. ‘w’ represents weight, ‘h’ represents hidden state, ‘x’ represents the
input data, ‘b’ represents bias, and ‘C’ represents cell state.

et = tanh xt wxg + w g ht−1 + bg
C (4)
 
Ct = σ f t ∗ Ct−1 + it xt ∗ C
et + bc (5)

ht = tanh(Ct + bh ) ∗ ot (6)

Ct−1 ht
× +
Ct
tanh

×
×
~
ft it Ct ot
σ σ tanh σ

ht−1
Xt ht

Figure 3. Basic architecture of LSTM.

3.2. DENSE
DENSE is the second layer in the proposed model to join LSTM with GRU, and gives
quick responses. The DENSE layer gets the values from the previously hidden layer in
the (none, 48, 24) shape for the combined DDoS dataset and the (none, 10, 20) shape for
the car-hacking dataset. This layer is connected to the previous layer. The output shape of
this layer is (none, 48, 12) and (none, 10, 10) for the above-mentioned datasets, respectively,
which is the input to the next layer. We used the rectified linear activation unit (ReLU) in
this layer. The ReLU activation function worked on positive values. In this experiment,
the positive values are between 0 and 1. The speed of the ReLU function is faster than
other activation functions and it also reduces the vanishing gradient problem. The ReLU is
described in Equation (7).
Rx = max(0, x ) (7)

3.3. GRU
GRU is the third layer in the proposed model that takes values from the previous
DENSE layer and produces the final output. The GRU layer gets the values from the
previous layer in the (none, 48, 12) shape for the combined DDoS dataset and the (none,
10, 10) shape for the car-hacking dataset. This layer produces the output probability. GRU
has two gates—reset gate and update gate, and one hidden state. There are two sigmoid
activation functions in GRU (one in each gate) and one Tanh function for the output shown
Sensors 2022, 22, 1340 7 of 20

in Figure 4. For multi-class detection, the softmax activation function is used. The reset and
updated gates are described in Equations (8) and (9), respectively.

rt = σ((wxr xt + whr ht−1 + br )) (8)

ut = σ((wxu xt + wur ht−1 + bu )) (9)


The new hidden state value has calculated using Equations (10) and (11). The reset
and update gates are represented by ‘r’ and ‘u’, respectively.

h̃t = tanh(whx xt + wh h(rt ht−1 ) + bu ) (10)

ht = (1 − ut )ht−1 + ut h̃t (11)

× +
ht−1 ht

1-

× ×
~
rt ut ht
σ σ tanh

Xt
Figure 4. Basic architecture of GRU.

4. Experimental Methodology
In this section, a detailed experimental methodology is presented. This section contains
dataset description, preprocessing, and feature selection process.

4.1. Datasets
There are multiple real-time network datasets available for intrusion detection, such
as DARPA, NSL-KDD, CIC DoS dataset 2016, CICIDS 2017, CSE-CIC-IDS 2018 AWS, and
CIC-DDoS 2019. For this experiment, we used two datasets—a combined DDoS dataset
for the inter-vehicular network and a car-hacking dataset for the intra-vehicle network, as
shown in Table 3.

Table 3. The utilized datasets.

Dataset Dataset-Files Classes Records


DDoS 6,472,647
Combined DDoS DDoS balanced
Benign 6,321,980
Injected 587,521
DDoS
Normal 3,047,062
Injected 491,847
Fuzzy
Injected 3,259,177
Car hack 2020
Injected 1,252,149
Spoof
Injected 7,731,054
Injected 0
Normal
Injected 988,872
Sensors 2022, 22, 1340 8 of 20

4.1.1. Combined DDoS Dataset


The combined DDoS dataset was created from the combination of real-time network
DDoS datasets—CIC DoS 2016, CICIDS 2017, and CSE-CIC-IDS 2018. This dataset consists
of two classes of data, DDoS and Benign. The number of DDoS records in the dataset
was 6,472,647 and the number of Benign records was 6,321,980. CIC DoS 2016, CICIDS
2017, and CSE-CIC-IDS 2018 datasets included inter-vehicle network flow data according
to DDoS attacks [5,32]. CIC DoS 2016 dataset included slowbody2, ddosim, goldeneye,
hulk, slowloris, rudy, and slowread attacks. CICIDS 2017 dataset included DDoS-LOIC and
port scan attacks. The CSE-CIC-IDS 2018 dataset included SlowHTTPTest, hulk, slowloris,
LOIC-types of DDoS attacks. A collection of these datasets, with identical features, included
the different types of DDoS attacks in a single combined dataset [32]. The combined dataset
includes different types of DDoS attacks that are found in inter-vehicular networks. The
inter-vehicular network can suffer from port scan, DDOSIM, goldeneye, hulk, slowloris,
rudy, slowread, SlowHTTPTest, or LOIC-types of DDoS attack, which are included in the
combined dataset [42,43].

4.1.2. Car-Hacking Dataset


The car-hacking dataset was generated for the detection of cyber attacks in the internal
network of the vehicle. This dataset mainly works on the CAN bus, which can target the
attacker [33]. There are four different files—DDoS, Fuzzy, gear, and RPM, in which gear
and RPM are spoof attack files. In each file of the dataset, the classes are represented with R
and T, which represent benign and malicious values, respectively. In this experiment, first,
we renamed each file label with the name of the class, such as DDoS, Fuzzy, Spoof, and
Benign, and then combined all of these files into a single data frame.

4.2. Cleaning
Each dataset has multiple records. A dataset must be checked before training the
model for empty and undefined records. For the cleaning, we used python libraries (Pandas
and NumPy) and functions to check the dataset for missing and infinite values, which
returned Boolean values, true or false. True meant there were some missing or infinite
values and false meant the dataset was clean. In our experiments, two datasets were
utilized that had some undefined and empty records. To clean these datasets, all undefined
records were converted into empty records. After conversion of undefined values to empty,
all empty records were removed from the datasets.

4.3. Shuffling
This technique is used to shuffle dataset tuples. In our experiments, the combined
balance DDoS dataset was used for the inter-vehicular network that had two classes—
benign and DDoS. The second was the car-hacking dataset, which was used for intra-
vehicle networks. Data in the combined dataset were arranged in a sequential form, such as
complete data of one class then complete data of the second class. The training and testing
of the model required both types of data. To improve the performance of the model, and
for better testing, it required shuffled data. The shuffling method was used to shuffle all of
the data in a random fashion.

4.4. Feature Filtering


Every dataset has a number of features. If a dataset has multiple features and also has
some unimportant features that cannot affect the output label, then we must remove it from
the dataset, because, it produces overfitting and underfitting, which will affect the time
complexity and performance of the model. Feature selection is a technique used to remove
unimportant features from the dataset and leave only important features. The main goal of
feature selection was to prevent overfitting, underfitting, to improve the performance, and
reduce the training time and response time of the model.
Sensors 2022, 22, 1340 9 of 20

When we trained the proposed model with all 84 features of the combined dataset
and all 12 features of the car-hacking dataset, the performance of the model declined and
gave 49.71% and 82.35% accuracies, respectively. To improve the performance of the model,
the features of the dataset have to be reduced and the unimportant features have to be
eliminated. There are mainly three methods for feature selection—wrapper, filter, and
intrinsic methods. In this work, the filter method was used. The extra tree classifier (ETC)
method was used in the feature filtering. This method ranks all features according to
their entropy, as shown in Figures 5 and 6. All features with values greater than 0.0017
were selected. After ranking removed the unimportant and very low-rank features that
could not affect the output class, the remaining important features were 48; one was the
label of the combined dataset and 10 important features, and one was the label of the
car-hacking dataset.

Figure 5. Combined dataset ranked features.

Figure 6. Car-hacking dataset ranked features.


Sensors 2022, 22, 1340 10 of 20

4.5. Balancing Strategies


Each dataset contains multiple records. Before training and testing the model, make
sure that each class has the same number of instances or slight variations. There are
basically two ways to equalize the number of instances in each class—undersampling and
oversampling. Undersampling can potentially remove important instances, and random
oversampling can replicate the same instances that can cause overfitting.
In this experiment, the combined DDoS dataset was balanced, but the car-hacking
dataset was unbalanced. There were four classes of data in four different files. Each file
contained normal and injected data. We selected the injected instances from each file, and for
normal instances, used a normal file. Separate numeric labels for each class was assigned
and then all were into one data frame. To balance the dataset, the synthetic minority
oversampling technique (SMOTE) was used to create artificial instances. SMOTE uses the
K-nearest neighbor (KNN) method to select a very near-random instance. SMOTE generates
new instances inside the same class range. For creating training, validation, and testing
sets, a stratified random sampling (SRS) technique was used. The SRS technique takes an
equal number of instances from each class and creates train, test, and validation sets.

4.6. Normalization
Normalization is a technique to scale the numeric values between the common scale
ranges and remove problems from the dataset, such as different values in different features;
for example, one feature values between 0 and 1 and the other feature values 100 and
1000, so it can affect the training of the model. In our experiments, the dataset has very
large values in some features and very small values, such as negative values. To address
this problem, firstly, the categorical features were converted into numerical values. Each
feature had multiple categories, for which one-hot-encoding required larger memory and
was time-consuming [44]. In this experiment, we used the label encoder technique for the
conversion of categorical attributes to numerical. After the conversion, we used the min–
max normalization technique to normalized values between 0 and 1 by using Equation (12).

x − xmin
Xnorm = (12)
xmax − xmin

5. Simulations and Results


In this section we discuss the results obtained from the experiments. We conducted
two experiments on the proposed model. The first experiment was conducted for the
inter-vehicular networks, which was for binary class detection DDoS and benign. The
DDoS attack is famous for bringing the whole network down. This is more dangerous than
other attacks because DDoS spreads rapidly in the network and causes sufficiently higher
damage. DDoS attack on the network overwhelm the channel. In this process, network
traffic is flooded on a targeted server, which results in the network not working properly or
malfunctioning. In such circumstances, it becomes difficult for a vehicle to send/get critical
information [45,46].
The second experiment was performed for the intra-vehicular network multi-class
attack detection on a CAN bus. The evaluation of the model for the inter-vehicular network
was performed by using a combined dataset. For intra-vehicle attack detection, multi-class
classification was performed by using the car hack2020 dataset. The proposed scheme was
tested on Adam, Nadam, and Adamax optimizers with batch size 32, and probabilistic loss
functions. The binary cross-entropy function was used for the combined DDoS dataset and
a sparse categorical cross-entropy function for car hack2020 dataset.

5.1. Experimental Setup


The proposed scheme was implemented by using an Intel Core i5 8th generation
laptop. All experiments were performed in a Python 3.0 simulation environment to analyze
the performance of the proposed model.
Sensors 2022, 22, 1340 11 of 20

5.2. Evaluation Measure


Evaluation is a technique that measures the performance of the model. For the evalua-
tion, several researchers use precision, recall, F1-measure, and accuracy. The evaluation
of the proposed model was done with 20% data of a combined DDoS dataset for an inter-
vehicular network and 20% data of a car hack2020 dataset for the intra-vehicular network.
To evaluate the performance of the proposed scheme, a number of evaluation metrics were
utilized, including accuracy, precision, recall, and F1-score. The evaluation metrics are
calculated with true positive (TP), true negative (TN), false positive (FP), and false negative
(FN). All of these performance scores can be measure by using Equations (13)–(16).

TP + TN
Accuracy = (13)
TP + TN + FP + FN
TP
Precision = (14)
TP + FP
TP
Recall = (15)
TP + FN
2 ∗ ( Pression ∗ Recall )
F1-measure = (16)
Pression + Recall

5.3. Inter-Vehicular Network


The inter-vehicular network enables vehicles to communicate with each other and
roadside infrastructure. The attacker can target the network and stop the communication
of the inter-vehicular network. In an inter-vehicle network, the attacker can easily launch
a DDoS attack due to mobility. All services of the network will be stopped by the DDoS
attack [47]. We conducted the experiment on the proposed model to detect cyber attacks in
the inter-vehicular network by using a combined DDoS dataset. The proposed model was
the combination of LSTM and GRU with the DENSE ReLU layer. The training process was
conducted for six epochs. In this experiment, we used the binary cross-entropy function for
loss. The proposed scheme was tested on Adam, Nadam, and Adamax optimizers. Adam
gave 99.44% precision, 99.60% recall, 99.52% F1-measure, and 99.51% accuracy. Nadam
gave 99.91% precision, 99.83% recall, 99.87% F1-measure, and 99.85% accuracy. Adamax
gave 98.92% precision, 98.95% recall, 98.93% F1-measure, and 98.93%. The comparison
with LSTM and GRU is shown in Figures 7–9. The training accuracy and loss on the Adam
optimizer is shown in Figure 10, Nadam optimizer is shown in Figure 11, and Admax is
shown in Figure 12.

Figure 7. Evaluation on Adam with the combined DDoS dataset.


Sensors 2022, 22, 1340 12 of 20

The model performance was tested for the response time on the combined DDoS
dataset. Testing of the model was conducted with 20% of pre-processed data of the dataset.
The time testing was is also conducted for three models—LSTM, GRU, and the proposed
model. The proposed model was tested with 2,549,370 instances of the combined DDoS
dataset, which were 79,668 batches of size 32. The total testing time was 692 s, as shown
in Figure 13, and each batch took 8.7 ms. There were 32 instances in each batch and the
response time of each instance was 0.27 ms. The total testing times of LSTM and GRU for
the same instances were 1307.33 and 1116 s, respectively. The testing response time shows
that the proposed model is faster than LSTM and GRU.

Figure 8. Evaluation on Nadam with the combined DDoS dataset.

Figure 9. Evaluation on Adamax with the combined DDoS dataset.


Sensors 2022, 22, 1340 13 of 20

(a) (b)

Figure 10. Adam training on the combined DDoS dataset. (a) Adam training accuracy on the
combined dataset, (b) Adam training loss on the combined dataset.

(a) (b)

Figure 11. Nadam Training on Combined DDoS dataset. (a) Nadam Training Accuracy on Combined
dataset, (b) Nadam Training Loss on Combined dataset.

(a) (b)

Figure 12. Adamax training on the combined DDoS dataset. (a) Adamax training accuracy on the
combined dataset, (b) Adamax training loss on the combined dataset.
Sensors 2022, 22, 1340 14 of 20

Figure 13. Testing Time on the combined DDoS dataset.

5.4. Intra-Vehicular Network


In the intra-vehicle network, the internal smart devices of a vehicle communicate with
each other and control the communication of the vehicle in the inter-network. The hacker
can target the internal network of the vehicle, called CAN bus. After gaining access to the
intra-vehicular network, the assailant can manipulate and erase information, disrupt the
vehicle functionalities, and can take control of the vehicle [39]. An internal attack on the car
can cause accidents. In a fuzzing attack, the attacker shakes the steering wheel, changes
gears, turns the signal lights on/off randomly, and uses the brakes in the mobility of the
vehicle [33,48]. C. Miller and C. Valasek made two attacks on a CAN bus. The operation
took place on an empty road in the country. In the first attack, they activated the auto
parking property when the car jerked the steering wheel side to side of the road. In the
second attack, they disabled the brakes while the vehicle was in motion. Both attacks did
not cause any real damage, but if these stunts were performed in a crowded place it could
lead to an accident [12].
To control this type of accident, we conducted he experiment on the proposed model
to detect multi-class malicious attacks in the internal network of the vehicle by using a
car-hacking dataset. The proposed scheme was tested on Adam, Nadam, and Adamax
optimizers. For multi-class, we used the softmax activation function in the last layer. The
training process was conducted for six epochs. In this experiment, we used the sparse
categorical crossentropy function for loss. The evaluation of the model for the intra-vehicle
network was conducted with a car-hacking dataset. The precision, recall, F1-measure, and
accuracy on Adam was 0.9999, 0.9999, 0.9999, and 0.9999, respectively. The precision, recall,
F1-measure, and accuracy on the Nadam optimizer was 0.9999, 0.9998, 0.9998, and 0.9999,
respectively. The precision, recall, F1-measure, and accuracy on the Adamax optimizer
was 0.9993, 0.9998, 0.9995, and 0.9996, respectively. The comparisons with LSTM and
GRU are shown in Figures 14–16. The proposed model training accuracy and loss for
Adam, Nadeem, and Admax optimizers are shown in Figures 17–19, respectively. Training
accuracy was over 99% and loss was below 0.02 for each optimizer.
Sensors 2022, 22, 1340 15 of 20

Figure 14. Evaluation on Adam with the car-hacking dataset.

Figure 15. Evaluation on Nadam with the car-hacking dataset.

Figure 16. Evaluation on Adamax with the car-hacking dataset.


Sensors 2022, 22, 1340 16 of 20

(a) (b)

Figure 17. Adam training on the car-hacking dataset. (a) Adam training accuracy on car-hacking.
Dataset; (b) Adam training loss on car-hacking. Dataset.

(a) (b)

Figure 18. Nadam Training on the car-hacking dataset. (a) Nadam training accuracy on car-hacking.
dataset; (b) Nadam training loss on car-hacking. dataset.

(a) (b)

Figure 19. Adamax training on car-hacking dataset. (a) Adamax training accuracy on car-hacking.
dataset; (b) Adamax training loss on car-hacking. dataset.
Sensors 2022, 22, 1340 17 of 20

Figure 20. Testing time score on the car-hacking dataset.

The model performance was tested for the response time on the car-hacking dataset.
Testing of the model was conducted with 20% of the pre-processed data of the dataset. The
time testing process was also conducted for three models, such as LSTM GRU and the
proposed model. The proposed model was tested with 1,001,720 instances of the dataset,
which are 31,304 batches of size 32. The total testing time was 51 s, as shown in Figure 20,
and each batch took 1.62 ms. There were 32 instances in each batch and the response time of
each instance was 0.05 ms. The total testing time of LSTM and GRU for the same instances
were 72 and 67 s, respectively. The testing response time shows that the proposed model is
faster than LSTM and GRU.

5.5. Discussion
The experimental results show that the proposed model gives better performance in
less response time as compared to other models. The proposed scheme can detect both
binary and multi-class cyber attacks in less response time. We observed the proposed
model with different optimizers for both datasets. The results show different values for
each optimizer. The Adam and Nadam optimizers give better results than the Adamax
optimizer. In this experiment, we obtained the highest results with Nadam on the proposed
model and LSTM for both binary and multi-classification. In this work, we used k-fold cross-
validations to test the performance of the proposed system. Moreover, 3-fold, 5-fold, and
7-fold for both DDoS and car-hacking datasets were used. The performance of the proposed
system remained the same and the results are tabulated in Tables 4 and 5. Comparison
of the proposed study with other ML algorithms are highlighted in Tables 4 and 5. The
performance of LSTM is equivalent to the proposed model, but the response time is high,
while the GRU model gives less performance than LSTM and the proposed model. The
combination of LSTM and GRU with the ReLU DENSE layer gave a quick response.
Deep layers of LSTM and GRU gave better results, but were time consuming. From the
experimental results, the propose model gave above 99% results for binary and multi-
class classification.

Table 4. Comparison of the HDL-IDS with other ML algorithms on the combined DDoS dataset.

Algorithms Precision Recall F1-Score Accuracy


Naive Bayes 0.8928 0.8924 0.8925 0.8925
Decision tree 0.9907 0.9750 0.9827 0.9814
SVM 0.9493 0.9125 0.9305 0.9302
LSTM 0.9925 0.9949 0.9937 0.9936
GRU 0.9819 0.9874 0.9846 0.9844
Proposed study 0.9951 0.9960 0.9952 0.9951
Sensors 2022, 22, 1340 18 of 20

Table 5. Comparison of the HDL-IDS with other ML algorithms on the car-hacking 2020 dataset.

Algorithms Precision Recall F1-Score Accuracy


Naive Bayes 0.7903 0.7681 0.7790 0.7192
Decision tree 0.9503 0.8099 0.8745 0.9181
SVM 0.9379 0.8966 0.9167 0.9254
LSTM 0.9994 0.9997 0.9995 0.9997
GRU 0.9940 0.9963 0.9951 0.9952
Proposed Study 0.9997 0.9998 0.9997 0.9998

6. Conclusions
The extensive growth of smart vehicular networks has opened up several doors for
cybercriminals. Attacks on intra-vehicle networks can cause deaths and severe accidents.
This research proposes a hybrid DL-based model for intrusion detection in IoV. The pro-
posed scheme contains a hybrid combination of LSTM and GRU that reduces the training
and response time. The performance of the proposed approach was evaluated by con-
ducting extensive experiments on a combined dataset of CIC DoS 2016, CICIDS 2017, and
CSE-CIC-IDS 2018, and car-hacking datasets. The experimental results demonstrate that
the proposed model achieves 99.5% accuracy for the combined DDoS dataset and 99.9% for
the car-hacking dataset, respectively.

Author Contributions: Data curation, S.U., M.A.K., M.T.H. and A.; Formal analysis, S.U.; Funding
acquisition, J.A., A. and N.P.; Investigation, J.A., S.S.J., Z.e.H., M.T.H. and N.P.; Methodology, S.U.
and Z.e.H.; Project administration, S.U.; Resources, S.U., M.A.K., J.A., S.S.J. and N.P.; Software,
S.U.; Supervision, M.A.K., J.A., S.S.J., N.P. and W.J.B.; Validation, M.T.H. and A.; Visualization, S.S.J.
and Z.e.H.; Writing—original draft, S.U.; Writing—review & editing, J.A., S.S.J., N.P. and W.J.B. All
authors have read and agreed to the published version of the manuscript.
Funding: Sajjad Shaukat Jamal extends his gratitude to the Deanship of Scientific Research at King
Khalid University for funding this work through a research group program, under grant number R.
G. P. 1/399/42.
Institutional Review Board Statement: Not applicable.
Informed Consent Statement: Not applicable.
Data Availability Statement: The publicly available data set can be found at: https://ocslab.
hksecurity.net/Datasets/CAN-intrusion-dataset and https://www.kaggle.com/devendra416/ddos-
datasets.
Conflicts of Interest: The authors declare no conflict of interest.

References
1. Mehedi, S.; Anwar, A.; Rahman, Z.; Ahmed, K. Deep Transfer Learning Based Intrusion Detection System for Electric Vehicular
Networks. Sensors 2021, 21, 4736. [CrossRef] [PubMed]
2. Li, J.; Zhao, Z.; Li, R.; Zhang, H. Ai-based two-stage intrusion detection for software defined iot networks. IEEE Internet Things J.
2018, 6, 2093–2102. [CrossRef]
3. Lydia, E.L.; Jovith, A.A.; Devaraj, A.F.S.; Seo, C.; Joshi, G.P. Green Energy Efficient Routing with Deep Learning Based Anomaly
Detection for Internet of Things (IoT) Communications. Mathematics 2021, 9, 500. doi: 10.3390/math9050500. [CrossRef]
4. Kim, D.Y.; Jung, M.; Kim, S. An internet of vehicles (IoV) access gateway design considering the efficiency of the in-vehicle
ethernet backbone. Sensors 2021, 21, 98. [CrossRef] [PubMed]
5. Yang, L.; Moubayed, A.; Shami, A. MTH-IDS: A Multi-Tiered Hybrid Intrusion Detection System for Internet of Vehicles. IEEE
Internet Things J. 2021, 9, 616–632. [CrossRef]
6. Liu, J.; Zhang, S.; Sun, W.; Shi, Y. In-vehicle network attacks and countermeasures: Challenges and future directions. IEEE Netw.
2017, 31, 50–58. [CrossRef]
7. Yang, L. Comprehensive Visibility Indicator Algorithm for Adaptable Speed Limit Control in Intelligent Transportation Systems.
Ph.D. Thesis, University of Guelph, Guelph, ON, Canada, 2018.
Sensors 2022, 22, 1340 19 of 20

8. Xiao, Z.; Dai, X.; Jiang, H.; Wang, D.; Chen, H.; Yang, L.; Zeng, F. Vehicular task offloading via heat-aware MEC cooperation
using game-theoretic method. IEEE Internet Things J. 2019, 7, 2038–2052. [CrossRef]
9. WHO. Global Status Report on Road Safety. 2021. Available online: https://www.who.int/news-room/fact-sheets/detail/road-
traffic-injuries (accessed on 26 January 2022).
10. Golson, J. Jeep Hackers at It Again, This Time Taking Control of Steering and Braking Systems. 2 August 2016. Available
online: https://www.theverge.com/2016/8/2/12353186/car-hack-jeep-cherokee-vulnerability-miller-valasek (accessed on 26
January 2022).
11. Nie, S.; Liu, L.; Du, Y. Free-fall: Hacking tesla from wireless to can bus. Brief. Black Hat USA 2017, 25, 1–16.
12. Miller, C.; Valasek, C. Adventures in automotive networks and control units. Def Con 2013, 21, 15–31.
13. Liu, J.; Li, J.; Zhang, L.; Dai, F.; Zhang, Y.; Meng, X.; Shen, J. Secure intelligent traffic light control using fog computing. Future
Gener. Comput. Syst. 2018, 78, 817–824. [CrossRef]
14. Liu, H.; Lang, B. Machine learning and deep learning methods for intrusion detection systems: A survey. Appl. Sci. 2019, 9, 4396.
[CrossRef]
15. Chen, X.; Zhang, H.; Wu, C.; Mao, S.; Ji, Y.; Bennis, M. Optimized computation offloading performance in virtual edge computing
systems via deep reinforcement learning. IEEE Internet Things J. 2018, 6, 4005–4018. [CrossRef]
16. Yang, Q.; Liu, Y.; Chen, T.; Tong, Y. Federated machine learning: Concept and applications. ACM Trans. Intell. Syst. Technol.
(TIST) 2019, 10, 12. [CrossRef]
17. Khraisat, A.; Gondal, I.; Vamplew, P.; Kamruzzaman, J. Survey of intrusion detection systems: Techniques, datasets and challenges.
Cybersecurity 2019, 2, 20. [CrossRef]
18. Gao, Z.J.; Pansare, N.; Jermaine, C. Declarative Parameterizations of User-Defined Functions for Large-Scale Machine Learning
and Optimization. IEEE Trans. Knowl. Data Eng. 2018, 31, 2079–2092. [CrossRef]
19. Golovin, D.; Solnik, B.; Moitra, S.; Kochanski, G.; Karro, J.; Sculley, D. Google vizier: A service for black-box optimization. In
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada,
13–17 August 2017; pp. 1487–1495.
20. Singh, A.; Kotiyal, V.; Sharma, S.; Nagar, J.; Lee, C.C. A Machine Learning Approach to Predict the Average Localization Error
With Applications to Wireless Sensor Networks. IEEE Access 2020, 8, 208253–208263. doi: 10.1109/ACCESS.2020.3038645.
[CrossRef]
21. Latif, S.; e Huma, Z.; Jamal, S.S.; Ahmed, F.; Ahmad, J.; Zahid, A.; Dashtipour, K.; Muhmmad, U.A.; Ahmad, M.; Abbasi, Q.H.
Intrusion Detection Framework for the Internet of Things using a Dense Random Neural Network. IEEE Trans. Ind. Inform. 2021,
1–10. [CrossRef]
22. Ferrag, M.A.; Maglaras, L.; Moschoyiannis, S.; Janicke, H. Deep learning for cyber security intrusion detection: Approaches,
datasets, and comparative study. J. Inf. Secur. Appl. 2020, 50, 102419. [CrossRef]
23. Zhang, S.; Xie, X.; Xu, Y. A Practical Method to Attack Deep Learning Based Host Intrusion Detection Systems. Int. J. Netw. Secur.
2021, 23, 663–676.
24. Thapa, K.N.K.; Duraipandian, N. Malicious Traffic classification Using Long Short-Term Memory (LSTM) Model. Wirel. Pers.
Commun. 2021, 119, 2707–2724. [CrossRef]
25. Latif, S.; Driss, M.; Boulila, W.; Jamal, S.S.; Idrees, Z.; Ahmad, J. Deep Learning for the Industrial Internet of Things (IIoT): A
Comprehensive Survey of Techniques, Implementation Frameworks, Potential Applications, and Future Directions. Sensors 2021,
21, 7518. [CrossRef] [PubMed]
26. Bai, J.; Ding, B.; Xiao, Z.; Jiao, L.; Chen, H.; Regan, A.C. Hyperspectral Image Classification Based on Deep Attention Graph
Convolutional Network. IEEE Trans. Geosci. Remote Sens. 2021, 60, 5504316. [CrossRef]
27. Goodfellow, I.; Bengio, Y.; Courville, A. Deep Learning; MIT Press: Cambridge, MA, USA, 2016.
28. Liu, W.; Chen, L.; Chen, Y.; Zhang, W. Accelerating Federated Learning via Momentum Gradient Descent. IEEE Trans. Parallel
Distrib. Syst. 2020, 31, 1754–1766. doi: 10.1109/TPDS.2020.2975189. [CrossRef]
29. Fanjiang, Y.Y.; Lee, C.C.; Du, Y.T.; Horng, S.J. Palm Vein Recognition Based on Convolutional Neural Network. Informatica 2021,
32, 687–708. [CrossRef]
30. Putchala, M.K. Deep Learning Approach for Intrusion Detection System (IDS) in the Internet of Things (IoT) Network Using
Gated Recurrent Neural Networks (GRU). Master’s Thesis, Wright State University, Dayton, OH, USA, 2017 .
31. Chawla, A.; Lee, B.; Fallon, S.; Jacob, P. Host based intrusion detection system with combined CNN/RNN model. In Proceedings
of the Joint European Conference on Machine Learning and Knowledge Discovery in Databases, Dublin, Ireland, 10–14 September
2018; pp. 149–158.
32. Prasad, M.D.; Babu, V.P.; Amarnath, C. Machine Learning DDoS Detection Using Stochastic Gradient Boosting. Int. J. Comput.
Sci. Eng. 2019, 7, 157–166. doi: doi: 10.26438/ijcse/v7i4.157166. [CrossRef]
33. Hossain, M.D.; Inoue, H.; Ochiai, H.; Fall, D.; Kadobayashi, Y. LSTM-based intrusion detection system for in-vehicle can bus
communications. IEEE Access 2020, 8, 185489–185502. [CrossRef]
34. Ashraf, J.; Bakhshi, A.D.; Moustafa, N.; Khurshid, H.; Javed, A.; Beheshti, A. Novel Deep Learning-Enabled LSTM Autoencoder
Architecture for Discovering Anomalous Events From Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 2021,
22, 4507–4518. doi: 10.1109/TITS.2020.3017882. [CrossRef]
Sensors 2022, 22, 1340 20 of 20

35. Injadat, M.; Moubayed, A.; Nassif, A.B.; Shami, A. Multi-stage optimized machine learning framework for network intrusion
detection. IEEE Trans. Netw. Serv. Manag. 2020, 18, 1803–1816. [CrossRef]
36. Zaidi, K.; Milojevic, M.B.; Rakocevic, V.; Nallanathan, A.; Rajarajan, M. Host-based intrusion detection for vanets: A statistical
approach to rogue node detection. IEEE Trans. Veh. Technol. 2015, 65, 6703–6714. [CrossRef]
37. Anbalagan, S.; Bashir, A.K.; Raja, G.; Dhanasekaran, P.; Vijayaraghavan, G.; Tariq, U.; Guizani, M. Machine Learning-based
Efficient and Secure RSU Placement Mechanism for Software Defined-IoV. IEEE Internet Things J. 2021, 8, 13950–13957. [CrossRef]
38. Nie, L.; Ning, Z.; Wang, X.; Hu, X.; Cheng, J.; Li, Y. Data-driven intrusion detection for intelligent Internet of vehicles: A deep
convolutional neural network-based method. IEEE Trans. Netw. Sci. Eng. 2020, 7, 2219–2230. [CrossRef]
39. Olufowobi, H.; Young, C.; Zambreno, J.; Bloom, G. SAIDuCANT: Specification-based automotive intrusion detection using
controller area network (can) timing. IEEE Trans. Veh. Technol. 2020, 69, 1484–1494 doi: 10.1109/TVT.2019.2961344. [CrossRef]
40. Zhang, Y.; Li, P.; Wang, X. Intrusion detection for IoT based on improved genetic algorithm and deep belief network. IEEE Access
2019, 7, 31711–31722. [CrossRef]
41. Kang, M.J.; Kang, J.W. Intrusion detection system using deep neural network for in-vehicle network security. PLoS ONE 2016,
11, e0155781. [CrossRef] [PubMed]
42. Salim, M.M.; Rathore, S.; Park, J.H. Distributed denial of service attacks and its defenses in IoT: A survey. J. Supercomput. 2020,
76, 5320–5363. [CrossRef]
43. Lohachab, A.; Karambir, B. Critical analysis of DDoS—An emerging security threat over IoT networks. J. Commun. Inf. Netw.
2018, 3, 57–78. [CrossRef]
44. Dahouda, M.K.; Joe, I. A Deep-Learned Embedding Technique for Categorical Features Encoding. IEEE Access 2021, 9, 114381–
114391. [CrossRef]
45. Li, J.; Liu, M.; Xue, Z.; Fan, X.; He, X. RTVD: A Real-Time Volumetric Detection Scheme for DDoS in the Internet of Things. IEEE
Access 2020, 8, 36191–36201. doi: 10.1109/ACCESS.2020.2974293. [CrossRef]
46. Osibo, B.K.; Zhang, C.; Xia, C.; Zhao, G.; Jin, Z. Security and Privacy in 5G Internet of Vehicles (IoV) Environment. J. Internet
Things 2021, 3, 77. [CrossRef]
47. Li, Z.; Kong, Y.; Wang, C.; Jiang, C. DDoS Mitigation Based on Space-Time Flow Regularities in IoV: A Feature Adaption
Reinforcement Learning Approach. IEEE Trans. Intell. Transp. Syst. 2021, 1–17. doi: 10.1109/TITS.2021.3066404. [CrossRef]
48. Lee, H.; Jeong, S.H.; Kim, H.K. OTIDS: A Novel Intrusion Detection System for In-vehicle Network by Using Remote Frame. In
Proceedings of the 2017 15th Annual Conference on Privacy, Security and Trust (PST), Calgary, AB, Canada, 28–30 August 2017;
pp. 57–5709. doi: 10.1109/PST.2017.00017. [CrossRef]

You might also like