Computer Science ›› 2021, Vol. 48 ›› Issue (6A): 518-523.doi: 10.11896/jsjkx.200700129

• Information Security • Previous Articles     Next Articles

Distributed Combination Deep Learning Intrusion Detection Method for Internet of Vehicles Based on Spark

YU Jian-ye1, QI Yong1, WANG Bao-zhuo2   

  1. 1 School of Computer Science and Engineering,Nanjing University of Science & Technology,Nanjing 210094,China
    2 Jiangsu Zhongda Intelligent Transportation Industry Research Institute Co.Ltd,Changzhou,Jiangsu 213000,China
  • Online:2021-06-10 Published:2021-06-17
  • About author:YU Jian-ye,born in 1993,postgraduate.His main research interests include information security.
    QI Yong,born in 1970,Ph.D,professor,Ph.D supervisor,is a member of China Computer Federation.His main research interests include traffic bigdata,security of internet of vehicles.
  • Supported by:
    National Key Research and Development Program Intergovernmental Key Items for International Science and Technology Innovation Cooperation of China(2016YFE0108000),Ministry of Industry and Information Technology Network Security Technology Application Pilot Demonstration Project:Intelligent Networked Vehicle-road Cooperative Communication Safety Research Application Platform,Key Research and Development Program of Jiangsu Province China(BE2017163) and JiangSu Transportation Technology Project(2018Y45).

Abstract: With the application of 5G and other technologies in the field of Internet of vehicles,intrusion detection as an important detection tool for information security of Internet of vehicles plays an increasingly important role.Due to the rapid change of the structure of the Internet of vehicles,large data flow,complex and diverse forms of intrusion,traditional detection unable ensure the accuracy and real-time requirements,and unable be directly applied to the Internet of vehicles.To solve these problems,this paper proposes a distributed combination deep learning intrusion detection method for Internet of vehicles based on Apache spark framework.By constructing spark cluster,the deep learning CNN and LSTM are combined to extract intrusion features and detect data,and find abnormal behaviors from large-scale Internet of vehicles data traffic.Experimental results show that,compared with other existing models,the proposed method can achieve 20.1s in time and 99.7% in accuracy.

Key words: Apache Spark, CNN, Internet of vehicles, Intrusion detection, LSTM

CLC Number: 

  • TP302.7
[1] HALIMAA A A,SUNDARAKANTHAM K.Machine learning based intrusion detection system[C]//Proceedings of the International Conference on Trends in Electronics and Informatics(ICOEI 2019).2019:916-920.
[2] VINAYAKUMAR R,SOMAN K P,POORNACHANDRANY P.Applying convolutional neural network for network intrusion detection[C]//2017 International Conference on Advances in Computing,Communications and Informatics(ICACCI 2017).2017:1222-1228.
[3] DONG B,WANG X.Comparison deep learning method to traditional methods using for network intrusion detection[C]//Proceedings of 2016 8th IEEE International Conference on Communication Software and Networks(ICCSN 2016).IEEE,2016:581-585.
[4] ISHAQUE M,HUDEC L.Feature extraction using Deep Learning for Intrusion Detection System[C]//2nd International Conference on Computer Applications and Information Security(ICCAIS 2019).IEEE,2019:1-5.
[5] YAO Y,YANG W,GAO F X,et al.Anomaly intrusion detection approach using hybrid MLP/CNN neural network[J].Proceedings-ISDA 2006:Sixth International Conference on Intelligent Systems Design and Applications,2006,2(60473073):1095-1102.
[6] PENG W,KONG X,PENG G,et al.Network intrusion detection based on deep learning[C]//Proceedings-2019 International Conference on Communications,Information System,and Computer Engineering(CISCE 2019).IEEE,2019:431-435.
[7] DING W H,ZHOU K,LONG Y Y,et al.Research on Intrusion Detection Based on deep convolution neural network[J].Computer Science,2019(10):1-11.
[8] CHOCKWANICH N,VISOOTTIVISETH V.Intrusion Detec-tion by Deep Learning with TensorFlow[J].International Conference on Advanced Communication Technology,ICACT,Global IT Research Institute (GIRI),2019(2):654-659.
[9] DOBSON A,ROY K,YUAN X,et al.Performance Evaluation of Machine Learning Algorithms in Apache Spark for Intrusion Detection[C]//2018 28th International Telecommunication Networks and Applications Conference(ITNAC 2018).IEEE,2019:1-6.
[10] MENG X,BRADLEY J,YAVUZ B,et al.MLlib:machine lea-ning in apache spark[J].Computer Science,2015, 17(1):1235-1241.
[11] CHEUNG L.The rise and predominance of Apache Spark,”[OL]. apache-spark.html.
[12] HOCHREITER SSCHMIDHUBER J.Long short-term memory[J].Neural Computation,1997,9(8):1735-1780.
[13] REVATHI S,MALATHI A.A detailed analysis on NSL-KDD dataset using various machine learning techniques for Intrusion detection[J].ESRSA Publications,2013.
[14] MOUSTAFA N,SLAY J.Unsw-nb15:a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set)[C]//2015 Military Communications and Information Systems Conference(MilCIS).IEEE,2015:1-6.
[15] ZHOU F Y,JIN L P,DONG J.Summary of Research on Convolutional Neural Networks[J].Chinese Journal of Computers,2017,40(6):1229-1251.
[16] ANZER A,ELHADEF M.A multilayer perceptron-based dis-tributed intrusion detection system for internet of vehicles[C]//Proceedings-4th IEEE International Conference on Collaboration and Internet Computing(CIC 2018).IEEE,2018:438-445.
[17] VIMALKUMAR K,RADHIKA N.A big data framework for intrusion detection in smart grids using apache spark[C]//2017 International Conference on Advances in Computing,Communications and Informatics(ICACCI 2017).2017:198-204.
[18] FERRAG M A,MAGLARAS L,MOSCHOYIANNIS S,et al.Deep learning for cyber security intrusion detection:Approaches,datasets,and comparative study[J].Information Security Technical Report,2020,50(2):102419.1-102419.19.
[19] RING M,WUNDERLICH S,SCHEURING D,et al.A survey of network-based intrusion detection data sets[J].Computers and Security,Elsevier Ltd,2019,86:147-167.
[20] SEDJELMACI H,SENOUCI S M,ABU-RGHEFF M A.An efficient and lightweight intrusion detection mechanism for service-oriented vehicular networks[J].IEEE Internet of Things Journal,IEEE,2014,1(6):570-577.
[21] GAO Y,WU H,SONG B,et al.A distributed network intrusion detection system for distributed denial of service attacks in vehicular ad hoc network[J].IEEE Access,2019,7:154560-154571.
[1] WANG Xin-tong, WANG Xuan, SUN Zhi-xin. Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network [J]. Computer Science, 2022, 49(8): 314-322.
[2] CHEN Jing, WU Ling-ling. Mixed Attribute Feature Detection Method of Internet of Vehicles Big Datain Multi-source Heterogeneous Environment [J]. Computer Science, 2022, 49(8): 108-112.
[3] JIN Fang-yan, WANG Xiu-li. Implicit Causality Extraction of Financial Events Integrating RACNN and BiLSTM [J]. Computer Science, 2022, 49(7): 179-186.
[4] ZHANG Yuan, KANG Le, GONG Zhao-hui, ZHANG Zhi-hong. Related Transaction Behavior Detection in Futures Market Based on Bi-LSTM [J]. Computer Science, 2022, 49(7): 31-39.
[5] ZHOU Zhi-hao, CHEN Lei, WU Xiang, QIU Dong-liang, LIANG Guang-sheng, ZENG Fan-qiao. SMOTE-SDSAE-SVM Based Vehicle CAN Bus Intrusion Detection Algorithm [J]. Computer Science, 2022, 49(6A): 562-570.
[6] CAO Yang-chen, ZHU Guo-sheng, SUN Wen-he, WU Shan-chao. Study on Key Technologies of Unknown Network Attack Identification [J]. Computer Science, 2022, 49(6A): 581-587.
[7] WANG Shan, XU Chu-yi, SHI Chun-xiang, ZHANG Ying. Study on Cloud Classification Method of Satellite Cloud Images Based on CNN-LSTM [J]. Computer Science, 2022, 49(6A): 675-679.
[8] YUE Qing, YIN Jian-yu, WANG Sheng-sheng. Automatic Detection of Pulmonary Nodules in Low-dose CT Images Based on Improved CNN [J]. Computer Science, 2022, 49(6A): 54-59.
[9] LIN Xi, CHEN Zi-zhuo, WANG Zhong-qing. Aspect-level Sentiment Classification Based on Imbalanced Data and Ensemble Learning [J]. Computer Science, 2022, 49(6A): 144-149.
[10] YU Ben-gong, ZHANG Zi-wei, WANG Hui-ling. TS-AC-EWM Online Product Ranking Method Based on Multi-level Emotion and Topic Information [J]. Computer Science, 2022, 49(6A): 165-171.
[11] ZHU Wen-tao, LAN Xian-chao, LUO Huan-lin, YUE Bing, WANG Yang. Remote Sensing Aircraft Target Detection Based on Improved Faster R-CNN [J]. Computer Science, 2022, 49(6A): 378-383.
[12] ZHAO Zheng-peng, LI Jun-gang, PU Yuan-yuan. Low-light Image Enhancement Based on Retinex Theory by Convolutional Neural Network [J]. Computer Science, 2022, 49(6): 199-209.
[13] WEI Hui, CHEN Ze-mao, ZHANG Li-qiang. Anomaly Detection Framework of System Call Trace Based on Sequence and Frequency Patterns [J]. Computer Science, 2022, 49(6): 350-355.
[14] SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353.
[15] DING Feng, SUN Xiao. Negative-emotion Opinion Target Extraction Based on Attention and BiLSTM-CRF [J]. Computer Science, 2022, 49(2): 223-230.
Full text



No Suggested Reading articles found!