Computer Science ›› 2021, Vol. 48 ›› Issue (6A): 514-517.doi: 10.11896/jsjkx.200700158

• Information Security • Previous Articles     Next Articles

Research on Forecasting Model of Internet of Vehicles Security Situation Based on Decision Tree

TANG Liang, LI Fei   

  1. School of Cybersecurity,Chengdu University of Information Technology,Chengdu 610225,China
  • Online:2021-06-10 Published:2021-06-17
  • About author:TANG Liang,born in 1995,M.S.candidate.His main research interest includes X vehicle security.
  • Supported by:
    Natural Science Foundation of Sichuan Province(2019YFG0201) and Chengdu Science and TechnologyProject(2018-YF05-00707-SN).

Abstract: With the development of vehicle intelligent technology,the combination of network and vehicle becomes inevitable,which brings great convenience to people.At the same time,hackers can also use technical loopholes to attack vehicles,resulting in serious traffic accidents and even vehicle crashes.Based on this situation,vehicle information security technology has gradually become the focus of attention.In the face of endless network attacks on Internet of vehicles,situation awareness is needed to protect the Internet of vehicles.In order to improve the accuracy of IOV security situation awareness,this paper proposes a decision tree-based IOV security situation prediction model.Because network attacks often change abnormally by certain specific attri-butes,the process of attribute change is an attack method.The tree is classified according to these attributes,the information gain rate is used to build a decision tree,and the rules for decision are derived.Through experiments,the feasibility of the proposed algorithm in the security situation awareness of the Internet of Vehicles and the accuracy of the prediction results are verified.

Key words: Decision tree, Internet of vehicles security, Situation awareness

CLC Number: 

  • TP391
[1] Annual report ofintelligent connected vehicles in 2019[OL].https://skygo.360.cn/2020/03/24/360-skygo-2019-icv-cybersecurity-annual-report/.
[2] LI X H,ZHONG C,CHEN Y,et al.Overview of Internet of vehicles security [J].Journal of Information Security,2019,4(3):17-33.
[3] CHANG Y H,MA Z R,LI X,et al.Overview of network security situation awareness [J].Cyberspace Security,2019,10 (12):88-93.
[4] ENDSLEY M R.Situation Awareness Global Assessment Technique(SAGAT)[C]//Proceedings of the IEEE 1988 National Aerospaceand Electronics Conference.Piscataway:IEEE,1988:789-795.
[5] BASS T.Intrusion detection systems &multisensor data fusion:cre-ating cyberspace situational awareness[J].Communications of the ACM,1999,43(4):99-105.
[6] LIU J W,LIU J J,LU Y L,et al.Application of game theory in network security situation awareness [J].Computer Applications,2017,37 (S2):48-51,64.
[7] DING H,XU H H,DUAN R,et al.Security situation awareness model based on Bayesian method [J/OL].Computer Engineering:1-12.[2020-04-16].https://doi.org/10.19678/j.issn.1000-3428.0055219.
[8] JIANG Y,LI C H,WEI X H,et al.Research on network security situation prediction based on Improved PSO and optimized RBF [J].Measurement and Control Technology,2018,37(5):56-60.
[9] LI X.Research on network security situation evaluation based on particle swarm optimization neural network [D].Hebei Normal University,2018
[10] XU G,CAO Y,REN Y,et al.Network Security SituationAwareness Based on Semantic Ontology and User-Defined Rules for Internet of Things[C]//IEEE Access.2017:21046-21056.
[11] HE F,ZHANG Y,LIU H.A Novel Approach for Security Situational Awareness in the Internet of Things[J].arXiv:1711.10182,2017.
[12] MCELWEE S,CANNADY J.Cyber Situation Awareness withActive Learning for Intrusion Detection[J].arXiv:1912.12673,2019.
[13] PENG K,LEUNG V C M,ZHENG L X,et al.Intrusion Detection System Based on Decision Tree over Big Data in Fog Environment[OL].https://doi.org/10.1155/2018/4680867.
[14] Machine learning [M].Tsinghua University Press,2016:425.
[15] https://sites.google.com/a/hksecurity.net/ocslab/Datasets/da-tachallenge2019/car.
[1] SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353.
[2] REN Shou-peng, LI Jin, WANG Jing-ru, YUE Kun. Ensemble Regression Decision Trees-based lncRNA-disease Association Prediction [J]. Computer Science, 2022, 49(2): 265-271.
[3] LIU Zhen-yu, SONG Xiao-ying. Multivariate Regression Forest for Categorical Attribute Data [J]. Computer Science, 2022, 49(1): 108-114.
[4] CAO Yang-chen, ZHU Guo-sheng, QI Xiao-yun, ZOU Jie. Research on Intrusion Detection Classification Based on Random Forest [J]. Computer Science, 2021, 48(6A): 459-463.
[5] DING Si-fan, WANG Feng, WEI Wei. Relief Feature Selection Algorithm Based on Label Correlation [J]. Computer Science, 2021, 48(4): 91-96.
[6] DONG Ming-gang, HUANG Yu-yang, JING Chao. K-Nearest Neighbor Classification Training Set Optimization Method Based on Genetic Instance and Feature Selection [J]. Computer Science, 2020, 47(8): 178-184.
[7] ZOU Jie, ZHU Guo-sheng, QI Xiao-yun and CAO Yang-chen. HTTPS Encrypted Traffic Classification Method Based on C4.5 Decision Tree [J]. Computer Science, 2020, 47(6A): 381-385.
[8] ZHU Di-chen, XIA Huan, YANG Xiu-zhang, YU Xiao-min, ZHANG Ya-cheng and WU Shuai. Research on Mobile Game Industry Development in China Based on Text Mining and Decision Tree Analysis [J]. Computer Science, 2020, 47(6A): 530-534.
[9] WANG Hai-tao, SONG Li-hua, XIANG Ting-ting, LIU Li-jun. New Development Direction of Artificial Intelligence-Human Cyber Physical Ternary Fusion Intelligence [J]. Computer Science, 2020, 47(11A): 1-5.
[10] DONG Ben-qing, LI Feng-kun. Analysis of Emotional Degree of Poetry Reading Based on WDOUDT [J]. Computer Science, 2020, 47(11A): 46-51.
[11] LV Ming-qi, LI Yi-fan, CHEN Tie-ming. Spatial Estimation Method of Air Quality Based on Terrain Factors LV Ming-qi LI Yi-fan CHEN Tie-ming [J]. Computer Science, 2019, 46(1): 265-270.
[12] XU Zhao-zhao, LI Ching-hwa, CHEN Tong-lin, LEE Shin-jye. Naive Bayesian Decision TreeAlgorithm Combining SMOTE and Filter-Wrapper and It’s Application [J]. Computer Science, 2018, 45(9): 65-69.
[13] DAI Ming-zhu,GAO Song-feng. Research on Data Mining Algorithm Based on Examination Process and Knowledge Structure [J]. Computer Science, 2018, 45(6A): 437-441.
[14] SHI Zhi-kai,ZHU Guo-sheng,LEI Long-fei,CHEN Sheng,ZHEN Jia,WU Shan-chao,WU Meng-yu. NAT Device Detection Method Based on C5.0 Decision Tree [J]. Computer Science, 2018, 45(6A): 323-327.
[15] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree [J]. Computer Science, 2018, 45(4): 157-162.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!