The University of Southampton
University of Southampton Institutional Repository

Many-objective optimization based intrusion detection for in-vehicle network security

Many-objective optimization based intrusion detection for in-vehicle network security
Many-objective optimization based intrusion detection for in-vehicle network security
In-vehicle network security plays a vital role in ensuring the secure information transfer between vehicle and Internet. The existing research is still facing great difficulties in balancing the conflicting factors for the in-vehicle network security and hence to improve intrusion detection performance. To challenge this issue, we construct a many-objective intrusion detection model by including information entropy, accuracy, false positive rate and response time of anomaly detection as the four objectives, which represent the key factors influencing intrusion detection performance. We then design an improved intrusion detection algorithm based on many-objective optimization to optimize the detection model parameters. The designed algorithm has double evolutionary selections. Specifically, an improved differential evolutionary operator produces new offspring of the internal population, and a spherical pruning mechanism selects the excellent internal solutions to form the selected pool of the external archive. The second evolutionary selection then produces new offspring of the archive, and an archive selection mechanism of the external archive selects and stores the optimal solutions in the whole detection process. An experiment is performed using a real-world in-vehicle network data set to verify the performance of our proposed model and algorithm. Experimental results obtained demonstrate that our algorithm can respond quickly to attacks and achieve high entropy and detection accuracy as well as very low false positive rate with a good trade-off in the conflicting objective landscape.
Anomaly detection, Behavioral sciences, Data models, Feature extraction, Intrusion detection, Many-objective optimization, Network security, Optimization, in-vehicle network, information entropy, intrusion detection
1524-9050
15051-15065
Zhang, Jiangjiang
97465283-8fad-499d-9b2c-48ab34aed836
Gong, Bei
dd699a78-c0f9-498d-87d4-03f66274f316
Waqas, Muhammad
28f978b5-2da0-4060-aa7c-d5cadc1a48e1
Tu, Shanshan
ef946f84-9863-4438-a847-0171915b0651
Chen, Sheng
9310a111-f79a-48b8-98c7-383ca93cbb80
Zhang, Jiangjiang
97465283-8fad-499d-9b2c-48ab34aed836
Gong, Bei
dd699a78-c0f9-498d-87d4-03f66274f316
Waqas, Muhammad
28f978b5-2da0-4060-aa7c-d5cadc1a48e1
Tu, Shanshan
ef946f84-9863-4438-a847-0171915b0651
Chen, Sheng
9310a111-f79a-48b8-98c7-383ca93cbb80

Zhang, Jiangjiang, Gong, Bei, Waqas, Muhammad, Tu, Shanshan and Chen, Sheng (2023) Many-objective optimization based intrusion detection for in-vehicle network security. IEEE Transactions on Intelligent Transportation Systems, 24 (12), 15051-15065, [3296002]. (doi:10.1109/TITS.2023.3296002).

Record type: Article

Abstract

In-vehicle network security plays a vital role in ensuring the secure information transfer between vehicle and Internet. The existing research is still facing great difficulties in balancing the conflicting factors for the in-vehicle network security and hence to improve intrusion detection performance. To challenge this issue, we construct a many-objective intrusion detection model by including information entropy, accuracy, false positive rate and response time of anomaly detection as the four objectives, which represent the key factors influencing intrusion detection performance. We then design an improved intrusion detection algorithm based on many-objective optimization to optimize the detection model parameters. The designed algorithm has double evolutionary selections. Specifically, an improved differential evolutionary operator produces new offspring of the internal population, and a spherical pruning mechanism selects the excellent internal solutions to form the selected pool of the external archive. The second evolutionary selection then produces new offspring of the archive, and an archive selection mechanism of the external archive selects and stores the optimal solutions in the whole detection process. An experiment is performed using a real-world in-vehicle network data set to verify the performance of our proposed model and algorithm. Experimental results obtained demonstrate that our algorithm can respond quickly to attacks and achieve high entropy and detection accuracy as well as very low false positive rate with a good trade-off in the conflicting objective landscape.

Text
TITS2023-accepted - Accepted Manuscript
Restricted to Repository staff only until 12 July 2025.
Request a copy

More information

Accepted/In Press date: 12 July 2023
e-pub ahead of print date: 25 July 2023
Published date: 1 December 2023
Additional Information: Publisher Copyright: IEEE
Keywords: Anomaly detection, Behavioral sciences, Data models, Feature extraction, Intrusion detection, Many-objective optimization, Network security, Optimization, in-vehicle network, information entropy, intrusion detection

Identifiers

Local EPrints ID: 480417
URI: http://eprints.soton.ac.uk/id/eprint/480417
ISSN: 1524-9050
PURE UUID: 2973232f-3236-40f5-9b10-9af90909714f

Catalogue record

Date deposited: 02 Aug 2023 16:31
Last modified: 17 Mar 2024 03:47

Export record

Altmetrics

Contributors

Author: Jiangjiang Zhang
Author: Bei Gong
Author: Muhammad Waqas
Author: Shanshan Tu
Author: Sheng Chen

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×