An abnormal intrusion detection method for Internet of Vehicles based on the difference of traffic flow density

A technology of traffic flow density and intrusion detection, applied in the transmission system, electrical components, etc., can solve the problems of vehicle security loopholes, low classification accuracy, and time-consuming, etc., and achieve the goal of adapting to the moving speed, ensuring high efficiency, and ensuring integrity Effect

Active Publication Date: 2020-08-07
BEIHANG UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example: the hacking of Jeep, some vehicles equipped with the Connected Drive digital service system have security vulnerabilities, etc., and once the security problems of the Internet of Vehicles break out, it will seriously threaten the safety of people's lives and property
[0006] There are many existing algorithms for intrusion detection, including: neural network, support vector machine, genetic algorithm, statistical algorithm, etc. For the neural network classification algorithm, the classification system can be continuously updated through machine learning during the implementation process, but the Its application in the Internet of Vehicles system is too costly and time-consuming, and it cannot guarantee real-time detection in the Internet of Vehicles environment with frequent topologies; for support vector machines, it has many advantages in solving small samples, nonlinear and high-dimensional pattern recognition. However, in the intrusion detection of the Internet of Vehicles, the amount of data is huge, and it mainly involves two types of recognition, so the application of support vector machines will also have some shortcomings; the naive Bayesian algorithm based on statistics is widely used. It has strong classification ability in two types of classification problems, but the classification accuracy of Naive Bayesian algorithm is low. In actual application, it should be improved and adjusted according to actual needs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An abnormal intrusion detection method for Internet of Vehicles based on the difference of traffic flow density
  • An abnormal intrusion detection method for Internet of Vehicles based on the difference of traffic flow density
  • An abnormal intrusion detection method for Internet of Vehicles based on the difference of traffic flow density

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention will be described in detail below in conjunction with the accompanying drawings and examples.

[0033] Such as figure 1 As shown, it is a traffic scene diagram of the application of the intrusion detection system of the present invention. The scene is divided into two types corresponding to the application of the two intrusion detection mechanisms. The traffic scene includes the vehicle ad hoc network and the vehicle and roadside base station. The internet. Each vehicle is equipped with an on-board unit for information collection and local detection, and the dedicated communication unit of each roadside base station is connected to a computer for centralized detection. In the method of the present invention, network data packets and basic traffic information, including vehicle speed, position, etc., are obtained in real time through the vehicle-mounted unit and the roadside base station on each vehicle in the network. Then anomaly intrusion detec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a vehicle networking abnormal intrusion detection method based on traffic flow density difference, belonging to the field of vehicle networking and network intrusion detection.The invention is provided with an event analysis module in a vehicle-mounted unit and a roadside base station. Firstly, a distributed intrusion detection mechanism or a centralized intrusion detection mechanism is selected according to the difference of the actual traffic flow density in the road network. Then, the network information and traffic information in the vehicle node are obtained by the vehicle unit, and the anomaly intrusion detection in the vehicle network environment is realized by using the event analysis module of the vehicle computer or the roadbed computer and the weighted improved naive Bayesian algorithm to classify the information. The two detection mechanisms of the invention cooperate with each other so that the vehicle node can be detected under any moving speed, thus ensuring the integrity and high efficiency of the intrusion detection, and solving the problem that the traditional intrusion detection system is not adapted to the dynamic change of the vehicle networking communication and the network node moves quickly.

Description

technical field [0001] The invention relates to a vehicle networking technology and a network intrusion detection technology, in particular to a vehicle network abnormal intrusion detection method based on traffic flow density differences. Background technique [0002] With the intelligent development of the transportation field, the Internet of Vehicles technology has been considered as one of the core technologies of future intelligent transportation. At present, the development of the Internet of Vehicles has provided great convenience to our lives, including the real-time transmission of traffic information and the reduction of traffic congestion. At the same time, information security issues in the Internet of Vehicles have gradually emerged. For example: the hacking incident of Jeep, some vehicles equipped with the Connected Drive digital service system have security vulnerabilities, etc., and once the security problem of the Internet of Vehicles breaks out, it will se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1416H04L63/1425H04L67/12
Inventor 田大新王从毓王云鹏李玉洲段续庭周建山朱宇凯刘超康璐刘文豪
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products