Skip to main content
Loading...
Scholar9 logo True scholar network
  • Login/Sign up
  • Scholar9
    Publications ▼
    Article List Deposit Article
    Mentorship ▼
    Overview Sessions
    Q&A Institutions Scholars Journals
    Publications ▼
    Article List Deposit Article
    Mentorship ▼
    Overview Sessions
    Q&A Institutions Scholars Journals
  • Login/Sign up
  • Back to Top

    Transparent Peer Review By Scholar9

    Intrusion Detection System and feature analysis of network attacks in VANETs

    Abstract

    Vehicular Adhoc networks (VANETs) is the most promising research area. Implementation of VANETs needs to address issues on security, privacy and speed. Security in VANETs is very important. Understanding that the attack is happening is very important to address these issues. Our previous paper includes a comprehensive survey on security attacks in VANETs and the impact of attacks on the network. This paper discusses how efficiently the Machine Learning algorithms help identify the attack. Machine Learning algorithms are utmost widely used to make such predictions because of their well-accepted accuracy. This paper discusses DDoS, PortScan and DoS Hulk attack classification using different trained models to see which algorithm is more effective and why. Models are developed using MATLAB. With the help of results, an attempt has been made to explain the reason for misclassification and why certain Machine Learning algorithms have greater classification accuracy.

    Reviewer Photo

    Archit Joshi Reviewer

    badge Review Request Accepted
    Reviewer Photo

    Archit Joshi Reviewer

    07 Oct 2024 04:43 PM

    badge Approved

    Relevance and Originality

    Methodology

    Validity & Reliability

    Clarity and Structure

    Results and Analysis

    Relevance and Originality

    The paper tackles a critical issue in the emerging field of Vehicular Adhoc Networks (VANETs), focusing on security challenges that accompany their implementation. Given the increasing integration of these networks in intelligent transportation systems, the relevance of this research is high. The exploration of machine learning algorithms for attack identification adds originality, as it aligns current technological advancements with the pressing need for robust security measures. However, further highlighting specific gaps in existing research could strengthen the originality aspect, particularly in relation to the novel applications of machine learning in this domain.


    Methodology

    The methodology is clearly outlined, detailing the use of machine learning algorithms to classify different types of attacks, such as DDoS, PortScan, and DoS Hulk. The choice of MATLAB for model development is appropriate, but the paper would benefit from a more detailed explanation of the data preprocessing steps, feature selection, and the specific machine learning algorithms employed. Additionally, discussing the criteria for model evaluation and performance metrics would provide clarity on how effectiveness is determined, enhancing the overall robustness of the methodology.


    Validity & Reliability

    The validity of the research is bolstered by the focus on machine learning, which is well-regarded for its predictive accuracy in security applications. However, to enhance reliability, it is essential to present empirical results demonstrating the models' performance across different datasets. Addressing potential limitations, such as dataset size, diversity, and real-world applicability, would provide a more balanced view of the findings. Discussing the reproducibility of the models in varied network conditions could also strengthen the reliability of the conclusions drawn.


    Clarity and Structure

    The paper is generally well-structured, guiding the reader through the problem statement, methodology, and findings in a logical manner. However, clearer section headings could improve navigation, especially in distinguishing between different types of attacks and their respective analyses. Incorporating diagrams or flowcharts to visually represent the machine learning process and model evaluation would enhance clarity. Additionally, simplifying some technical terminology or providing definitions could make the paper more accessible to readers who may not be familiar with advanced machine learning concepts.


    Result Analysis

    The result analysis effectively discusses the performance of different machine learning models in classifying attacks. While the insights into misclassification reasons are valuable, providing specific performance metrics, such as accuracy, precision, and recall for each model, would enhance the analysis. Moreover, discussing potential implications for real-world deployment of these models in VANETs would provide context for the research findings. Overall, the paper presents a promising approach to improving security in VANETs through machine learning, but further elaboration on results and their practical applications would strengthen the analysis.

    Publisher Logo

    IJ Publication Publisher

    Thank You Sir

    Publisher

    IJ Publication

    IJ Publication

    Reviewer

    Archit

    Archit Joshi

    More Detail

    Category Icon

    Paper Category

    Computer Engineering

    Journal Icon

    Journal Name

    IJCRT - International Journal of Creative Research Thoughts External Link

    Info Icon

    p-ISSN

    Info Icon

    e-ISSN

    2320-2882

    Subscribe us to get updated

    logo logo

    Scholar9 is aiming to empower the research community around the world with the help of technology & innovation. Scholar9 provides the required platform to Scholar for visibility & credibility.

    QUICKLINKS

    • What is Scholar9?
    • About Us
    • Mission Vision
    • Contact Us
    • Privacy Policy
    • Terms of Use
    • Blogs
    • FAQ

    CONTACT US

    • +91 82003 85143
    • hello@scholar9.com
    • www.scholar9.com

    © 2026 Sequence Research & Development Pvt Ltd. All Rights Reserved.

    whatsapp