Transparent Peer Review By Scholar9
Intrusion Detection System and feature analysis of network attacks in VANETs
Abstract
Vehicular Adhoc networks (VANETs) is the most promising research area. Implementation of VANETs needs to address issues on security, privacy and speed. Security in VANETs is very important. Understanding that the attack is happening is very important to address these issues. Our previous paper includes a comprehensive survey on security attacks in VANETs and the impact of attacks on the network. This paper discusses how efficiently the Machine Learning algorithms help identify the attack. Machine Learning algorithms are utmost widely used to make such predictions because of their well-accepted accuracy. This paper discusses DDoS, PortScan and DoS Hulk attack classification using different trained models to see which algorithm is more effective and why. Models are developed using MATLAB. With the help of results, an attempt has been made to explain the reason for misclassification and why certain Machine Learning algorithms have greater classification accuracy.
Archit Joshi Reviewer
07 Oct 2024 04:43 PM
Approved
Relevance and Originality
The paper tackles a critical issue in the emerging field of Vehicular Adhoc Networks (VANETs), focusing on security challenges that accompany their implementation. Given the increasing integration of these networks in intelligent transportation systems, the relevance of this research is high. The exploration of machine learning algorithms for attack identification adds originality, as it aligns current technological advancements with the pressing need for robust security measures. However, further highlighting specific gaps in existing research could strengthen the originality aspect, particularly in relation to the novel applications of machine learning in this domain.
Methodology
The methodology is clearly outlined, detailing the use of machine learning algorithms to classify different types of attacks, such as DDoS, PortScan, and DoS Hulk. The choice of MATLAB for model development is appropriate, but the paper would benefit from a more detailed explanation of the data preprocessing steps, feature selection, and the specific machine learning algorithms employed. Additionally, discussing the criteria for model evaluation and performance metrics would provide clarity on how effectiveness is determined, enhancing the overall robustness of the methodology.
Validity & Reliability
The validity of the research is bolstered by the focus on machine learning, which is well-regarded for its predictive accuracy in security applications. However, to enhance reliability, it is essential to present empirical results demonstrating the models' performance across different datasets. Addressing potential limitations, such as dataset size, diversity, and real-world applicability, would provide a more balanced view of the findings. Discussing the reproducibility of the models in varied network conditions could also strengthen the reliability of the conclusions drawn.
Clarity and Structure
The paper is generally well-structured, guiding the reader through the problem statement, methodology, and findings in a logical manner. However, clearer section headings could improve navigation, especially in distinguishing between different types of attacks and their respective analyses. Incorporating diagrams or flowcharts to visually represent the machine learning process and model evaluation would enhance clarity. Additionally, simplifying some technical terminology or providing definitions could make the paper more accessible to readers who may not be familiar with advanced machine learning concepts.
Result Analysis
The result analysis effectively discusses the performance of different machine learning models in classifying attacks. While the insights into misclassification reasons are valuable, providing specific performance metrics, such as accuracy, precision, and recall for each model, would enhance the analysis. Moreover, discussing potential implications for real-world deployment of these models in VANETs would provide context for the research findings. Overall, the paper presents a promising approach to improving security in VANETs through machine learning, but further elaboration on results and their practical applications would strengthen the analysis.
IJ Publication Publisher
Thank You Sir
Archit Joshi Reviewer