{"title":"A Comparative Review of Security Threats Datasets for Vehicular Networks","authors":"Dorsaf Swessi, H. Idoudi","doi":"10.1109/3ICT53449.2021.9581683","DOIUrl":null,"url":null,"abstract":"With the rapid growth of vehicular technology, Vehicle-to-everything (V2X) communication systems are becoming increasingly challenging, especially regarding security aspects. Using Machine Learning (ML) techniques to build Intrusion Detection Systems (IDS) has shown a high level of accuracy in minimizing V2X communications attacks. However, the effectiveness of ML-based IDSs depends on the availability of a sufficient amount of relevant network traffic logs that cover a wide variety of normal and abnormal samples to train and verify these models. In this paper, we provide the most up-to-date review of existing V2X security datasets. We classify these datasets according to the targeted architecture, the involved attacks, and their severity, etc. Based on these different effectiveness criteria we suggest four distinct yet realistic and reliable datasets including ROAD, VDDD, VeReMi, and VDOS-LRS datasets.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/3ICT53449.2021.9581683","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
With the rapid growth of vehicular technology, Vehicle-to-everything (V2X) communication systems are becoming increasingly challenging, especially regarding security aspects. Using Machine Learning (ML) techniques to build Intrusion Detection Systems (IDS) has shown a high level of accuracy in minimizing V2X communications attacks. However, the effectiveness of ML-based IDSs depends on the availability of a sufficient amount of relevant network traffic logs that cover a wide variety of normal and abnormal samples to train and verify these models. In this paper, we provide the most up-to-date review of existing V2X security datasets. We classify these datasets according to the targeted architecture, the involved attacks, and their severity, etc. Based on these different effectiveness criteria we suggest four distinct yet realistic and reliable datasets including ROAD, VDDD, VeReMi, and VDOS-LRS datasets.