{"title":"车载网络安全威胁数据集的比较综述","authors":"Dorsaf Swessi, H. Idoudi","doi":"10.1109/3ICT53449.2021.9581683","DOIUrl":null,"url":null,"abstract":"With the rapid growth of vehicular technology, Vehicle-to-everything (V2X) communication systems are becoming increasingly challenging, especially regarding security aspects. Using Machine Learning (ML) techniques to build Intrusion Detection Systems (IDS) has shown a high level of accuracy in minimizing V2X communications attacks. However, the effectiveness of ML-based IDSs depends on the availability of a sufficient amount of relevant network traffic logs that cover a wide variety of normal and abnormal samples to train and verify these models. In this paper, we provide the most up-to-date review of existing V2X security datasets. We classify these datasets according to the targeted architecture, the involved attacks, and their severity, etc. Based on these different effectiveness criteria we suggest four distinct yet realistic and reliable datasets including ROAD, VDDD, VeReMi, and VDOS-LRS datasets.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A Comparative Review of Security Threats Datasets for Vehicular Networks\",\"authors\":\"Dorsaf Swessi, H. Idoudi\",\"doi\":\"10.1109/3ICT53449.2021.9581683\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the rapid growth of vehicular technology, Vehicle-to-everything (V2X) communication systems are becoming increasingly challenging, especially regarding security aspects. Using Machine Learning (ML) techniques to build Intrusion Detection Systems (IDS) has shown a high level of accuracy in minimizing V2X communications attacks. However, the effectiveness of ML-based IDSs depends on the availability of a sufficient amount of relevant network traffic logs that cover a wide variety of normal and abnormal samples to train and verify these models. In this paper, we provide the most up-to-date review of existing V2X security datasets. We classify these datasets according to the targeted architecture, the involved attacks, and their severity, etc. Based on these different effectiveness criteria we suggest four distinct yet realistic and reliable datasets including ROAD, VDDD, VeReMi, and VDOS-LRS datasets.\",\"PeriodicalId\":133021,\"journal\":{\"name\":\"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)\",\"volume\":\"47 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-09-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/3ICT53449.2021.9581683\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/3ICT53449.2021.9581683","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Comparative Review of Security Threats Datasets for Vehicular Networks
With the rapid growth of vehicular technology, Vehicle-to-everything (V2X) communication systems are becoming increasingly challenging, especially regarding security aspects. Using Machine Learning (ML) techniques to build Intrusion Detection Systems (IDS) has shown a high level of accuracy in minimizing V2X communications attacks. However, the effectiveness of ML-based IDSs depends on the availability of a sufficient amount of relevant network traffic logs that cover a wide variety of normal and abnormal samples to train and verify these models. In this paper, we provide the most up-to-date review of existing V2X security datasets. We classify these datasets according to the targeted architecture, the involved attacks, and their severity, etc. Based on these different effectiveness criteria we suggest four distinct yet realistic and reliable datasets including ROAD, VDDD, VeReMi, and VDOS-LRS datasets.