Future Network Systems and Security: 5th International Conference, FNSS 2019, Melbourne, VIC, Australia, November 27–29, 2019, Proceedings

Vehicular Ad-hoc Networks (VANETs) are gaining much interest and research efforts over recent years for it offers enhanced safety and improved travel comfort. However, security threats that are either seen in the ad-hoc networks or unique to VANET present considerable challenges. In this paper, we are presenting the intrusion detection classifier for VANET base on preprocessing feature extraction. This ID infrastructure novel is mainly introducing a new design feature for extraction mechanism a pre-processing feature-based classifier. In the beginning, we will extract the traffic stream structures and vehicle location features in the VANET model. Later an Algorithm Preprocessing feature-based classifier was designed for evaluating the IDS by using hierarchy learning process. Finally, an additional two-step validation mechanism was used to determine the abnormal vehicle messages accurately. The proposed method has better finding accuracy, stability, processing efficiency, and communication load.

[1]  Fredrik Johansson,et al.  Time Profiles for Identifying Users in Online Environments , 2014, 2014 IEEE Joint Intelligence and Security Informatics Conference.

[2]  Isaac Woungang,et al.  Continuous Authentication Using Writing Style , 2018, Biometric-Based Physical and Cybersecurity Systems.

[3]  Tempestt J. Neal,et al.  Exploiting Linguistic Style as a Cognitive Biometric for Continuous Verification , 2018, 2018 International Conference on Biometrics (ICB).

[4]  Davide Balzarotti,et al.  Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies , 2017, USENIX Security Symposium.

[5]  Fredrik Johansson,et al.  Evaluating Algorithms for Detection of Compromised Social Media User Accounts , 2015, 2015 Second European Network Intelligence Conference.

[6]  Ondřej Ryšavý,et al.  Distributed password cracking with BOINC and hashcat , 2019, Digit. Investig..

[7]  Pang-Ning Tan,et al.  Understanding compromised accounts on Twitter , 2017, WI.

[8]  Maurice van Keulen,et al.  Detecting Hacked Twitter Accounts based on Behavioural Change , 2017, WEBIST.

[9]  Sylvio Barbon Junior,et al.  Authorship verification applied to detection of compromised accounts on online social networks , 2017, Multimedia Tools and Applications.

[10]  C. Randler,et al.  Circadian Typology: A Comprehensive Review , 2012, Chronobiology international.

[11]  Rick Wash,et al.  Understanding Password Choices: How Frequently Entered Passwords Are Re-used across Websites , 2016, SOUPS.

[12]  William Koch,et al.  Identifier Binding Attacks and Defenses in Software-Defined Networks , 2017, USENIX Security Symposium.

[13]  Gianluca Stringhini,et al.  COMPA: Detecting Compromised Accounts on Social Networks , 2013, NDSS.

[14]  Frank Piessens,et al.  Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 , 2017, CCS.

[15]  Sylvio Barbon Junior,et al.  Recognition on Online Social Network by user's writing style , 2015, Braz. J. Inf. Syst..

[16]  Heng Yin,et al.  Code Injection Attacks on HTML5-based Mobile Apps: Characterization, Detection and Mitigation , 2014, CCS.

[17]  Srdjan Capkun,et al.  On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications , 2014, USENIX Security Symposium.

[18]  Wouter Joosen,et al.  Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting , 2017, CCS.

[19]  David M. Eyers,et al.  FlowWatcher: Defending against Data Disclosure Vulnerabilities in Web Applications , 2015, CCS.

[20]  Gaël Varoquaux,et al.  Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..

[21]  Nor Badrul Anuar,et al.  Malicious accounts: Dark of the social networks , 2017, J. Netw. Comput. Appl..

[22]  Sudhir Aggarwal,et al.  Next Gen PCFG Password Cracking , 2015, IEEE Transactions on Information Forensics and Security.

[23]  Zhi-Li Zhang,et al.  Multi-touch Authentication Using Hand Geometry and Behavioral Information , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[24]  Yuval Elovici,et al.  Friend or foe? Fake profile identification in online social networks , 2013, Social Network Analysis and Mining.

[25]  Jun Hu,et al.  Detecting and characterizing social spam campaigns , 2010, IMC '10.

[26]  Brij B. Gupta,et al.  Classification of various attacks and their defence mechanism in online social networks: a survey , 2019, Enterp. Inf. Syst..

[27]  Meike Nauta Detecting Hacked Twitter Accounts by Examining Behavioural Change using Twitter Metadata , 2016 .

[28]  Calton Pu,et al.  Tail Attacks on Web Applications , 2017, CCS.

[29]  Isaac Woungang,et al.  Authorship verification of e-mail and tweet messages applied for continuous authentication , 2015, J. Comput. Syst. Sci..

[30]  Pranjal Singh,et al.  A comparison of classifiers and features for authorship authentication of social networking messages , 2017, Concurr. Comput. Pract. Exp..

[31]  Matthew Smith,et al.  Why Do Developers Get Password Storage Wrong?: A Qualitative Usability Study , 2017, CCS.

[32]  Emin Islam Tatli Cracking More Password Hashes With Patterns , 2015, IEEE Transactions on Information Forensics and Security.

[33]  Tat-Seng Chua,et al.  Harvesting Multiple Sources for User Profile Learning: a Big Data Study , 2015, ICMR.

[34]  S. Santhosinidevi,et al.  Towards Detecting Compromised Accounts on Social Networks , 2018 .

[35]  Sushil Jajodia,et al.  Profiling Online Social Behaviors for Compromised Account Detection , 2016, IEEE Transactions on Information Forensics and Security.

[36]  Michael M. Swift,et al.  A Placement Vulnerability Study in Multi-Tenant Public Clouds , 2015, USENIX Security Symposium.

[37]  Nicolas Christin,et al.  Automatically Detecting Vulnerable Websites Before They Turn Malicious , 2014, USENIX Security Symposium.

[38]  Prasad Naldurg,et al.  MACE: Detecting Privilege Escalation Vulnerabilities in Web Applications , 2014, CCS.

[39]  Dan Boneh,et al.  Password Managers: Attacks and Defenses , 2014, USENIX Security Symposium.

[40]  Konrad Rieck,et al.  Twice the Bits, Twice the Trouble: Vulnerabilities Induced by Migrating to 64-Bit Platforms , 2016, CCS.

[41]  Sooyong Park,et al.  Where Is Current Research on Blockchain Technology?—A Systematic Review , 2016, PloS one.

[42]  Kim-Kwang Raymond Choo,et al.  Bit-level n-gram based forensic authorship analysis on social media: Identifying individuals from linguistic profiles , 2016, J. Netw. Comput. Appl..

[43]  Jong Kim,et al.  WarningBird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream , 2013, IEEE Transactions on Dependable and Secure Computing.

[44]  Christopher Krügel,et al.  BootStomp: On the Security of Bootloaders in Mobile Devices , 2017, USENIX Security Symposium.

[45]  Wouter Joosen,et al.  The Wolf of Name Street: Hijacking Domains Through Their Nameservers , 2017, CCS.

[46]  Harish Kumar,et al.  AuthCom: Authorship verification and compromised account detection in online social networks using AHP-TOPSIS embedded profiling based technique , 2018, Expert Syst. Appl..

[47]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[48]  Mohammad S. Obaidat,et al.  Authorship verification using deep belief network systems , 2017, Int. J. Commun. Syst..

[49]  Peng Jiang,et al.  A Survey on the Security of Blockchain Systems , 2017, Future Gener. Comput. Syst..

[50]  Yang Su,et al.  USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs , 2017, USENIX Security Symposium.

[51]  Alexander Binder,et al.  An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets , 2018, ArXiv.

[52]  Elie Bursztein,et al.  Cloak of Visibility: Detecting When Machines Browse a Different Web , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[53]  Yang Zhang,et al.  Detecting Compromised Email Accounts from the Perspective of Graph Topology , 2016, CFI.

[54]  Wenke Lee,et al.  Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising , 2014, CCS.

[55]  Mahmoud Al-Ayyoub,et al.  Feature extraction and selection for Arabic tweets authorship authentication , 2017, J. Ambient Intell. Humaniz. Comput..

[56]  Philipp G. Sandner,et al.  Comparison of Ethereum, Hyperledger Fabric and Corda , 2017 .

[57]  Moshe Koppel,et al.  Authorship verification as a one-class classification problem , 2004, ICML.

[58]  Magdalena Jankowska,et al.  Proximity Based One-class Classification with Common N-Gram Dissimilarity for Authorship Verification Task Notebook for PAN at CLEF 2013 , 2013, CLEF.

[59]  Dan Boneh,et al.  T/Key: Second-Factor Authentication From Secure Hash Chains , 2017, CCS.

[60]  Meng Luo,et al.  Hindsight: Understanding the Evolution of UI Vulnerabilities in Mobile Browsers , 2017, CCS.

[61]  Kai Chen,et al.  Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews , 2017, CCS.

[62]  Mengyuan Li,et al.  STACCO: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves , 2017, CCS.

[63]  Barbara Carminati,et al.  Anomalous change detection in time-evolving OSNs , 2016, 2016 Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net).

[64]  Kevin R. B. Butler,et al.  ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices , 2016, CCS.

[65]  Tobias Lauinger,et al.  Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web , 2018, NDSS.

[66]  Iuon-Chang Lin,et al.  A Survey of Blockchain Security Issues and Challenges , 2017, Int. J. Netw. Secur..

[67]  Michael K. Reiter,et al.  Cross-Tenant Side-Channel Attacks in PaaS Clouds , 2014, CCS.