EconPapers    
Economics at your fingertips  
 

Machine Learning-Based Detection for Cyber Security Attacks on Connected and Autonomous Vehicles

Qiyi He, Xiaolin Meng, Rong Qu and Ruijie Xi
Additional contact information
Qiyi He: Nottingham Geospatial Institute, University of Nottingham, Nottingham NG7 2TU, UK
Xiaolin Meng: Nottingham Geospatial Institute, University of Nottingham, Nottingham NG7 2TU, UK
Rong Qu: School of Computer Science, University of Nottingham, Nottingham NG8 1BB, UK
Ruijie Xi: Nottingham Geospatial Institute, University of Nottingham, Nottingham NG7 2TU, UK

Mathematics, 2020, vol. 8, issue 8, 1-20

Abstract: Connected and Autonomous Vehicle (CAV)-related initiatives have become some of the fastest expanding in recent years, and have started to affect the daily lives of people. More and more companies and research organizations have announced their initiatives, and some have started CAV road trials. Governments around the world have also introduced policies to support and accelerate the deployments of CAVs. Along these, issues such as CAV cyber security have become predominant, forming an essential part of the complications of CAV deployment. There is, however, no universally agreed upon or recognized framework for CAV cyber security. In this paper, following the UK CAV cyber security principles, we propose a UML (Unified Modeling Language)-based CAV cyber security framework, and based on which we classify the potential vulnerabilities of CAV systems. With this framework, a new CAV communication cyber-attack data set (named CAV-KDD) is generated based on the widely tested benchmark data set KDD99. This data set focuses on the communication-based CAV cyber-attacks. Two classification models are developed, using two machine learning algorithms, namely Decision Tree and Naive Bayes, based on the CAV-KDD training data set. The accuracy, precision and runtime of these two models when identifying each type of communication-based attacks are compared and analysed. It is found that the Decision Tree model requires a shorter runtime, and is more appropriate for CAV communication attack detection.

Keywords: Connected and Autonomous Vehicle; cyber security; machine learning (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2020
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (1)

Downloads: (external link)
https://www.mdpi.com/2227-7390/8/8/1311/pdf (application/pdf)
https://www.mdpi.com/2227-7390/8/8/1311/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:8:y:2020:i:8:p:1311-:d:395814

Access Statistics for this article

Mathematics is currently edited by Ms. Emma He

More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jmathe:v:8:y:2020:i:8:p:1311-:d:395814