{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,28]],"date-time":"2023-09-28T14:16:00Z","timestamp":1695910560255},"posted":{"date-parts":[[2023]]},"group-title":"SSRN","reference-count":39,"publisher":"Elsevier BV","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.2139\/ssrn.4584958","type":"posted-content","created":{"date-parts":[[2023,9,27]],"date-time":"2023-09-27T04:18:35Z","timestamp":1695788315000},"source":"Crossref","is-referenced-by-count":0,"title":["Vaidanshh: Adaptive Ddos Detection for Heterogeneous Hosts in Vehicular Environments"],"prefix":"10.2139","author":[{"given":"Amandeep","family":"Verma","sequence":"first","affiliation":[]},{"given":"Rahul","family":"Saha","sequence":"additional","affiliation":[]},{"given":"Gulshan","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[]},{"given":"Joel  J. P. C.","family":"Rodrigues","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"44536","DOI":"10.1109\/ACCESS.2019.2908664","article-title":"Privacy Ensured e-healthcare for fog-enhanced IoT based applications","volume":"7","author":"Rahul Saha","year":"2019","journal-title":"IEEE Access"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1109\/INFOCOM41043.2020.9155531","article-title":"Tagray: Contactless sensing and tracking of mobile objects using cots RFID devices","author":"Ziyang Chen","year":"2020","journal-title":"IEEE INFOCOM 2020-IEEE Conference on Computer Communications"},{"issue":"10","key":"ref3","doi-asserted-by":"crossref","DOI":"10.3390\/app11104682","article-title":"The security perspectives of vehicular networks: a taxonomical analysis of attacks and solutions","volume":"11","author":"A Verma","year":"2021","journal-title":"Applied Sciences"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"46558","DOI":"10.1109\/ACCESS.2018.2866759","article-title":"Multidimensional security provision for secure communication in vehicular ad hoc networks using hierarchical structure and end-to-end authentication","volume":"6","author":"Gulshan Kumar","year":"2018","journal-title":"IEEE Access"},{"issue":"7","key":"ref5","doi-asserted-by":"crossref","first-page":"7707","DOI":"10.1109\/TVT.2020.2989817","article-title":"A privacy-preserving secure framework for electric vehicles in IoT using matching market and signcryption","volume":"69","author":"G Wkumar","year":"2020","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"ref6","article-title":"A lightweight signcryption method for perception layer in Internet-of-Things","volume":"55","author":"Ashish Kumar","year":"2020","journal-title":"Journal of Information Security and Applications"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"170888","DOI":"10.1109\/ACCESS.2019.2955927","article-title":"Intelligent vehicle-to-vehicle charging navigation for mobile electric vehicles via VANET-based communication","volume":"7","author":"Guangyu Li","year":"2019","journal-title":"IEEE Access"},{"key":"ref8","article-title":"Blockchain-based distributed management system for trust in VANET","volume":"30","author":"Youssef Inedjaren","year":"2021","journal-title":"Vehicular Communications"},{"key":"ref9","author":"Bashar Khalaf","year":"2021","journal-title":"An adaptive protection of flooding attacks model for complex network environments"},{"issue":"1","key":"ref10","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1007\/s12652-021-02907-5","article-title":"A feature reduction based reflected and exploited DDoS attacks detection system","volume":"13","author":"Deepak Kshirsagar","year":"2022","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"ref11","first-page":"1","article-title":"Intrusion Detection in VANETs","author":"Ila Naqvi","year":"2021","journal-title":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO)"},{"key":"ref12","first-page":"7","article-title":"VANET security challenges and solutions: a survey","volume":"7","author":"H Hasrouny","year":"2017","journal-title":"Veh. Commun"},{"issue":"12","key":"ref13","doi-asserted-by":"crossref","first-page":"12902","DOI":"10.1109\/TVT.2021.3121449","article-title":"Physically secure lightweight and privacy-preserving message authentication protocol for VANET in smart city","volume":"70","author":"Wajdy Othman","year":"2021","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"ref14","article-title":"A Delay Sensitive Multi-Path Selection to Prevent the Rushing Attack in VANET","author":"Ganesh Reddy","journal-title":"2021 5th International Conference on Information Systems and Computer Networks (ISCON)"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.adhoc.2017.03.006","article-title":"A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV","volume":"61","author":"Fatih Sakiz","year":"2017","journal-title":"Ad Hoc Networks"},{"key":"ref16","first-page":"644","article-title":"Machine learning approach for multiple misbehavior detection in VANET","author":"Jyoti Grover","year":"2011","journal-title":"International conference on advances in computing and communications"},{"key":"ref17","first-page":"1","article-title":"SVM-CASE: An SVMbased context aware security framework for vehicular ad-hoc networks","author":"Wenjia Li","year":"2015","journal-title":"2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall)"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1109\/AINS.2017.8270417","article-title":"An effective misbehavior detection model using artificial neural network for vehicular ad hoc network applications","author":"Fuad A Ghaleb","year":"2017","journal-title":"2017 IEEE conference on application, information and network security (AINS)"},{"key":"ref19","first-page":"19","article-title":"Collaborative security attack detection in software-defined vehicular networks","author":"Myeongsu Kim","year":"2017","journal-title":"2017 19th Asia-Pacific network operations and management symposium (APNOMS)"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"44570","DOI":"10.1109\/ACCESS.2018.2854567","article-title":"An efficient SDN-based DDoS attack detection and rapid response platform in vehicular networks","volume":"6","author":"Yao Yu","year":"2018","journal-title":"IEEE Access"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.vehcom.2018.05.001","article-title":"Jamming attack detection in a pair of RF communicating vehicles using unsupervised machine learning","volume":"13","author":"Dimitrios Karagiannis","year":"2018","journal-title":"vehicular communications"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"712","DOI":"10.1016\/j.asoc.2018.12.001","article-title":"A novel Intrusion Detection System for Vehicular Ad Hoc Networks (VANETs) based on differences of traffic flow and position","volume":"75","author":"Junwei Liang","year":"2019","journal-title":"Applied Soft Computing"},{"key":"ref23","article-title":"A novel intrusion detection system against spoofing attacks in connected electric vehicles","volume":"5","author":"Dimitrios Kosmanos","year":"2020","journal-title":"Array"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1109\/ICACTM.2019.8776833","article-title":"An enhanced approach for attack detection in vanets using adaptive neuro-fuzzy system","author":"Jasleen Kaur","year":"2019","journal-title":"2019 International Conference on Automation, Computational and Technology Management (ICACTM)"},{"key":"ref25","article-title":"An intrusion detection system for connected vehicles in smart cities","volume":"90","author":"Moayad Aloqaily","year":"2019","journal-title":"Ad Hoc Networks"},{"key":"ref26","first-page":"1","article-title":"Markov chain based ant colony approach for mitigating DDoS attacks using integrated vehicle mode analysis in VANET","author":"Raenu Kolandaisamy","year":"2019","journal-title":"2019 IEEE 1st International Conference on Energy, Systems and Information Processing"},{"key":"ref27","first-page":"1","article-title":"NDNIDS: An intrusion detection system for NDN based VANET","author":"Praveensankar Manimaran","year":"2020","journal-title":"2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring)"},{"issue":"3","key":"ref28","article-title":"Splinebased intrusion detection for VANET utilizing knot flow classification","volume":"3","author":"David A Schmidt","year":"2020","journal-title":"Internet Technology Letters"},{"issue":"4","key":"ref29","doi-asserted-by":"crossref","first-page":"3613","DOI":"10.1007\/s11277-020-07549-y","article-title":"Hybrid algorithm to detect DDoS attacks in VANETs","volume":"114","author":"Kaushik Adhikary","year":"2020","journal-title":"Wireless Personal Communications"},{"issue":"7","key":"ref30","article-title":"Machine Learning Approach of Hybrid KSVN Algorithm to Detect DDoS Attack in VANET","volume":"12","author":"Nivedita Kadam","year":"2021","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"ref31","article-title":"Recognition of DDoS Attacks on SD-VANET Based on Combination of Hyperparameter Optimization and Feature Selection","author":"Muammer T\ufffdrkoglu","year":"2022","journal-title":"Expert Systems with Applications"},{"key":"ref32","author":"Wong Shen","year":"2022","journal-title":"Review of Advanced Monitoring Mechanisms in Peer-to-Peer (P2P) Botnets"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/AINS.2017.8270429","article-title":"Adaptive feature selection for denial of services (DoS) attack","author":"A R A Yusof","year":"2017","journal-title":"2017 IEEE Conference on Application, Information and Network Security (AINS)"},{"key":"ref34","author":"Megha Amrita","year":"2013","journal-title":"Performance analysis of different feature selection methods in intrusion detection"},{"key":"ref35","first-page":"1","article-title":"Machine learning-based intrusion detection system for big data analytics in VANET","author":"Mingyuan Zang","year":"2021","journal-title":"2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring)"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"516","DOI":"10.1016\/j.procs.2021.03.065","article-title":"A hybrid data-driven model for intrusion detection in VANET","volume":"184","author":"Hind Bangui","year":"2021","journal-title":"Procedia Computer Science"},{"issue":"11","key":"ref37","article-title":"An Intelligent Hierarchical Security Framework for VANETs","volume":"12","author":"Gonc \ufffdalves","year":"2021","journal-title":"Information"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/978-981-16-4244-9_5","article-title":"An IPS approach to secure V-RSU communication from blackhole and wormhole attacks in VANET","author":"Gaurav Soni","year":"2022","journal-title":"Contemporary Issues in Communication, Cloud and Big Data Analytics"},{"issue":"5","key":"ref39","article-title":"An Efficient Dynamic Solution for the Detection and Prevention of Black Hole Attack in VANETs","volume":"22","author":"Abdul Malik","year":"2022","journal-title":"Sensors"}],"container-title":[],"original-title":[],"deposited":{"date-parts":[[2023,9,27]],"date-time":"2023-09-27T04:22:37Z","timestamp":1695788557000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.ssrn.com\/abstract=4584958"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":39,"URL":"https:\/\/doi.org\/10.2139\/ssrn.4584958","relation":{},"subject":[],"published":{"date-parts":[[2023]]},"subtype":"preprint"}}