International Scientific Journal of Engineering and Management

An International Scholarly || Multidisciplinary || Open Access || Indexing in all major Database & Metadata
The journal follows the UGC Guidelines and is evaluated for inclusion in the Web of Science
ISSN: 2583-6129

Impact Factor: 8.072

A Secure and Robust Machine Learning Model for Intrusion Detection in Internet of Vehicles

Version
File Size 509.52 KB
Downloads 33
Files 1
Published 14 March 2026
Updated 14 March 2026

A Secure and Robust Machine Learning Model for Intrusion Detection in Internet of Vehicles

 

 

S SUNIL KUMAR
MTech, Department of Computer Science and Engineering
Vemu Institute of Technology, P-Kothakota,Chittoor
Andhra Pradesh – 517112, India
sunilkumar473@gmail.com

Mr. G. Lokesh
Assistant Professor, MTech Dept of Computer
Science of Engineering Vemu Institute of
Technology, P-Kothakota, Chittoor
Andhra Pradesh – 517112, India

 

 

Abstract: The research introduces a new Intrusion Detection System (IDS) which uses advanced machine learning methods to protect autonomous vehicles. The main purpose of the IDS system entails identifying cyberattacks which the system needs to categorize into different attack types that consist of DDoS Fuzzy Impersonation and standard Free traffic. The complete model development process uses the CAN-intrusion dataset which contains information about vehicle communication through its message and byte-level signal and target label data. The system uses ML techniques which include RF and Gradient Boosting and Adaboost and LSTM and CatBoost for security threat detection andprevention. The Random Forest and Decision Tree models  achieved 94% accuracy which makes them successful in detecting unauthorized access attempts to vehicle networks. The system achieves its maximum protection level through its complete execution of multiple security protocols. The new security enhancements will make smart vehicle systems more secure and reliable. The detection system develops as a scalable solution which protects smart vehicles from the growing number of cyber threats.
Keywords: RF, Gradient Boosting, Adaboost, LSTM, CatBoost classifiers, DDoS attack, Fuzzy attack, and Normal traffic patterns.

Download
or download free
[free_download_btn]
[changelog]

Categories & Tags

Similar Downloads

No related download found!
ISJEM Journal

Author's Blog

What is the difference between a Research Paper and a Review Paper?

A research paper and a review paper are both scholarly documents, but they serve different purposes and have different characteristics....
Read More
Author's Blog

What is DOI?

A Digital Object Identifier (DOI) is a unique alphanumeric string that is used to identify and provide a persistent link...
Read More
Author's Blog

What do you need to do during production of your Research Paper?

During the production of a research paper, the following steps need to be taken: conducting research, organizing and analyzing data,...
Read More
Author's Blog

What are the advantages of publishing a research paper?

Publishing a research paper can have many advantages for researchers, including: Career advancement, professional recognition, opportunities for collaboration, increased visibility,...
Read More
Author's Blog

Ways to Support your Academic Wellbeing which preparing the Research Paper/Article

To support your academic wellbeing while publishing a research paper, it's important to set realistic goals, manage your time effectively,...
Read More
Author's Blog

How to improve your Research Paper writing Skills?

Read extensively: One of the best ways to improve your research paper skills is to read extensively in your field...
Read More
Author's Blog

Is DOI compulsory to publish a research paper in a Journal?

DOI is not strictly required to publish a research paper, but it is highly recommended. Basically, the International Scientific Journal...
Read More
Author's Blog

In what ways does research paper give weight to career development?

Publishing a research paper can give weight to a researcher's career development in several ways, such as: establishing oneself as...
Read More
Author's Blog

How to develop a Research Paper from Scratch

Developing a research paper involves several steps including: choosing a topic, conducting background research, formulating a research question or hypothesis,...
Read More
Author's Blog

How Plagiarism report plays crucial role in Research Paper Publication?

Plagiarism is a major concern in the academic and research community, as it undermines the integrity of the research and...
Read More