{"id":"https://openalex.org/W4402811831","doi":"https://doi.org/10.1109/csr61664.2024.10679419","title":"Adversarial Attacks in Intrusion Detection Systems: Triggering False Alarms in Connected and Autonomous Vehicles","display_name":"Adversarial Attacks in Intrusion Detection Systems: Triggering False Alarms in Connected and Autonomous Vehicles","publication_year":2024,"publication_date":"2024-09-02","ids":{"openalex":"https://openalex.org/W4402811831","doi":"https://doi.org/10.1109/csr61664.2024.10679419"},"language":"en","primary_location":{"id":"doi:10.1109/csr61664.2024.10679419","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr61664.2024.10679419","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://orca.cardiff.ac.uk/id/eprint/173037/1/adversarial_flase_alarm.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088861779","display_name":"Fatimah Aloraini","orcid":"https://orcid.org/0000-0001-5494-0661"},"institutions":[{"id":"https://openalex.org/I79510175","display_name":"Cardiff University","ror":"https://ror.org/03kk7td41","country_code":"GB","type":"education","lineage":["https://openalex.org/I79510175"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Fatimah Aloraini","raw_affiliation_strings":["School of Computer Science and Informatics, Cardiff University,Cardiff,United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Informatics, Cardiff University,Cardiff,United Kingdom","institution_ids":["https://openalex.org/I79510175"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065308354","display_name":"Amir Javed","orcid":"https://orcid.org/0000-0001-9761-0945"},"institutions":[{"id":"https://openalex.org/I79510175","display_name":"Cardiff University","ror":"https://ror.org/03kk7td41","country_code":"GB","type":"education","lineage":["https://openalex.org/I79510175"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Amir Javed","raw_affiliation_strings":["School of Computer Science and Informatics, Cardiff University,Cardiff,United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Informatics, Cardiff University,Cardiff,United Kingdom","institution_ids":["https://openalex.org/I79510175"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5088861779"],"corresponding_institution_ids":["https://openalex.org/I79510175"],"apc_list":null,"apc_paid":null,"fwci":1.0971,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.79473384,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"714","last_page":"719"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7475717067718506},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7423450946807861},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6666280031204224},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5727038383483887},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.4881911873817444},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3380652070045471},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.28139984607696533}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7475717067718506},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7423450946807861},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6666280031204224},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5727038383483887},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.4881911873817444},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3380652070045471},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.28139984607696533}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/csr61664.2024.10679419","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr61664.2024.10679419","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},{"id":"pmh:oai:https://orca.cardiff.ac.uk:173037","is_oa":true,"landing_page_url":null,"pdf_url":"https://orca.cardiff.ac.uk/id/eprint/173037/1/adversarial_flase_alarm.pdf","source":{"id":"https://openalex.org/S4306401195","display_name":"ORCA Online Research @Cardiff (Cardiff University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79510175","host_organization_name":"Cardiff University","host_organization_lineage":["https://openalex.org/I79510175"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":{"id":"pmh:oai:https://orca.cardiff.ac.uk:173037","is_oa":true,"landing_page_url":null,"pdf_url":"https://orca.cardiff.ac.uk/id/eprint/173037/1/adversarial_flase_alarm.pdf","source":{"id":"https://openalex.org/S4306401195","display_name":"ORCA Online Research @Cardiff (Cardiff University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79510175","host_organization_name":"Cardiff University","host_organization_lineage":["https://openalex.org/I79510175"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4402811831.pdf","grobid_xml":"https://content.openalex.org/works/W4402811831.grobid-xml"},"referenced_works_count":32,"referenced_works":["https://openalex.org/W2095577883","https://openalex.org/W2603766943","https://openalex.org/W2759891682","https://openalex.org/W2889836475","https://openalex.org/W2947832965","https://openalex.org/W2963197901","https://openalex.org/W2963391384","https://openalex.org/W2963542245","https://openalex.org/W2964262308","https://openalex.org/W2979202956","https://openalex.org/W3037857795","https://openalex.org/W3042565595","https://openalex.org/W3097911904","https://openalex.org/W3111088413","https://openalex.org/W3132583427","https://openalex.org/W3133233862","https://openalex.org/W3158507034","https://openalex.org/W3158598208","https://openalex.org/W3164321464","https://openalex.org/W3171142246","https://openalex.org/W3198511875","https://openalex.org/W4221141549","https://openalex.org/W4298325918","https://openalex.org/W4308605894","https://openalex.org/W4313342124","https://openalex.org/W4322487524","https://openalex.org/W4328051075","https://openalex.org/W4366230315","https://openalex.org/W4399675630","https://openalex.org/W4400266772","https://openalex.org/W6637162671","https://openalex.org/W6640425456"],"related_works":["https://openalex.org/W2392603527","https://openalex.org/W2390009783","https://openalex.org/W2348767155","https://openalex.org/W1513478798","https://openalex.org/W2388497169","https://openalex.org/W4283700121","https://openalex.org/W1496376327","https://openalex.org/W2357468538","https://openalex.org/W3120393658","https://openalex.org/W4300599821"],"abstract_inverted_index":{"As":[0],"connected":[1],"and":[2,92,99,112,141],"autonomous":[3],"vehicles":[4],"(CAVs)":[5],"proliferate,":[6],"securing":[7],"their":[8],"internal":[9],"vehicle":[10,146],"networks":[11],"(IVNs)":[12],"against":[13],"cyber":[14],"threats":[15],"is":[16],"paramount.":[17],"Current":[18],"research":[19],"focuses":[20],"on":[21],"developing":[22],"intrusion":[23],"detection":[24],"systems":[25],"(IDSs)":[26],"using":[27,108],"machine":[28],"learning":[29],"(ML)":[30],"models":[31],"to":[32,55,65,68,72,124,131],"handle":[33],"diverse":[34],"threats.":[35,105],"However,":[36],"ML-based":[37,51],"IDSs":[38,52,139],"introduce":[39],"significant":[40],"risks":[41],"from":[42,61],"adversarial":[43,101,115],"attacks.":[44,57],"This":[45,126],"paper":[46],"investigates":[47],"the":[48,128,143],"vulnerability":[49],"of":[50,122,145],"in":[53],"IVNs":[54],"such":[56],"It":[58],"shifts":[59],"focus":[60],"manipulating":[62],"malicious":[63],"frames":[64,74],"appear":[66],"benign":[67,73],"exploring":[69],"IDS":[70],"susceptibility":[71],"appearing":[75],"malicious,":[76],"potentially":[77],"triggering":[78],"false":[79],"alarms.":[80],"In":[81],"critical":[82],"safety":[83,91],"applications":[84],"like":[85],"CAVs,":[86],"these":[87],"alarms":[88],"can":[89],"compromise":[90],"operational":[93],"integrity.":[94],"We":[95],"studied":[96],"IVN":[97],"traffic":[98],"designed":[100],"samples":[102],"simulating":[103],"potential":[104],"Our":[106],"experiments,":[107],"five":[109],"ML":[110],"algorithms":[111],"four":[113],"state-of-the-art":[114],"methods,":[116],"demonstrate":[117],"an":[118],"attack":[119],"success":[120],"rate":[121],"up":[123],"89%.":[125],"underscores":[127],"urgent":[129],"necessity":[130],"address":[132],"this":[133],"vulnerability,":[134],"as":[135],"neglecting":[136],"it":[137],"renders":[138],"ineffective":[140],"increases":[142],"risk":[144],"manipulation.":[147]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
