{"id":"https://openalex.org/W4414937541","doi":"https://doi.org/10.32604/cmc.2025.067733","title":"Machine Learning-Based Detection of DDoS Attacks in VANETs for Emergency Vehicle Communication","display_name":"Machine Learning-Based Detection of DDoS Attacks in VANETs for Emergency Vehicle Communication","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4414937541","doi":"https://doi.org/10.32604/cmc.2025.067733"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.067733","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.067733","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.067733","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092602283","display_name":"Bappa Muktar","orcid":"https://orcid.org/0009-0002-7235-8653"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Bappa Muktar","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064611097","display_name":"Vincent Fono","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Vincent Fono","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5025476621","display_name":"Adama Nouboukpo","orcid":"https://orcid.org/0000-0003-0324-1443"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Adama Nouboukpo","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5092602283"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":6.6664,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.96774656,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"85","issue":"3","first_page":"4705","last_page":"4727"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9851999878883362,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9761999845504761,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6656000018119812},{"id":"https://openalex.org/keywords/boosting","display_name":"Boosting (machine learning)","score":0.5723999738693237},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4616999924182892},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.45489999651908875},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.4244000017642975},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.4074999988079071},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.40380001068115234},{"id":"https://openalex.org/keywords/intelligent-transportation-system","display_name":"Intelligent transportation system","score":0.3776000142097473},{"id":"https://openalex.org/keywords/gradient-boosting","display_name":"Gradient boosting","score":0.37610000371932983}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7825999855995178},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6656000018119812},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.5723999738693237},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.508400022983551},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4616999924182892},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.45489999651908875},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4244000017642975},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.4074999988079071},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.40380001068115234},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.40049999952316284},{"id":"https://openalex.org/C47796450","wikidata":"https://www.wikidata.org/wiki/Q508378","display_name":"Intelligent transportation system","level":2,"score":0.3776000142097473},{"id":"https://openalex.org/C70153297","wikidata":"https://www.wikidata.org/wiki/Q5591907","display_name":"Gradient boosting","level":3,"score":0.37610000371932983},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.37130001187324524},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3643999993801117},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.3483000099658966},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.3465000092983246},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.33550000190734863},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.33320000767707825},{"id":"https://openalex.org/C114809511","wikidata":"https://www.wikidata.org/wiki/Q1412924","display_name":"Flow network","level":2,"score":0.31949999928474426},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.3075999915599823},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.3021000027656555},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2888999879360199},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.2842000126838684},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.27390000224113464},{"id":"https://openalex.org/C111852164","wikidata":"https://www.wikidata.org/wiki/Q1414679","display_name":"Handover","level":2,"score":0.2644999921321869},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.26339998841285706},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.2632000148296356},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.257999986410141}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.32604/cmc.2025.067733","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.067733","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:2505.08810","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2505.08810","pdf_url":"https://arxiv.org/pdf/2505.08810","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.067733","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.067733","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Vehicular":[0],"Ad":[1],"Hoc":[2],"Networks":[3],"(VANETs)":[4],"are":[5,76,114],"central":[6],"to":[7],"Intelligent":[8],"Transportation":[9],"Systems":[10],"(ITS),":[11],"especially":[12],"for":[13,40,191,196],"real-time":[14,175],"communication":[15],"involving":[16],"emergency":[17,197],"vehicles.":[18],"Yet,":[19],"Distributed":[20],"Denial":[21],"of":[22,59],"Service":[23],"(DDoS)":[24],"attacks":[25,43],"can":[26],"disrupt":[27],"safety-critical":[28],"channels":[29],"and":[30,57,83,103,129,141,164,189],"undermine":[31],"reliability.":[32],"This":[33],"paper":[34],"presents":[35],"a":[36,49],"robust,":[37],"scalable":[38],"framework":[39,185],"detecting":[41],"DDoS":[42],"in":[44,193],"highway":[45,71],"VANETs.":[46],"We":[47],"construct":[48],"new":[50],"dataset":[51],"with":[52,64,98,162],"Network":[53,133],"Simulator":[54],"3":[55],"(NS-3)":[56],"Simulation":[58],"Urban":[60],"Mobility":[61],"(SUMO),":[62],"enriched":[63],"real":[65],"mobility":[66],"traces":[67],"from":[68],"Germany\u2019s":[69],"A81":[70],"(OpenStreetMap).":[72],"Three":[73],"traffic":[74],"classes":[75],"modeled:":[77],"DDoS,":[78],"Voice":[79],"over":[80],"IP":[81],"(VoIP),":[82],"Transmission":[84],"Control":[85],"Protocol":[86],"Based":[87],"(TCP-based)":[88],"video":[89],"streaming":[90],"(VideoTCP).":[91],"The":[92],"pipeline":[93],"includes":[94],"normalization,":[95],"feature":[96],"selection":[97],"SHapley":[99],"Additive":[100],"exPlanations":[101],"(SHAP),":[102],"class":[104],"balancing":[105],"via":[106],"Synthetic":[107],"Minority":[108],"Over-sampling":[109],"Technique":[110],"(SMOTE).":[111],"Eleven":[112],"classifiers":[113],"benchmarked\u2014including":[115],"eXtreme":[116],"Gradient":[117,126],"Boosting":[118,121,124,127],"(XGBoost),":[119],"Categorical":[120],"(CatBoost),":[122],"Adaptive":[123],"(AdaBoost),":[125],"(GB),":[128],"an":[130,159],"Artificial":[131],"Neural":[132],"(ANN)\u2014using":[134],"stratified":[135],"5-fold":[136],"cross-validation.":[137],"XGBoost,":[138],"GB,":[139],"CatBoost":[140],"ANN":[142],"achieve":[143],"the":[144,168,182],"highest":[145],"performance":[146],"(weighted":[147],"F1-score":[148],"=":[149],"97%).":[150],"To":[151],"assess":[152],"robustness":[153],"under":[154],"non-ideal":[155],"conditions,":[156],"we":[157],"introduce":[158],"adversarial":[160],"evaluation":[161],"packet-loss":[163],"traffic-jitter":[165],"(small-sample":[166],"deformation);":[167],"top":[169],"models":[170],"retain":[171],"strong":[172],"performance,":[173],"supporting":[174],"applicability.":[176],"Collectively,":[177],"these":[178],"results":[179],"demonstrate":[180],"that":[181],"proposed":[183],"highway-focused":[184],"is":[186],"accurate,":[187],"resilient,":[188],"well-suited":[190],"deployment":[192],"VANET":[194],"security":[195],"communications.":[198]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3}],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
