Main Reference PaperAnomaly Intrusion Detection Method for Vehicular Networks Based on Survival Analysis, Vehicular Communications, 2018 [NS2].
  • An anomaly intrusion detection method is proposed which is based on the survival analysis model. This proposed method, to identify malicious (control area network) CAN messages and accurately detect the normality and abnormality of a vehicle network without semantic knowledge of the CAN ID function.

Description
  • An anomaly intrusion detection method is proposed which is based on the survival analysis model. This proposed method, to identify malicious (control area network) CAN messages and accurately detect the normality and abnormality of a vehicle network without semantic knowledge of the CAN ID function.

  • To improve the accuracy and fast detection speed in the vehicle networks

  • To reduce the computational cost in the network

Aim & Objectives
  • To improve the accuracy and fast detection speed in the vehicle networks

  • To reduce the computational cost in the network

  • An active intrusion prevention system is contributed, that responds by changing the manipulated control area network (CAN) traffic caused by an attack.

Contribution
  • An active intrusion prevention system is contributed, that responds by changing the manipulated control area network (CAN) traffic caused by an attack.

  • Operating System : Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

Software Tools & Technologies
  • Operating System : Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

Project Recommended For
  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Order To Delivery
  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.

Leave Comment

Your email address will not be published. Required fields are marked *

clear formSubmit