{"title":"用于检测智能交通系统中不当行为的数据流聚类","authors":"Sara Ftaimi, T. Mazri","doi":"10.1145/3454127.3456574","DOIUrl":null,"url":null,"abstract":"The security aspect represents a major challenge for the intelligent transport system, whether it is securing the system's various components such as the network and communication between the various nodes or securing the nodes themselves. In ITS, data is generated at high speed, and the data shared between the nodes of the network changes over time at a very high speed. Securing the data shared by the nodes is essential to ensure the integrity and reliable communication. In this paper, we will propose a methodology to detect packets' behavior sent between the different nodes using a data stream clustering algorithm since the data shared between the nodes verify the data stream criteria.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"86 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Data Stream clustering for detecting misbehavior in an intelligent transportation system\",\"authors\":\"Sara Ftaimi, T. Mazri\",\"doi\":\"10.1145/3454127.3456574\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The security aspect represents a major challenge for the intelligent transport system, whether it is securing the system's various components such as the network and communication between the various nodes or securing the nodes themselves. In ITS, data is generated at high speed, and the data shared between the nodes of the network changes over time at a very high speed. Securing the data shared by the nodes is essential to ensure the integrity and reliable communication. In this paper, we will propose a methodology to detect packets' behavior sent between the different nodes using a data stream clustering algorithm since the data shared between the nodes verify the data stream criteria.\",\"PeriodicalId\":432206,\"journal\":{\"name\":\"Proceedings of the 4th International Conference on Networking, Information Systems & Security\",\"volume\":\"86 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 4th International Conference on Networking, Information Systems & Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3454127.3456574\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3454127.3456574","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Data Stream clustering for detecting misbehavior in an intelligent transportation system
The security aspect represents a major challenge for the intelligent transport system, whether it is securing the system's various components such as the network and communication between the various nodes or securing the nodes themselves. In ITS, data is generated at high speed, and the data shared between the nodes of the network changes over time at a very high speed. Securing the data shared by the nodes is essential to ensure the integrity and reliable communication. In this paper, we will propose a methodology to detect packets' behavior sent between the different nodes using a data stream clustering algorithm since the data shared between the nodes verify the data stream criteria.