PhD defense Ayoub Wehby: Cyberattacks Detection in Cooperative Intelligent Transportation System (C-ITS)
Thursday 03 July 2025, at 14.00 (Paris time) at Télécom Paris
Télécom Paris, 19 place Marguerite Perey F-91120 Palaiseau [getting there], amphi 6 and in videoconferencing
Jury
Oyunchimeg SHAGDAR, Connectivity Innovation Project Manager, Renault Groupe (AMPERE), France (Reviewer)
Dominique GAITI, Professor, Université de Technologie de Troyes, France (Reviewer)
Houda LABIOD, Professor, HUAWEI, France (Examiner)
Sherali ZEADALLY, Professor, University of Kentucky, United States (Examiner)
Diogo Menezes FERRAZANI MATTOS, Professor, Fluminense Federal University, Brazil (Examiner)
Pierre GACHON, Expert Leader Cyber Security, Renault Groupe (AMPERE), France (Invited)
Rida KHATOUN, Professor, Télécom Paris, France (Thesis Director)
Ahmad FADLALLAH, Professor, University of Sciences and Arts in Lebanon (USAL), Lebanon (Thesis Co-supervisor)
Abstract
Modern vehicles are becoming smarter, communicating with each other to enhance traffic flow and improve safety. However, this connectivity also exposes them to cyberattacks, particularly Distributed Denial of Service (DDoS) attacks where malicious actors overwhelm vehicular networks with fake messages, disrupting real-time communication between cars. This can lead to issues ranging from navigation failures to serious accidents.
… that exploits Cooperative Awareness Messages (CAMs), which cars use to share their location and speed. We propose an approach for a distributed Intrusion Detection System (IDS) designed to mitigate DDoS attacks in a connected car environment. Initially, we assessed the impact of CAM-DDoS attacks on connected cars through various simulation scenarios. These scenarios revealed a decrease in the CAM broadcast rate from legitimate cars and an accumulation of invalid data. Subsequently, we proposed a distributed architecture for an IDS and assessed the effectiveness of three supervised ensemble learning algorithms against these attacks. Given the challenge of generalizability in machine learning models, we also evaluated the robustness of our DDoS detection approach against other types of DDoS attacks, such as JamDDoS. The results show that all DDoS messages were processed uniformly, which explains the models’ robust performance against studied DDoS attacks. Additionally, we demonstrated how a DDoS attack can be transformed into a Sybil DDoS attack that avoids DDoS detectors in a safety-critical connected car environment. To address this, we developed and evaluated an optimized data-handling approach that serves as the foundation for our proposed ensemble hard voting detection model. The results obtained demonstrate an effective attack detection with reduced false alarms against Sybil DDoS attacks.
haut de pagetop of the page
We use cookies to enhance your visit to our website. Do you accept cookies?Nous utilisons des cookies pour améliorer votre visite sur notre site web. Acceptez-vous les cookies ?
Notre site web utilise des services tiers pour améliorer votre navigation. Choisissez ici les cookies des services tiers que vous autorisez. Pour plus d'information reportez-vous à notre politique de confidentialité.Our website uses third party services to improve your browsing experience. Choose here the cookies of the third party services that you authorise. For more information please refer to our privacy policy.
Ce service de Google permet d’afficher sur le site des caractères typographiques spécifiques. Google Fonts ne créé pas de cookies. Toutefois, si une police est affichée par le navigateur du visiteur, l’adresse IP du visiteur est enregistrée par Google et utilisée à des fins d’analyse.
Le LinkedIn Insight Tag permet de collecter des données concernant les visites de certaines pages du site web, comme l’URL, le référent, l’adresse IP, les caractéristiques de l’appareil et du navigateur et l’horodatage.
Ce service permet de diffuser des vidéos sur les pages de notre site. Le contenu Youtube intégré sur nos pages se comporte de la même manière que si le visiteur se rendait sur Youtube. Le service peut déposer jusqu’à 4 cookies et collecter des données sur vous, embarquer des outils de suivis tiers, suivre vos interactions avec ces contenus embarqués si vous disposez d’un compte connecté sur leur propre site web.
Le plugin Flow Flow de l’entreprise looks_awesome ne collecte aucune donnée de suivi lors de votre visite. En revanche, les comptes sociaux affichés (Facebook, Twitter, Linkedin, Instagram, etc.) sont susceptibles de le faire.
Le Google Tag Manager permet de collecter des données concernant les visites de certaines pages du site web, comme l’URL, le référent, l’adresse IP, les caractéristiques de l’appareil et du navigateur (agent utilisateur) et l’horodatage.