Machine Learning for Cyber-Attack Identification from Traffic Flows
Zhou, Yujing, Jacquet, Marc L., Dawit, Robel, Fabre, Skyler, Sarawat, Dev, Khan, Faheem, Newell, Madison, Liu, Yongxin, Liu, Dahai, Chen, Hongyun, Wang, Jian, Wang, Huihui
–arXiv.org Artificial Intelligence
This paper presents our simulation of cyber-attacks and detection strategies on the traffic control system in Daytona Beach, FL. using Raspberry Pi virtual machines and the OPNSense firewall, along with traffic dynamics from SUMO and exploitation via the Metasploit framework. We try to answer the research questions: are we able to identify cyber attacks by only analyzing traffic flow patterns. In this research, the cyber attacks are focused particularly when lights are randomly turned all green or red at busy intersections by adversarial attackers. Despite challenges stemming from imbalanced data and overlapping traffic patterns, our best model shows 85\% accuracy when detecting intrusions purely using traffic flow statistics. Key indicators for successful detection included occupancy, jam length, and halting durations.
arXiv.org Artificial Intelligence
May-6-2025
- Country:
- North America > United States
- Florida
- Hillsborough County > University (0.04)
- Volusia County > Daytona Beach (0.26)
- Tennessee (0.04)
- Florida
- North America > United States
- Genre:
- Research Report > New Finding (1.00)
- Industry:
- Government > Military
- Cyberwarfare (0.94)
- Information Technology > Security & Privacy (1.00)
- Transportation (1.00)
- Government > Military
- Technology:
- Information Technology
- Artificial Intelligence > Machine Learning
- Neural Networks > Deep Learning (0.70)
- Performance Analysis > Accuracy (0.47)
- Statistical Learning (1.00)
- Communications > Networks (1.00)
- Data Science > Data Mining (1.00)
- Security & Privacy (1.00)
- Artificial Intelligence > Machine Learning
- Information Technology