-
CiteScore
-
Impact Factor
Volume 2, Issue 2, ICCK Transactions on Advanced Computing and Systems
Volume 2, Issue 2, 2025
Submit Manuscript Edit a Special Issue
Article QR Code
Article QR Code
Scan the QR code for reading
Popular articles
ICCK Transactions on Advanced Computing and Systems, Volume 2, Issue 2, 2025: 27-39

Open Access | Research Article | 29 June 2025
Intelligent Cyber-Attack Detection for Autonomous Vehicles Using Advanced Deep Learning Models
1 Department of Computer Science, Qurtuba University of Science \& Information Technology, 25000 Peshawar, Pakistan
2 Department of Computer Science, University of Science \& Technology, Bannu, Pakistan
3 School of Computer and Communication Engineering, University of Science and Technology Beijing (USTB), China
4 Department of Computer Science and Engineering, Sejong University, Seoul 05006, Republic of Korea
5 Department of Business informatics, Technical University of Vienna (TUWIEN), Austria
6 Bangladesh University of Professionals, Dhaka, Bangladesh
* Corresponding Author: Zeeshan Ali Haider, [email protected]
Received: 03 May 2025, Accepted: 09 June 2025, Published: 29 June 2025  
Abstract
The Internet of Vehicles (IoV) has greatly influenced transportation by allowing autonomous vehicles to interact and communicate with other cars as well as with the surrounding traffic system. Even so, being interconnected comes with risks in terms of cyber attacks, for example, by injecting messages or fooling sensors through CAN systems. The study, consequently, suggests an Intrusion Detection System (IDS) that uses Convolutional Neural Networks (CNN), Recurrent Neural Networks (RNN), Long Short-Term Memory (LSTM), Bidirectional Encoder Representations from Transformers (BERT), and RoBERTa, to properly detect and handle these cyber threats. To solve the problem of unbalanced data, we use Random Over-Sampling (ROS), NearMiss, and Tomek Links, which makes the model work more effectively. Results from experiments show that the IDS suggested here is better than traditional machine learning models. Adopting cloud computing helps make the system more flexible and lets it be watched continually to keep AVs well protected. An IDS in smart cities greatly benefits vehicle networks, as it hinders and stops possible cyberattacks. Related work will aim to improve IDS performance for big organizations and cope with new types of attacks.

Graphical Abstract
Intelligent Cyber-Attack Detection for Autonomous Vehicles Using Advanced Deep Learning Models

Keywords
autonomous vehicles (AVs)
cyber-attack detection
internet of vehicles (IoV)
bidirectional encoder representations from transformers (BERT)
cybersecurity
smart cities

Data Availability Statement
Data will be made available on request.

Funding
This work was supported without any funding.

Conflicts of Interest
The authors declare no conflicts of interest.

Ethical Approval and Consent to Participate
Not applicable.

References
  1. AlEisa, H. N., Alrowais, F., Allafi, R., Almalki, N. S., Faqih, R., Marzouk, R., ... & Ibrahim, S. S. (2023). Transforming transportation: Safe and secure vehicular communication and anomaly detection with intelligent cyber–physical system and deep learning. IEEE Transactions on Consumer Electronics, 70(1), 1736-1746.
    [CrossRef]   [Google Scholar]
  2. Raimundo, R. J., & Rosário, A. T. (2022). Cybersecurity in the internet of things in industrial management. Applied Sciences, 12(3), 1598.
    [CrossRef]   [Google Scholar]
  3. Setitra, M. A., & Fan, M. (2024). Detection of DDoS attacks in SDN-based VANET using optimized TabNet. Computer Standards & Interfaces, 90, 103845.
    [CrossRef]   [Google Scholar]
  4. Sun, X., Yu, F. R., & Zhang, P. (2021). A survey on cyber-security of connected and autonomous vehicles (CAVs). IEEE Transactions on Intelligent Transportation Systems, 23(7), 6240-6259.
    [CrossRef]   [Google Scholar]
  5. Bilal, H., Ahmed, F., Aslam, M. S., Li, Q., Hou, J., & Yin, B. (2024). A blockchain-enabled approach for privacy-protected data sharing in internet of robotic things networks. Humcent Comput Inf Sci, 14(1), 71.
    [CrossRef]   [Google Scholar]
  6. Almehdhar, M., Albaseer, A., Khan, M. A., Abdallah, M., Menouar, H., Al-Kuwari, S., & Al-Fuqaha, A. (2024). Deep learning in the fast lane: A survey on advanced intrusion detection systems for intelligent vehicle networks. IEEE Open Journal of Vehicular Technology, 5, 869-906.
    [CrossRef]   [Google Scholar]
  7. Bergies, S., Aljohani, T. M., Su, S. F., & Elsisi, M. (2024). An IoT-based deep-learning architecture to secure automated electric vehicles against cyberattacks and data loss. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 54(9), 5717-5732.
    [CrossRef]   [Google Scholar]
  8. Anand, M., Kumar, S. P., Selvi, M., SVN, S. K., Ram, G. D., & Kannan, A. (2023, March). Deep learning model based IDS for detecting cyber attacks in IoT based smart vehicle network. In 2023 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS) (pp. 281-286). IEEE.
    [CrossRef]   [Google Scholar]
  9. Wazid, M., Singh, J., Pandey, C., Sherratt, R. S., Das, A. K., Giri, D., & Park, Y. (2025). Explainable deep Learning-Enabled malware attack detection for IoT-Enabled intelligent transportation systems. IEEE Transactions on Intelligent Transportation Systems, 26(5), 7231-7244.
    [CrossRef]   [Google Scholar]
  10. Sadaf, M., Iqbal, Z., Javed, A. R., Saba, I., Krichen, M., Majeed, S., & Raza, A. (2023). Connected and automated vehicles: Infrastructure, applications, security, critical challenges, and future aspects. Technologies, 11(5), 117.
    [CrossRef]   [Google Scholar]
  11. Sepehrzad, R., Khodadadi, A., Adinehpour, S., & Karimi, M. (2024). A multi-agent deep reinforcement learning paradigm to improve the robustness and resilience of grid connected electric vehicle charging stations against the destructive effects of cyber-attacks. Energy, 307, 132669.
    [CrossRef]   [Google Scholar]
  12. Anbalagan, S., Raja, G., Gurumoorthy, S., Suresh, R. D., & Dev, K. (2023). IIDS: Intelligent intrusion detection system for sustainable development in autonomous vehicles. IEEE Transactions on Intelligent Transportation Systems, 24(12), 15866-15875.
    [CrossRef]   [Google Scholar]
  13. Giannaros, A., Karras, A., Theodorakopoulos, L., Karras, C., Kranias, P., Schizas, N., ... & Tsolis, D. (2023). Autonomous vehicles: Sophisticated attacks, safety issues, challenges, open topics, blockchain, and future directions. Journal of Cybersecurity and Privacy, 3(3), 493-543.
    [CrossRef]   [Google Scholar]
  14. Moustafa, N., Koroniotis, N., Keshk, M., Zomaya, A. Y., & Tari, Z. (2023). Explainable intrusion detection for cyber defences in the internet of things: Opportunities and solutions. IEEE Communications Surveys & Tutorials, 25(3), 1775-1807.
    [CrossRef]   [Google Scholar]
  15. Haider, Z. A., Khan, F. M., Zafar, A., & Khan, I. U. (2024). Optimizing Machine Learning Classifiers for Credit Card Fraud Detection on Highly Imbalanced Datasets Using PCA and SMOTE Techniques. VAWKUM Transactions on Computer Sciences, 12(2), 28-49.
    [CrossRef]   [Google Scholar]
  16. Al Isawi, O. A., Al Jaafari, K. A., & Al Sumaiti, A. S. (2025). Electric Vehicles CAN Bus Cyber Attacks Detection Using Adaptive Neuro Fuzzy Inference System. IEEE Access, 13, 90862-90874.
    [CrossRef]   [Google Scholar]
  17. Aloraini, F., Javed, A., & Rana, O. (2024). Adversarial attacks on intrusion detection systems in in-vehicle networks of connected and autonomous vehicles. Sensors, 24(12), 3848.
    [CrossRef]   [Google Scholar]
  18. Iqubal, A., & Tiwari, S. K. (2024, November). Internet of Vehicle (IoV) Cyber Attack Detection using Machine Learning Techniques. In 2024 4th International Conference on Advancement in Electronics & Communication Engineering (AECE) (pp. 1053-1057). IEEE.
    [CrossRef]   [Google Scholar]
  19. Campisi, T., Severino, A., Al-Rashid, M. A., & Pau, G. (2021). The development of the smart cities in the connected and autonomous vehicles (CAVs) era: From mobility patterns to scaling in cities. Infrastructures, 6(7), 100.
    [CrossRef]   [Google Scholar]
  20. Arshad, I., Alsamhi, S. H., Qiao, Y., Lee, B., & Ye, Y. (2023). A novel framework for smart cyber defence: a deep-dive into deep learning attacks and defences. IEEE Access, 11, 88527-88548.
    [CrossRef]   [Google Scholar]
  21. Oseni, A., Moustafa, N., Creech, G., Sohrabi, N., Strelzoff, A., Tari, Z., & Linkov, I. (2022). An explainable deep learning framework for resilient intrusion detection in IoT-enabled transportation networks. IEEE Transactions on Intelligent Transportation Systems, 24(1), 1000-1014.
    [CrossRef]   [Google Scholar]
  22. Gupta, S., Maple, C., & Passerone, R. (2023). An investigation of cyber-attacks and security mechanisms for connected and autonomous vehicles. IEEE Access, 11, 90641-90669.
    [CrossRef]   [Google Scholar]
  23. Ramesh, S. N., Al Fardan, B. M. M., Anupama, C. S. S., Kumar, K. V., Cho, S., Acharya, S., & Yoon, C. (2025). Leveraging Cyberattack News Tweets for Advanced Threat Detection and Classification Using Ensemble of Deep Learning Models With Wolverine Optimization Algorithm. IEEE Access, 13, 48343-48358.
    [CrossRef]   [Google Scholar]
  24. Bendiab, G., Hameurlaine, A., Germanos, G., Kolokotronis, N., & Shiaeles, S. (2023). Autonomous vehicles security: Challenges and solutions using blockchain and artificial intelligence. IEEE Transactions on Intelligent Transportation Systems, 24(4), 3614-3637.
    [CrossRef]   [Google Scholar]
  25. Ghrib, T., Benmohammed, M., & Pandey, P. S. (2021). Automated diagnosis of attacks in internet of things using machine learning and frequency distribution techniques. Bulletin of Electrical Engineering and Informatics, 10(2), 950-961.
    [CrossRef]   [Google Scholar]

Cite This Article
APA Style
Khan, F. M., Haider, Z. A., Khan, M. O., Ullah, A., Khan, M. S., Fayaz, M., Ahmad, M., & Nabila (2025). Intelligent Cyber-Attack Detection for Autonomous Vehicles Using Advanced Deep Learning Models. ICCK Transactions on Advanced Computing and Systems, 2(2), 27–39. https://doi.org/10.62762/TACS.2025.952297

Article Metrics
Citations:

Crossref

0

Scopus

0

Web of Science

0
Article Access Statistics:
Views: 68
PDF Downloads: 16

Publisher's Note
ICCK stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and Permissions
CC BY Copyright © 2025 by the Author(s). Published by Institute of Central Computation and Knowledge. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made.
ICCK Transactions on Advanced Computing and Systems

ICCK Transactions on Advanced Computing and Systems

ISSN: 3068-7969 (Online)

Email: [email protected]

Portico

Portico

All published articles are preserved here permanently:
https://www.portico.org/publishers/icck/