Explainable Machine Learning for Cyberattack Identification from Traffic Flows

📅 2025-05-02
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Signal control in intelligent transportation systems (ITS) is vulnerable to cyberattacks, yet traffic authorities often lack network-layer access for conventional intrusion detection. Method: This paper proposes an interpretable deep learning–based anomaly detection method relying solely on traffic flow data. We construct a multi-scenario attack dataset via virtualized traffic simulation and perform traffic feature engineering; crucially, we identify “maximum stop duration” and “total congestion distance” as key discriminative indicators of attacks. To address label inconsistency during transitional periods and low-traffic stealthy attacks, we integrate eXplainable AI (XAI) techniques to diagnose model misclassification roots. Contribution/Results: Experiments demonstrate that our approach significantly improves attack detection accuracy and decision interpretability without requiring network logs, enabling transportation agencies to achieve autonomous, transparent, and robust real-time security monitoring.

Technology Category

Application Category

📝 Abstract
The increasing automation of traffic management systems has made them prime targets for cyberattacks, disrupting urban mobility and public safety. Traditional network-layer defenses are often inaccessible to transportation agencies, necessitating a machine learning-based approach that relies solely on traffic flow data. In this study, we simulate cyberattacks in a semi-realistic environment, using a virtualized traffic network to analyze disruption patterns. We develop a deep learning-based anomaly detection system, demonstrating that Longest Stop Duration and Total Jam Distance are key indicators of compromised signals. To enhance interpretability, we apply Explainable AI (XAI) techniques, identifying critical decision factors and diagnosing misclassification errors. Our analysis reveals two primary challenges: transitional data inconsistencies, where mislabeled recovery-phase traffic misleads the model, and model limitations, where stealth attacks in low-traffic conditions evade detection. This work enhances AI-driven traffic security, improving both detection accuracy and trustworthiness in smart transportation systems.
Problem

Research questions and friction points this paper is trying to address.

Identify cyberattacks using traffic flow data
Develop explainable AI for anomaly detection in traffic
Address stealth attacks and data inconsistencies in detection
Innovation

Methods, ideas, or system contributions that make the work stand out.

Deep learning-based anomaly detection from traffic flow
Explainable AI techniques for model interpretability
Virtualized traffic network for cyberattack simulation
🔎 Similar Papers
No similar papers found.
Y
Yujing Zhou
Embry-Riddle Aeronautical University, FL 32114 USA
M
Marc L. Jacquet
Embry-Riddle Aeronautical University, FL 32114 USA
R
Robel Dawit
Embry-Riddle Aeronautical University, FL 32114 USA
S
Skyler Fabre
Embry-Riddle Aeronautical University, FL 32114 USA
D
Dev Sarawat
Embry-Riddle Aeronautical University, FL 32114 USA
F
Faheem Khan
Embry-Riddle Aeronautical University, FL 32114 USA
M
Madison Newell
Embry-Riddle Aeronautical University, FL 32114 USA
Yongxin Liu
Yongxin Liu
Assistant Professor of Data Science, Embry-Riddle Aeronautical University
Artificial IntelligenceCyber Physical SystemCybersecurityIntelligent Transportation SystemsData Mining
Dahai Liu
Dahai Liu
Embry-Riddle Aeronautical University, FL 32114 USA
H
Hongyun Chen
Embry-Riddle Aeronautical University, FL 32114 USA
J
Jian Wang
University of Tennessee at Martin, TN 38238 USA
Huihui Wang
Huihui Wang
Northeastern University, Arlington, VA 22209