{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T13:08:29Z","timestamp":1743858509679,"version":"3.37.3"},"reference-count":27,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T00:00:00Z","timestamp":1675123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001631","name":"University College Dublin","doi-asserted-by":"publisher","award":["13\/RC\/2077"],"id":[{"id":"10.13039\/501100001631","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Algorithms"],"abstract":"The market for Electric Vehicles (EVs) has expanded tremendously as seen in the recent Conference of the Parties 27 (COP27) held at Sharm El Sheikh, Egypt in November 2022. This needs the creation of an ecosystem that is user-friendly and secure. Internet-connected Electric Vehicle Charging Stations (EVCSs) provide a rich user experience and add-on services. Eventually, the EVCSs are connected to a management system, which is the Electric Vehicle Charging Station Management System (EVCSMS). Attacking the EVCS ecosystem remotely via cyberattacks is rising at the same rate as physical attacks and vandalism happening on the physical EVCSs. The cyberattack is more severe than the physical attack as it may affect thousands of EVCSs at the same time. Intrusion Detection is vital in defending against diverse types of attacks and unauthorized activities. Fundamentally, the Intrusion Detection System\u2019s (IDS) problem is a classification problem. The IDS tries to determine if each traffic stream is legitimate or malicious, that is, binary classification. Furthermore, the IDS can identify the type of malicious traffic, which is called multiclass classification. In this paper, we address IoT security issues in EVCS by using different machine learning techniques and using the native IoT dataset to discover fraudulent traffic in EVCSs, which has not been performed in any previous research. We also compare different machine learning classifier algorithms for detecting Distributed Denial of Service (DDoS) attacks in the EVCS network environment. A typical Internet of Things (IoT) dataset obtained from actual IoT traffic is used in the paper. We compare classification algorithms that are placed in line with the traffic and contain DDoS attacks targeting the EVCS network. The results obtained from this research improve the stability of the EVCS system and significantly reduce the number of cyberattacks that could disrupt the daily life activities associated with the EVCS ecosystem.<\/jats:p>","DOI":"10.3390\/a16020075","type":"journal-article","created":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T10:33:53Z","timestamp":1675247633000},"page":"75","source":"Crossref","is-referenced-by-count":25,"title":["Intrusion Detection for Electric Vehicle Charging Systems (EVCS)"],"prefix":"10.3390","volume":"16","author":[{"given":"Mohamed","family":"ElKashlan","sequence":"first","affiliation":[{"name":"School of Information Technology and Computer Science, Nile University, Cairo 12677, Egypt"}]},{"given":"Heba","family":"Aslan","sequence":"additional","affiliation":[{"name":"School of Information Technology and Computer Science, Nile University, Cairo 12677, Egypt"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2416-7481","authenticated-orcid":false,"given":"Mahmoud","family":"Said Elsayed","sequence":"additional","affiliation":[{"name":"School of Computer Science, University College Dublin, Belfield, Dublin 4, Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2705-1823","authenticated-orcid":false,"given":"Anca D.","family":"Jurcut","sequence":"additional","affiliation":[{"name":"School of Computer Science, University College Dublin, Belfield, Dublin 4, Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8068-5120","authenticated-orcid":false,"given":"Marianne A.","family":"Azer","sequence":"additional","affiliation":[{"name":"School of Information Technology and Computer Science, Nile University, Cairo 12677, Egypt"},{"name":"National Telecommunication Institute, Nile University, Cairo 4433260, Egypt"}]}],"member":"1968","published-online":{"date-parts":[[2023,1,31]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"4789","DOI":"10.3233\/JIFS-220310","article-title":"A novel ensembling of deep learning based intrusion detection system and scroll chaotic countermeasures for electric vehicle charging System","volume":"43","author":"Suriya","year":"2022","journal-title":"J. Intell. Fuzzy Syst."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"11139","DOI":"10.1002\/er.7915","article-title":"Charge scheduling framework with multiaggregator collaboration for direct charging and battery swapping station in a coupled distribution-transportation network","volume":"46","author":"Kumar","year":"2022","journal-title":"Int. J. Energy Res."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Yoshioka, K. (2022, January 30). Fighting iot cyberattacks: Device discovery, attack observation and security notification. Proceedings of the 8th ACM on CyberPhysical System Security Workshop, Nagasaki, Japan.","DOI":"10.1145\/3494107.3522781"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1164","DOI":"10.1109\/OJCOMS.2022.3188750","article-title":"\u201cWhy should I trust your ids?\u201d: An explainable deep learning framework for intrusion detection systems in internet of things networks","volume":"3","author":"Brik","year":"2022","journal-title":"IEEE Open J. Commun. Soc."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/s11036-021-01843-0","article-title":"Towards a standard feature set for network intrusion detection system datasets","volume":"27","author":"Sarhan","year":"2022","journal-title":"Mob. Netw. Appl."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"e3803","DOI":"10.1002\/ett.3803","article-title":"Dl-ids: A deep learning\u2013based intrusion detection framework for securing iot","volume":"33","author":"Otoum","year":"2022","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"100568","DOI":"10.1016\/j.accinf.2022.100568","article-title":"Exploring the information content of cyber breach reports and the relationship to internal controls","volume":"46","author":"Blakely","year":"2022","journal-title":"Int. J. Account. Inf. Syst."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"e210","DOI":"10.1002\/spy2.210","article-title":"A survey on security challenges and protocols of electric vehicle dynamic charging system","volume":"5","author":"Babu","year":"2022","journal-title":"Secur. Priv."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"126639","DOI":"10.1016\/j.amc.2021.126639","article-title":"Cyber-attacks against cyberphysical power systems security: State estimation, attacks reconstruction and defense strategy","volume":"413","author":"Su","year":"2022","journal-title":"Appl. Math. Comput."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"102511","DOI":"10.1016\/j.cose.2021.102511","article-title":"Power jacking your station: In-depth security analysis of electric vehicle charging station management systems","volume":"112","author":"Nasr","year":"2022","journal-title":"Comput. Secur."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"7892130","DOI":"10.1155\/2022\/7892130","article-title":"An improved deep belief network ids on iot-based network for traffic systems","volume":"2022","author":"Malik","year":"2022","journal-title":"J. Adv. Transp."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"3211","DOI":"10.1007\/s11831-020-09496-0","article-title":"A review on machine learning and deep learning perspectives of ids for iot: Recent updates, security issues, and challenges","volume":"28","author":"Thakkar","year":"2021","journal-title":"Arch. Comput. Methods Eng."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Basnet, M., and Ali, M.H. (2020, January 15\u201318). Deep learning-based intrusion detection system for electric vehicle charging station. Proceedings of the 2020 2nd International Conference on Smart Power & Internet Energy Systems (SPIES), Bangkok, Thailand.","DOI":"10.1109\/SPIES48661.2020.9243152"},{"key":"ref_14","unstructured":"Stoian, N.-A. (2020). Machine Learning for Anomaly Detection in Iot Networks: Malware Analysis on the Iot-23 Data Set. [Bachelor\u2019s Thesis, University of Twente]."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"95","DOI":"10.47760\/ijcsmc.2020.v09i10.012","article-title":"Attack and anomaly detection in iot networks using machine learning","volume":"9","author":"Thamaraiselvi","year":"2020","journal-title":"Int. J. Comput. Sci. Mob. Comput."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MSP.2018.2825478","article-title":"Iot security techniques based on machine learning: How do iot devices use ai to enhance security?","volume":"35","author":"Xiao","year":"2018","journal-title":"IEEE Signal Process. Mag."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"103244","DOI":"10.1016\/j.jnca.2021.103244","article-title":"Towards development of iot-ml driven healthcare systems: A survey","volume":"196","author":"Sworna","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"22351","DOI":"10.1109\/ACCESS.2021.3056614","article-title":"Benchmarking of machine learning for anomaly based intrusion detection systems in the cicids2017 dataset","volume":"9","author":"Maseer","year":"2021","journal-title":"IEEE Access"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Amanoul, S.V., and Abdulazeez, A.M. (2022, January 12). Intrusion detection system based on machine learning algorithms: A review. Proceedings of the 2022 IEEE 18th International Colloquium on Signal Processing & Applications (CSPA), Selangor, Malaysia.","DOI":"10.1109\/CSPA55076.2022.9782043"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"102588","DOI":"10.1016\/j.cose.2021.102588","article-title":"A comprehensive deep learning benchmark for iot ids","volume":"114","author":"Ahmad","year":"2022","journal-title":"Comput. Secur."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Sangaiah, A.K., Javadpour, A., Ja\u2019fari, F., Zhang, W., and Khaniabadi, S.M. (2022). Hierarchical Clustering Based on Dendrogram in Sustainable Transportation Systems. IEEE Trans. Intell. Transp. Syst.","DOI":"10.1109\/TITS.2022.3222789"},{"key":"ref_22","unstructured":"Balaji, R., Deepajothi, S., Prabaharan, G., Daniya, T., Karthikeyan, P., and Velliangiri, S. (2022, January 7\u20139). Survey on intrusions detection system using deep learning in iot environment. Proceedings of the 2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS), Erode, India."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"e4169","DOI":"10.1002\/dac.4169","article-title":"Securing internet of things (iot) with machine learning","volume":"33","author":"Zeadally","year":"2020","journal-title":"Int. J. Commun. Syst."},{"key":"ref_24","first-page":"022022","article-title":"An overview of overfitting and its solutions","volume":"Volume 1168","author":"Ying","year":"2019","journal-title":"Journal of Physics: Conference Series"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"10549","DOI":"10.1007\/s10586-017-1109-8","article-title":"An enhanced j48 classification algorithm for the anomaly intrusion detection systems","volume":"22","author":"Aljawarneh","year":"2019","journal-title":"Clust. Comput."},{"key":"ref_26","first-page":"3640","article-title":"Classification algorithms with attribute selection: An evaluation study using weka","volume":"9","author":"Gnanambal","year":"2018","journal-title":"Int. J. Adv. Netw. Appl."},{"key":"ref_27","unstructured":"Handa, A., and Semwal, P. (2022). Handbook of Big Data Analytics and Forensics, Springer."}],"container-title":["Algorithms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-4893\/16\/2\/75\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T00:22:14Z","timestamp":1701822134000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-4893\/16\/2\/75"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,31]]},"references-count":27,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2023,2]]}},"alternative-id":["a16020075"],"URL":"https:\/\/doi.org\/10.3390\/a16020075","relation":{},"ISSN":["1999-4893"],"issn-type":[{"type":"electronic","value":"1999-4893"}],"subject":[],"published":{"date-parts":[[2023,1,31]]}}}