CANSat-IDS: An adaptive distributed Intrusion Detection System for satellites, based on combined classification of CAN traffic

被引:0
作者
Driouch, Otman [1 ,2 ]
Bah, Slimane [1 ]
Guennoun, Zouhair [1 ]
机构
[1] Mohammed 5 Univ Rabat, Univ Ctr Res Space Technol, Mohammadia Sch Engineers, Smart Commun Res Team, Ave Ibn Sina BP 765, Rabat 10090, Rabat, Morocco
[2] Royal Ctr Space Res & Studies, Ave Allal El Fassi Hay Riad, Rabat 10100, Morocco
关键词
Intrusion detection; Satellite; Space technology; Cybersecurity; Machine learning; Deep learning; Controller area network; LEARNING ALGORITHMS; ATTACKS;
D O I
10.1016/j.cose.2024.104033
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing dependence on satellite technology for critical applications, such as telecommunications, Earth observation, and navigation, underscores the need for robust security measures to safeguard these assets from potential cyber threats. Moreover, as many satellite systems rely on the Controller Area Network (CAN) protocol for efficient data exchange among onboard subsystems, they become prime targets for cyberattacks. While contributions present various options for detecting attacks in the CAN bus, no one proposes an architecture suitable for satellite systems. To address this concern, this paper presents a novel approach to develop an adaptive distributed Intrusion Detection System (IDS) for satellites, which integrates machine and deep learning techniques for the classification of CAN frames. This system is specifically designed to overcome the inherent power and computational challenges of satellite operations by executing time-based anomaly detection on board, and content-based detection at the ground segment. To evaluate the effectiveness of the proposed solution, experiments are conducted using representative Datasets. The obtained results demonstrate that the distributed IDS presented in this research offers a promising solution to improve the security of satellite systems by achieving high detection rates ranging from 91.12% to 99.86% (F1-score).
引用
收藏
页数:18
相关论文
共 56 条
[1]   Intrusion Detection Systems for Intra-Vehicle Networks: A Review [J].
Al-Jarrah, Omar Y. ;
Maple, Carsten ;
Dianati, Mehrdad ;
Oxtoby, David ;
Mouzakitis, Alex .
IEEE ACCESS, 2019, 7 :21266-21289
[2]   Investigating the Effect of Traffic Sampling on Machine Learning-Based Network Intrusion Detection Approaches [J].
Alikhanov, Jumabek ;
Jang, Rhongho ;
Abuhamad, Mohammed ;
Mohaisen, David ;
Nyang, Daehun ;
Noh, Youngtae .
IEEE ACCESS, 2022, 10 :5801-5823
[3]   CAN-BERT do it? Controller Area Network Intrusion Detection System based on BERT Language Model [J].
Alkhatib, Natasha ;
Mushtaq, Maria ;
Ghauch, Hadi ;
Danger, Jean-Luc .
2022 IEEE/ACS 19TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2022,
[4]   Machine learning algorithms for FPGA Implementation in biomedical engineering applications: A review [J].
Altman, Morteza Babaee ;
Wan, Wenbin ;
Hosseini, Amineh Sadat ;
Nowdeh, Saber Arabi ;
Alizadeh, Masoumeh .
HELIYON, 2024, 10 (04)
[5]   Deep Learning Based Hybrid Intrusion Detection Systems to Protect Satellite Networks [J].
Azar, Ahmad Taher ;
Shehab, Esraa ;
Mattar, Ahmed M. ;
Hameed, Ibrahim A. ;
Elsaid, Shaimaa Ahmed .
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2023, 31 (04)
[6]   Estimating Overhead Performance of Supervised Machine Learning Algorithms for Intrusion Detection [J].
Baidoo, Charity Yaa Mansa ;
Yaokumah, Winfred ;
Owusu, Ebenezer .
INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGIES AND SYSTEMS APPROACH, 2023, 16 (01) :1-19
[7]   Intrusion Detection Method for In-Vehicle CAN Bus Based on Message and Time Transfer Matrix [J].
Bi, Zixiang ;
Xu, Guoai ;
Xu, Guosheng ;
Tian, Miaoqing ;
Jiang, Ruobing ;
Zhang, Sutao .
SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
[8]   Identifying and Benchmarking Key Features for Cyber Intrusion Detection: An Ensemble Approach [J].
Binbusayyis, Adel ;
Vaiyapuri, Thavavel .
IEEE ACCESS, 2019, 7 :106495-106513
[9]  
Brown T. C., 1990, Research Paper - Rocky Mountain Forest and Range Experiment Station, USDA Forest Service
[10]  
Cho KT, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P911