Machine Learning-Based Intrusion Detection for Securing In-Vehicle CAN Bus Communication

被引:0
作者
Said Ben Hassane Samir [1 ]
Martin Raissa [1 ]
Haifa Touati [2 ]
Mohamed Hadded [3 ]
Hakim Ghazzai [4 ]
机构
[1] Faculty of Sciences of Gabes, University of Gabes, Gabès
[2] Hatem Bettahar IRESCOMATH Research Lab, University of Gabes, Gabès
[3] Abu Dhabi University, Abu Dhabi
[4] CEMSE Division, KAUST, Thuwal
关键词
CAN bus; Deep learning; ICSim; In-vehicle communication; Intrusion detection system;
D O I
10.1007/s42979-024-03465-1
中图分类号
学科分类号
摘要
Modern cars are now much more connected than they were a few years ago, thanks to the rapid development of embedded technology. This had made them more vulnerable to attacks. The controller area network (CAN) bus, a widely used communication standard in automotive systems, plays a crucial role in the interconnection of onboard electronic components. However, the lack of inherent security mechanisms in the CAN bus makes it a prime target for malicious attacks, compromising the system such as the denial of service (DoS), fuzzy, spoofing, and replay attacks. In this paper, we propose a machine learning-based intrusion detection system for identifying attacks on in-vehicle CAN bus communication. We train and test long short-term memory (LSTM) and convolutional neural network (CNN) models on two public datasets (Car-Hacking and CAN-Intrusion) and our self-created dataset, named Bus-CAN-Attack, which was generated using the ICSim simulation tool. Using the selected hyper parameters, we achieve impressive detection accuracy with the fine-tuned models varying from 89% to 99% for the different datasets. © The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd. 2024.
引用
收藏
相关论文
共 32 条
[1]  
Doctoral dissertation, Haute ècole de gestion de Genéve, Benkhelifa A. Les systémes embarquès Dans l’automobile, (2018)
[2]  
(2024)
[3]  
Benz K., The birth of the Motorwagen, Hist Autom Technol, 1, pp. 23-30, (1886)
[4]  
Johnson M., Lee L., Advancements in vehicle communication systems, IEEE Trans Veh Technol, 68, 5, pp. 1024-1035, (2019)
[5]  
Bosch G.R., Controller Area Network (CAN) Specification, Bosch Documentation, (1980)
[6]  
Road Vehicles—Controller Area Network (CAN), International Organization for Standardization, (2020)
[7]  
Avatefipour O., Malik H., State-Of-The-Art Survey on In-Vehicle Network Communication (Can-Bus) Security and Vulnerabilities, (2018)
[8]  
Ismail T., Touati H., Hajlaoui N., Hadded M., Muhlethaler P., Bouzefrane S., Saidane L.A., A comprehensive survey on vehicular communication security, J Cyber Secur Mobil, 13, 5, pp. 1007-1038, (2024)
[9]  
Ismail T., Et al., Impact analysis of greedy behavior attacks in vehicular ad hoc networks, In: 2021 10Th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks (PEMWN), Ottawa, pp. 1-6, (2021)
[10]  
Hassine Y., Touati H., Vehicular platoons security: A review with an emphasis on Sybil attacks, In: 2023 12Th IFIP/IEEE International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN), Berlin, pp. 1-6, (2023)