Attention-CNN-LSTM based intrusion detection system (ACL-IDS) for in-vehicle networks

被引:3
作者
Taneja, Amit [1 ]
Kumar, Gulshan [2 ]
机构
[1] Department of Computer Science, Vellore Institute of Technology, Tamil Nadu, Vellore
[2] Department of Computer Applications, Shaheed Bhagat Singh State University, NH-05, Punjab, Ferozepur
关键词
Controller area network; Convolutional neural network; In-vehicle network; Intrusion detection; Long short term memory network;
D O I
10.1007/s00500-024-10313-0
中图分类号
学科分类号
摘要
Modern vehicles rely on electronic control units (ECUs) communicating through the controller area network (CAN) bus protocol. However, increased connectivity through Wi-Fi, Bluetooth, and onboard diagnostics (OBD) ports has heightened cybersecurity risks due to the CAN bus protocol’s inherent security vulnerabilities. Addressing this challenge requires an in-vehicle intrusion detection system (IDS) with high accuracy and minimal false alarms. Existing IDSs for in-vehicle networks often fall short due to inadequate extraction of network traffic features’ dependencies in a time-series context.To overcome this limitation, this study presents ACL-IDS, a hybrid intrusion detection system for in-vehicle network traffic. Leveraging deep learning techniques like CNN, LSTM, and attention mechanisms, ACL-IDS effectively captures short-term and long-term dependencies within network traffic, enhancing intrusion detection accuracy. Extensive experiments on a real benchmark dataset demonstrate ACL-IDS’s superior performance compared to individual, ensemble, and state-of-the-art methods. With detection accuracy reaching up to 99%, ACL-IDS emerges as a robust solution for analyzing and detecting intrusions in in-vehicle network traffic. © The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2024.
引用
收藏
页码:13429 / 13441
页数:12
相关论文
共 36 条
[1]  
Allen M.J., Grieve S.W., Owen H.J., Et al., Tree species classification from complex laser scanning data in Mediterranean forests using deep learning, Methods Ecol Evol, 14, 7, pp. 1657-1667, (2023)
[2]  
Alqahtani H., Kumar G., A deep learning-based intrusion detection system for in-vehicle networks, Comput Electr Eng, 104, (2022)
[3]  
Barletta V.S., Caivano D., Nannavecchia A., Et al., Intrusion detection for in-vehicle communication networks: an unsupervised Kohonen Som approach, Future Internet, 12, 7, (2020)
[4]  
Basavaraj D., Tayeb S., Towards a lightweight intrusion detection framework for in-vehicle networks, J Sensor Actuator Netw, 11, 1, (2022)
[5]  
Checkoway S., McCoy D., Kantor B., Et al., Comprehensive experimental analyses of automotive attack surfaces, In: 20Th USENIX Security Symposium (USENIX Security 11), (2011)
[6]  
Cho K.T., Shin K.G., Fingerprinting electronic control units for vehicle intrusion detection, In: 25Th USENIX Security Symposium (USENIX Security 16), pp. 911-927, (2016)
[7]  
Choi W., Joo K., Jo H.J., Et al., Voltageids: Low-level communication characteristics for automotive intrusion detection system, IEEE Trans Inf Forensics Secur, 13, 8, pp. 2114-2129, (2018)
[8]  
Dagan T., Wool A., Parrot, a software-only anti-spoofing defense system for the can bus, ESCAR EUROPE, 34, (2016)
[9]  
Dupont G., Lekidis A., Den Hartog J., Et al., Automotive Controller Area Network (Can) Bus Intrusion Dataset V2, (2019)
[10]  
El-Rewini Z., Sadatsharan K., Selvaraj D.F., Et al., Cybersecurity challenges in vehicular communications, Veh. Commun, 23, (2020)