CAN Intrusion Detection System Based on Data Augmentation and Improved Bi-LSTM

被引:0
作者
Zhao, Haihang [1 ]
Cheng, Anyu [2 ]
Wang, Yi [3 ]
Wang, Shanshan [1 ]
Wang, Hongrong [4 ]
机构
[1] CQUPT, Sch Commun & Informat Engn, Chongqing, Peoples R China
[2] CQUPT, Coll Automat, Chongqing, Peoples R China
[3] Product Cybersecur Privacy Off, Continental Automot Singapore, Singapore, Singapore
[4] China Automot Engn Res Inst Co Ltd, Chongqing, Peoples R China
来源
2024 IEEE THE 20TH ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS, APCCAS 2024 | 2024年
关键词
IDS; CAN; ADASYN; Bi-LSTM; Attention Mechanism;
D O I
10.1109/APCCAS62602.2024.10808253
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Controller Area Network (CAN) protocol, as the core communication protocol for vehicular networks, is susceptible to various cyber attacks due to its openness and lack of security measures. Moreover, the severe imbalance between normal and abnormal (attack) data in vehicular communication, with a ratio of 13:1, makes detecting attack behaviors extremely challenging. First, to address the data imbalance issue, this paper proposes a data augmentation method using the Adaptive Synthetic Sampling (ADASYN) technique to enhance and balance the dataset. Then, to detect CAN bus intrusions, an improved Bi-LSTM model is proposed, which introduces a self-attention mechanism to capture critical information from CAN messages, enhancing the model's ability to detect intrusions in CAN messages. Finally, experimental results show that, compared to Recurrent Neural Network (RNN), Long Short-Term Memory (LSTM), ResNet, and EfficientNet, our method achieves an accuracy, precision, and F1 score of 0.9970, 0.9880, and 0.9888, respectively, with a model size of 2.6MB.
引用
收藏
页码:198 / 202
页数:5
相关论文
共 12 条
[1]   TOW-IDS: Intrusion Detection System Based on Three Overlapped Wavelets for Automotive Ethernet [J].
Han, Mee Lan ;
Kwak, Byung Il ;
Kim, Huy Kang .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 :411-422
[2]   In-Vehicle Networking: Protocols, Challenges, and Solutions [J].
Huang, Jun ;
Zhao, Mingli ;
Zhou, Yide ;
Xing, Cong-Cong .
IEEE NETWORK, 2019, 33 (01) :92-98
[3]   Experimental Security Analysis of a Modern Automobile [J].
Koscher, Karl ;
Czeskis, Alexei ;
Roesner, Franziska ;
Patel, Shwetak ;
Kohno, Tadayoshi ;
Checkoway, Stephen ;
Mccoy, Damon ;
Kantor, Brian ;
Anderson, Danny ;
Shacham, Hovav ;
Savage, Stefan .
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, :447-462
[4]   OTIDS: A Novel Intrusion Detection System for In-vehicle Network by using Remote Frame [J].
Lee, Hyunsung ;
Jeong, Seong Hoon ;
Kim, Huy Kang .
2017 15TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2017, :57-66
[5]  
Nie S., 2017, Technical Report, V25, P1
[6]   CANBERT: A Language-based Intrusion Detection Model for In-vehicle Networks [J].
Nwafor, Ebelechukwu ;
Olufowobi, Habeeb .
2022 21ST IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS, ICMLA, 2022, :294-299
[7]   Intrusion Detection For Controller Area Network Using Support Vector Machines [J].
Tanksale, Vinayak .
2019 IEEE 16TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS WORKSHOPS (MASSW 2019), 2019, :121-126
[8]   A Zero False Positive Rate of IDS Based on Swin Transformer for Hybrid Automotive In-Vehicle Networks [J].
Wang, Shanshan ;
Zhou, Hainan ;
Zhao, Haihang ;
Wang, Yi ;
Cheng, Anyu ;
Wu, Jin .
ELECTRONICS, 2024, 13 (07)
[9]   Security and Functional Safety for AI in Embedded Automotive System-A Tutorial [J].
Wang, Yi ;
Xiao, Jing ;
Wei, Zhengzhe ;
Zheng, Yuanjin ;
Tang, Kea-Tiong ;
Chang, Chip Hong .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2024, 71 (03) :1701-1707
[10]  
Wang Y, 2020, MIDWEST SYMP CIRCUIT, P293, DOI [10.1109/mwscas48704.2020.9184472, 10.1109/MWSCAS48704.2020.9184472]