An anomaly detection model for in-vehicle networks based on lightweight convolution with spectral residuals

被引:2
作者
Luo, Feng [1 ]
Wang, Jiajia [1 ]
Li, Zhihao [1 ]
Luo, Cheng [1 ]
机构
[1] Tongji Univ, Shanghai, Peoples R China
关键词
Anomaly detection; Lightweight Convolutional Neural Network; In-vehicle network; Time critical data; INTRUSION DETECTION;
D O I
10.1016/j.cose.2024.104304
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Driven by the demand for ubiquitous connectivity, the increasing interaction between in-vehicle and external devices makes it easier for attack vectors and vulnerabilities to penetrate vehicles. As a typical cyber-physical system, the communications among actuators and sensors are mostly completed through in-vehicle networks, which does not concern cybersecurity threats of its original design. To effectively prevent potential security risks, deploying an intrusion detection system is a feasible and practical solution to detect and identify abnormalities in network traffic. But for development, it must balance embedded device resources with model complexity. This study proposes an anomaly detection method based on spectral residuals and depth-separable convolutional neural networks for in-vehicle networks. Specifically, the spectral residual operation is used to remove redundancies in the signal input to highlight the abnormal points, while the lightweight convolutional block is designed to tackle the challenge of sophisticated decisions. First, we design an image builder to transform signal sequence data into matrix-like structures for easy change of the intrusion detection problem to an image classification problem. Then, we construct the lightweight convolutional network, optimized for vehicular signals, to achieve high detection performance without the unnecessary complexity of the MobileNet model architecture. Experimental results on two public datasets demonstrate that our algorithm successfully detects various attacks, while having no unacceptable resource consumption and compute pipeline congestion. More importantly, compared with other advanced anomaly detection models on an in-vehicle network dataset, the results illustrate its superiority in detecting unknown attacks.
引用
收藏
页数:10
相关论文
共 35 条
[1]   An Intelligent Secured Framework for Cyberattack Detection in Electric Vehicles' CAN Bus Using Machine Learning [J].
Avatefipour, Omid ;
Al-Sumaiti, Ameena Saad ;
El-Sherbeeny, Ahmed M. ;
Awwad, Emad Mahrous ;
Elmeligy, Mohammed A. ;
Mohamed, Mohamed A. ;
Malik, Hafiz .
IEEE ACCESS, 2019, 7 :127580-127592
[2]   Benchmark Analysis of Representative Deep Neural Network Architectures [J].
Bianco, Simone ;
Cadene, Remi ;
Celona, Luigi ;
Napoletano, Paolo .
IEEE ACCESS, 2018, 6 :64270-64277
[3]   VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System [J].
Choi, Wonsuk ;
Joo, Kyungho ;
Jo, Hyo Jin ;
Park, Moon Chan ;
Lee, Dong Hoon .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (08) :2114-2129
[4]  
Falkner S, 2018, PR MACH LEARN RES, V80
[5]  
Farag WA, 2017, INT CONF MODEL SIM
[6]  
Howard AG, 2017, Arxiv, DOI [arXiv:1704.04861, 10.48550/arXiv.1704.04861, DOI 10.48550/ARXIV.1704.04861]
[7]   TOW-IDS: Intrusion Detection System Based on Three Overlapped Wavelets for Automotive Ethernet [J].
Han, Mee Lan ;
Kwak, Byung Il ;
Kim, Huy Kang .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 :411-422
[8]  
Hanselmann M., 2019, SynCAN Dataset
[9]   CANet: An Unsupervised Intrusion Detection System for High Dimensional CAN Bus Data [J].
Hanselmann, Markus ;
Strauss, Thilo ;
Dormann, Katharina ;
Ulmer, Holger .
IEEE ACCESS, 2020, 8 :58194-58205
[10]   Detecting in-vehicle intrusion via semi-supervised learning-based convolutional adversarial autoencoders [J].
Hoang, Thien-Nu ;
Kim, Daehee .
VEHICULAR COMMUNICATIONS, 2022, 38