Intrusion detection system for controller area network

被引:11
作者
Tanksale, Vinayak [1 ]
机构
[1] Ball State Univ, Dept Comp Sci, Muncie, IN 47306 USA
关键词
Controller area network; Deep learning; Intrusion detection system; Long short-term memory; Machine learning; Recurrent neural networks; ANOMALY DETECTION; INTERNET; ATTACKS;
D O I
10.1186/s42400-023-00195-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid expansion of intra-vehicle networks has increased the number of threats to such networks. Most modern vehicles implement various physical and data-link layer technologies. Vehicles are becoming increasingly autonomous and connected. Controller area network (CAN) is a serial bus system that is used to connect sensors and controllers (electronic control units-ECUs) within a vehicle. ECUs vary widely in processing power, storage, memory, and connectivity. The goal of this research is to design, implement, and test an efficient and effective intrusion detection system for intra-vehicle CANs. Classic cryptographic approaches are resource-intensive and increase processing delay, thereby not meeting CAN latency requirements. There is a need for a system that is capable of detecting intrusions in almost real-time with minimal resources. Our research proposes a long short-term memory (LSTM) network to detect anomalies and a decision engine to detect intrusions by using multiple contextual parameters. We have tested our anomaly detection algorithm and our decision engine using data from real automobiles. We present the results of our experiments and analyze our findings. After detailed evaluation of our system, we believe that we have designed a vehicle security solution that meets all the outlined requirements and goals.
引用
收藏
页数:21
相关论文
共 57 条
[1]   WINDS: A Wavelet-Based Intrusion Detection System for Controller Area Network (CAN) [J].
Bozdal, Mehmet ;
Samie, Mohammad ;
Jennions, Ian K. .
IEEE ACCESS, 2021, 9 :58621-58633
[2]  
CORTES C, 1995, MACH LEARN, V20, P273, DOI 10.1023/A:1022627411411
[3]   A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguous and Discontiguous System Call Patterns [J].
Creech, Gideon ;
Hu, Jiankun .
IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (04) :807-819
[4]  
Cristianini N., 2000, An Introduction to Support Vector Machines and Other Kernel-Based Learning Methods
[5]   ID Sequence Analysis for Intrusion Detection in the CAN bus using Long Short Term Memory Networks [J].
Desta, Araya Kibrom ;
Ohira, Shuji ;
Arai, Ismail ;
Fujikawa, Kazutoshi .
2020 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2020,
[6]  
Dibaei M, 2019, Arxiv, DOI arXiv:1907.07455
[7]   Attacks and defences on intelligent connected vehicles: a survey [J].
Dibaei, Mahdi ;
Zheng, Xi ;
Jiang, Kun ;
Abbas, Robert ;
Liu, Shigang ;
Zhang, Yuexin ;
Xiang, Yang ;
Yu, Shui .
DIGITAL COMMUNICATIONS AND NETWORKS, 2020, 6 (04) :399-421
[8]  
Dupont Guillaume, 2019, 4TU.ResearchData, V2
[9]   Analyzing the Capabilities of the CAN Attacker [J].
Froeschle, Sibylle ;
Stuehring, Alexander .
COMPUTER SECURITY - ESORICS 2017, PT I, 2018, 10492 :464-482
[10]   A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference [J].
Hoang, Xuan Dau ;
Hu, Jiankun ;
Bertok, Peter .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2009, 32 (06) :1219-1228