CAVIDS: Real time intrusion detection system for connected autonomous vehicles using logical analysis of data 

被引:7
作者
Kumar, Anjanee [1 ]
Das, Tanmoy Kanti [1 ]
机构
[1] Natl Inst Technol Raipur, Dept Comp Applicat, GE Rd, Raipur 492010, Chhattisgarh, India
关键词
Autonomous vehicle; In-Vehicle Network; Logical Analysis of Data (LAD); Security; Real time intrusion detection; Controller Area Network (CAN);
D O I
10.1016/j.vehcom.2023.100652
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In recent times, Connected Autonomous Vehicles (CAVs) have been gaining popularity and have already begun to revolutionize the transport industry, mainly using real-time monitoring, analysis and exchange of data through In-Vehicle Networks (IVN). IVN can also interact with the outside world and roadside infrastructures. With all these advantages, certain weaknesses also creep in as the communication in IVN lacks proper security measures like encryption and authentication. These lack of security measures in IVN makes CAVs vulnerable to cyber-attacks which may have fatal consequences. The de facto standard for communication in IVN is known as Controller Area Network or CAN, and it also lacks said security features to protect CAN from outside threats like cyber attacks, sensor tempering etc. Realtime intrusion detection with minimal computational resources is the need of the hour to prevent disruptive consequences and fatal crashes. In this paper, we propose an intrusion detection method based on Logical Analysis of Data (LAD) which facilitates real-time intrusion detection in CAVs using minimal computational resources. LAD is a two-class classification technique which uses the concept of a partially defined Boolean function (pdBf) to extract different rules for classification from a historical dataset consisting of CAN messages only. Usually, the normal behaviour of any CAV is specified using the extracted rules, and any unusual behaviour that does not conform with the extracted rules is treated as an anomaly. In this paper, we have extracted rules for anomaly and treated all behaviours that do not conform with these extracted rules as normal. The proposed method outperforms many state-of-the-art approaches, which include other rule-based methods, machine learning and deep learning methods both in terms of F 1 score and detection time. For CarChallenge 2020 dataset, the proposed method requires lesser than 47.5 & mu;s for detection using a Raspberry Pi device, which is far less than the average time difference between two consecutive CAN messages and thus can be considered as real-time intrusion detection. Real-time intrusion detection is important in preventing any untoward incidents in CAVs.& COPY; 2023 Elsevier Inc. All rights reserved.
引用
收藏
页数:14
相关论文
共 50 条
[1]   Attacks to Automatous Vehicles: A Deep Learning Algorithm for Cybersecurity [J].
Aldhyani, Theyazn H. H. ;
Alkahtani, Hasan .
SENSORS, 2022, 22 (01)
[2]   LEARNING BOOLEAN CONCEPTS IN THE PRESENCE OF MANY IRRELEVANT FEATURES [J].
ALMUALLIM, H ;
DIETTERICH, TG .
ARTIFICIAL INTELLIGENCE, 1994, 69 (1-2) :279-305
[3]  
[Anonymous], 2015, Wired
[4]  
Bai F, 2010, MOBICOM 10 & MOBIHOC 10: PROCEEDINGS OF THE 16TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING AND THE 11TH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, P329
[5]  
Baldini G., 2022, COMPUT COMMUN
[6]  
Berger Ivo, 2019, Computer Security. ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018. Revised Selected Papers: Lecture Notes in Computer Science (LNCS 11387), P85, DOI 10.1007/978-3-030-12786-2_6
[7]   Evading Voltage-Based Intrusion Detection on Automotive CAN [J].
Bhatia, Rohit ;
Kumar, Vireshwar ;
Serag, Khaled ;
Celik, Z. Berkay ;
Payer, Mathias ;
Xu, Dongyan .
28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021), 2021,
[8]   Logical analysis of numerical data [J].
Boros, E ;
Hammer, PL ;
Ibaraki, T ;
Kogan, A .
MATHEMATICAL PROGRAMMING, 1997, 79 (1-3) :163-190
[9]   An implementation of logical analysis of data [J].
Boros, E ;
Hammer, PL ;
Ibaraki, T ;
Kogan, A ;
Mayoraz, E ;
Muchnik, I .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2000, 12 (02) :292-306
[10]   WINDS: A Wavelet-Based Intrusion Detection System for Controller Area Network (CAN) [J].
Bozdal, Mehmet ;
Samie, Mohammad ;
Jennions, Ian K. .
IEEE ACCESS, 2021, 9 :58621-58633