U-CAN: A Convolutional Neural Network Based Intrusion Detection for Controller Area Networks

被引:4
作者
Desta, Araya Kibrom [1 ]
Ohira, Shuji [1 ]
Arai, Ismail [2 ]
Fujikawa, Kazutoshi [2 ]
机构
[1] Nara Inst Sci & Technol, Grad Sch Sci & Technol, Nara, Japan
[2] Nara Inst Sci & Technol, Informat IniTiat Ctr, Nara, Japan
来源
2022 IEEE 46TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2022) | 2022年
关键词
In-vehicle Network Security; Automotive; Intrusion Detection; CAN bus; Convolutional Neural Networks; DETECTION SYSTEM;
D O I
10.1109/COMPSAC54236.2022.00235
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The Controller area network (CAN) is the most extensively used in-vehicle network. It is set to enable communication between a number of electronic control units (ECU) that are widely found in most modern vehicles. CAN is the de facto in-vehicle network standard due to its error avoidance techniques and similar features, but it is vulnerable to various attacks. In this research, we propose a CAN bus intrusion detection system (IDS) based on convolutional neural networks (CNN). U-CAN is a segmentation model that is trained by monitoring CAN traffic data that are preprocessed using hamming distance and saliency detection algorithm. The model is trained and tested using publicly available datasets of raw and reverse-engineered CAN frames. With an F-1 Score of 0.997, U-CAN can detect DoS, Fuzzy, spoofing gear, and spoofing RPM attacks of the publicly available raw CAN frames. The model trained on reverse-engineered CAN signals that contain plateau attacks also results in a true positive rate and false-positive rate of 0.971 and 0.998, respectively.
引用
收藏
页码:1481 / 1488
页数:8
相关论文
共 24 条
[1]  
Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
[2]   Cyberattacks and Countermeasures for In-Vehicle Networks [J].
Aliwa, Emad ;
Rana, Omer ;
Perera, Charith ;
Burnap, Peter .
ACM COMPUTING SURVEYS, 2021, 54 (01)
[3]  
CAN Specification, 1991, ROBERT BOSCH GMBH PO, V50
[4]  
Charette R.N., 2021, SOFTWARE IS EATING C
[5]   Viden: Attacker Identification on In-Vehicle Networks [J].
Cho, Kyong-Tak ;
Shin, Kang G. .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1109-1123
[6]  
Desta Araya Kibrom, 2022, VEH COMMUN
[7]   << I Know Where You Parked Last Summer >> Automated Reverse Engineering and Privacy Analysis of Modern Cars [J].
Frassinelli, Daniel ;
Park, Sohyeon ;
Nuernberger, Stefan .
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, :1401-1415
[8]   Analyzing the Capabilities of the CAN Attacker [J].
Froeschle, Sibylle ;
Stuehring, Alexander .
COMPUTER SECURITY - ESORICS 2017, PT I, 2018, 10492 :464-482
[9]   A Statistical-Based Anomaly Detection Method for Connected Cars in Internet of Things Environment [J].
Han, Mee Lan ;
Lee, Jin ;
Kang, Ah Reum ;
Kang, Sungwook ;
Park, Jung Kyu ;
Kim, Huy Kang .
INTERNET OF VEHICLES - SAFE AND INTELLIGENT MOBILITY, IOV 2015, 2015, 9502 :89-97
[10]   CANet: An Unsupervised Intrusion Detection System for High Dimensional CAN Bus Data [J].
Hanselmann, Markus ;
Strauss, Thilo ;
Dormann, Katharina ;
Ulmer, Holger .
IEEE ACCESS, 2020, 8 :58194-58205