Intrusion Detection For Controller Area Network Using Support Vector Machines

被引:11
|
作者
Tanksale, Vinayak [1 ]
机构
[1] Purdue Univ, Elect & Comp Engn, W Lafayette, IN 47907 USA
来源
2019 IEEE 16TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS WORKSHOPS (MASSW 2019) | 2019年
关键词
Controller Area Network; ECU; machine learning; support vector machine;
D O I
10.1109/MASSW.2019.00032
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Controller Area Network is the most widely adopted communication standard in automobiles. The CAN protocol is robust and is designed to minimize overhead. The lightweight nature of this protocol implies that it can't efficiently process secure communication. With the exponential increase in automobile communications, there is an urgent need for efficient and effective security countermeasures. We propose a support vector machine based intrusion detection system that is able to detect anomalous behavior with high accuracy. We outline a process for parameter selection and feature vector selection. We identify strengths and weaknesses of our system and propose to extend our work for time-series based data.
引用
收藏
页码:121 / 126
页数:6
相关论文
共 50 条
  • [21] Survey of Automotive Controller Area Network Intrusion Detection Systems
    Young, Clinton
    Zambreno, Joseph
    Olufowobi, Habeeb
    Bloom, Gedare
    IEEE DESIGN & TEST, 2019, 36 (06) : 48 - 55
  • [22] A Convolutional Encoder Network for Intrusion Detection in Controller Area Networks
    Zhang, Xing
    Cui, Xiaotong
    Cheng, Kefei
    Zhang, Liang
    2020 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2020), 2020, : 366 - 369
  • [23] CANTransfer - Transfer Learning based Intrusion Detection on a Controller Area Network using Convolutional LSTM Network
    Tariq, Shahroz
    Lee, Sangyup
    Woo, Simon S.
    PROCEEDINGS OF THE 35TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (SAC'20), 2020, : 1048 - 1055
  • [24] ON THE SIMPLIFICATION OF AN EXAMPLES-BASED CONTROLLER WITH SUPPORT VECTOR MACHINES
    Shmilovici, A.
    Bakir, G. H.
    Figueras, A.
    de la Rosa, J. Llu's
    CONTROL AND INTELLIGENT SYSTEMS, 2007, 35 (01)
  • [25] Application of Support Vector Machine and Genetic Algorithm to Network Intrusion Detection
    Zhou, Hua
    Meng, Xiangru
    Zhang, Li
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2267 - 2269
  • [26] Network Intrusion Detection Algorithm based on Improved Support Vector Machine
    Hu Jianhong
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION, BIG DATA AND SMART CITY (ICITBS), 2016, : 523 - 526
  • [27] Network intrusion detection based on random forest and support vector machine
    Chang, Yaping
    Li, Wei
    Yang, Zhongming
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 635 - 638
  • [28] Support Vector Machine for Network Intrusion and Cyber-Attack Detection
    Ghanem, Kinan
    Aparicio-Navarro, Francisco J.
    Kyriakopoulos, Konstantinos G.
    Lambotharan, Sangarapillai
    Chambers, Jonathon A.
    2017 SENSOR SIGNAL PROCESSING FOR DEFENCE CONFERENCE (SSPD), 2017, : 79 - 83
  • [29] VALID: Voltage-Based Lightweight Intrusion Detection for the Controller Area Network
    Schell, Oleg
    Kneib, Marcel
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 225 - 232
  • [30] Support Vector Machines with Neural Network
    Yanagimoto, Hidekazu
    NEW TRENDS IN INTELLIGENT SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2017, 297 : 124 - 138