A Multiple Renyi Entropy Based Intrusion Detection System for Connected Vehicles

被引:18
|
作者
Yu, Ki-Soon [1 ]
Kim, Sung-Hyun [2 ]
Lim, Dae-Woon [1 ]
Kim, Young-Sik [3 ]
机构
[1] Dongguk Univ, Informat Commun Engn, Seoul 04620, South Korea
[2] Korea Adv Inst Sci & Technol, Sch Comp, Daejeon 34141, South Korea
[3] Chosun Univ, Dept Informat & Commun Engn, Gwangju 61452, South Korea
关键词
connected vehicles; intrusion detection system (IDS); Renyi entropy; Shannon entropy; vehicular network; NETWORK;
D O I
10.3390/e22020186
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In this paper, we propose an intrusion detection system based on the estimation of the Renyi entropy with multiple orders. The Renyi entropy is a generalized notion of entropy that includes the Shannon entropy and the min-entropy as special cases. In 2018, Kim proposed an efficient estimation method for the Renyi entropy with an arbitrary real order alpha. In this work, we utilize this method to construct a multiple order, Renyi entropy based intrusion detection system (IDS) for vehicular systems with various network connections. The proposed method estimates the Renyi entropies simultaneously with three distinct orders, two, three, and four, based on the controller area network (CAN)-IDs of consecutively generated frames. The collected frames are split into blocks with a fixed number of frames, and the entropies are evaluated based on these blocks. For a more accurate estimation against each type of attack, we also propose a retrospective sliding window method for decision of attacks based on the estimated entropies. For fair comparison, we utilized the CAN-ID attack data set generated by a research team from Korea University. Our results show that the proposed method can show the false negative and positive errors of less than 1% simultaneously.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Cybersecurity in Automotive: An Intrusion Detection System in Connected Vehicles
    Pascale, Francesco
    Adinolfi, Ennio Andrea
    Coppola, Simone
    Santonicola, Emanuele
    ELECTRONICS, 2021, 10 (15)
  • [2] An intrusion detection system for connected vehicles in smart cities
    Aloqaily, Moayad
    Otoum, Safa
    Al Ridhawi, Ismaeel
    Jararweh, Yaser
    AD HOC NETWORKS, 2019, 90
  • [3] An Entropy Analysis based Intrusion Detection System for Controller Area Network in Vehicles
    Wang, Qian
    Lu, Zhaojun
    Qu, Gang
    2018 31ST IEEE INTERNATIONAL SYSTEM-ON-CHIP CONFERENCE (SOCC), 2018, : 90 - 95
  • [4] A novel Intrusion Detection System against spoofing attacks in connected Electric Vehicles
    Kosmanos, Dimitrios
    Pappas, Apostolos
    Maglaras, Leandros
    Moschoyiannis, Sotiris
    Aparicio-Navarro, Francisco J.
    Argyriou, Antonios
    Janicke, Helge
    ARRAY, 2020, 5
  • [5] Machine Learning based intrusion detection systems for connected autonomous vehicles: A survey
    Jay Nagarajan
    Pegah Mansourian
    Muhammad Anwar Shahid
    Arunita Jaekel
    Ikjot Saini
    Ning Zhang
    Marc Kneppers
    Peer-to-Peer Networking and Applications, 2023, 16 : 2153 - 2185
  • [6] Intrusion Detection for Intelligent Connected Vehicles Based on Bidirectional Temporal Convolutional Network
    Mei, Yangyang
    Han, Weihong
    Lin, Kaihan
    IEEE NETWORK, 2024, 38 (06): : 113 - 119
  • [7] Intrusion Detection in Intelligent Connected Vehicles Based on Weighted Self-Information
    Yu, Tianqi
    Hu, Jianling
    Yang, Jianfeng
    ELECTRONICS, 2023, 12 (11)
  • [8] Machine Learning based intrusion detection systems for connected autonomous vehicles: A survey
    Nagarajan, Jay
    Mansourian, Pegah
    Shahid, Muhammad Anwar
    Jaekel, Arunita
    Saini, Ikjot
    Zhang, Ning
    Kneppers, Marc
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (05) : 2153 - 2185
  • [9] Entropy based intrusion detection
    Yoshida, K
    2003 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS, AND SIGNAL PROCESSING, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2003, : 840 - 843
  • [10] A multiple agents based intrusion detection system
    Ma, WL
    Sharma, D
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 1, PROCEEDINGS, 2005, 3681 : 205 - 211