A Multiple Renyi Entropy Based Intrusion Detection System for Connected Vehicles

被引:18
作者
Yu, Ki-Soon [1 ]
Kim, Sung-Hyun [2 ]
Lim, Dae-Woon [1 ]
Kim, Young-Sik [3 ]
机构
[1] Dongguk Univ, Informat Commun Engn, Seoul 04620, South Korea
[2] Korea Adv Inst Sci & Technol, Sch Comp, Daejeon 34141, South Korea
[3] Chosun Univ, Dept Informat & Commun Engn, Gwangju 61452, South Korea
关键词
connected vehicles; intrusion detection system (IDS); Renyi entropy; Shannon entropy; vehicular network; NETWORK;
D O I
10.3390/e22020186
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In this paper, we propose an intrusion detection system based on the estimation of the Renyi entropy with multiple orders. The Renyi entropy is a generalized notion of entropy that includes the Shannon entropy and the min-entropy as special cases. In 2018, Kim proposed an efficient estimation method for the Renyi entropy with an arbitrary real order alpha. In this work, we utilize this method to construct a multiple order, Renyi entropy based intrusion detection system (IDS) for vehicular systems with various network connections. The proposed method estimates the Renyi entropies simultaneously with three distinct orders, two, three, and four, based on the controller area network (CAN)-IDs of consecutively generated frames. The collected frames are split into blocks with a fixed number of frames, and the entropies are evaluated based on these blocks. For a more accurate estimation against each type of attack, we also propose a retrospective sliding window method for decision of attacks based on the estimated entropies. For fair comparison, we utilized the CAN-ID attack data set generated by a research team from Korea University. Our results show that the proposed method can show the false negative and positive errors of less than 1% simultaneously.
引用
收藏
页数:16
相关论文
共 50 条
[21]   A thresholding method based on two-dimensional Renyi's entropy [J].
Sahoo, PK ;
Arora, G .
PATTERN RECOGNITION, 2004, 37 (06) :1149-1161
[22]   Deep learning based on connected vehicles for icing pavement detection [J].
Jiajie Hu ;
Ming-Chun Huang ;
Xiong Bill Yu .
AI in Civil Engineering, 2 (1)
[23]   Open World Intrusion Detection: An Open Set Recognition Method for CAN Bus in Intelligent Connected Vehicles [J].
Du, Lei ;
Gu, Zhaoquan ;
Wang, Ye ;
Gao, Cuiyun .
IEEE NETWORK, 2024, 38 (03) :76-82
[24]   Intrusion Detection System Based on Pattern Recognition [J].
Mohamed M. Abdeldayem .
Arabian Journal for Science and Engineering, 2023, 48 :9849-9857
[25]   Intrusion Detection System Based on Pattern Recognition [J].
Abdeldayem, Mohamed M. .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2023, 48 (08) :9849-9857
[26]   Distributed intrusion detection system based on ARTIS [J].
Qiao, PL ;
Su, J ;
Sun, CW .
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, 2005, 5812 :356-363
[27]   Traffic Congestion Detection System through Connected Vehicles and Big Data [J].
Cardenas-Benitez, Nestor ;
Aquino-Santos, Raul ;
Magana-Espinoza, Pedro ;
Aguilar-Velazco, Jose ;
Edwards-Block, Arthur ;
Medina Cass, Aldo .
SENSORS, 2016, 16 (05)
[28]   Lightweight and Adaptive Data-Driven Intrusion Detection System for Autonomous Vehicles [J].
Aljabri, Wael ;
Hamid, Md. Abdul ;
Mosli, Rayan .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2025, 26 (02) :2282-2292
[29]   Car-Following Model for Connected Vehicles Based on Multiple Vehicles with State Change Features [J].
Shi X. ;
Zhu J. ;
Zhao X. ;
Hui F. ;
Ma J. .
Qiche Gongcheng/Automotive Engineering, 2023, 45 (08) :1309-1319
[30]   Target detection of saliency map based on pseudo Wigner-Ville distribution and Renyi entropy [J].
Xu Yuan-Nan ;
Zhao Yuan ;
Liu Li-Ping ;
Zhang Yu ;
Sun Xiu-Dong .
ACTA PHYSICA SINICA, 2010, 59 (02) :980-988