CAN Bus Intrusion Detection Based on Auxiliary Classifier GAN and Out-of-distribution Detection

被引:25
作者
Zhao, Qingling [1 ,2 ]
Chen, Mingqiang [1 ,2 ]
Gu, Zonghua [3 ]
Luan, Siyu [3 ]
Zeng, Haibo [4 ]
Chakrabory, Samarjit [5 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Key Lab Intelligent Percept & Syst High Dimens In, Minist Educ,PCA Lab, Nanjing 210094, Jiangsu, Peoples R China
[2] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Jiangsu Key Lab Image & Video Understanding Socia, Nanjing 210094, Jiangsu, Peoples R China
[3] Umea Univ, Dept Appl Phys & Elect, S-90187 Umea, Sweden
[4] Virginia Tech, Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
[5] Univ N Carolina, Dept Comp Sci, Chapel Hill, NC 27599 USA
基金
美国国家科学基金会;
关键词
Automotive security; controller area network; intrusion detection; deep learning; GAN; DETECTION SYSTEM; ANOMALY DETECTION; FD MESSAGES; NETWORKS;
D O I
10.1145/3540198
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Controller Area Network (CAN) is a ubiquitous bus protocol present in the Electrical/Electronic (E/E) systems of almost all vehicles. It is vulnerable to a range of attacks once the attacker gains access to the bus through the vehicle's attack surface. We address the problem of Intrusion Detection on the CAN bus and present a series of methods based on two classifiers trained with Auxiliary Classifier Generative Adversarial Network (ACGAN) to detect and assign fine-grained labels to Known Attacks and also detect the Unknown Attack class in a dataset containing a mixture of (Normal + Known Attacks + Unknown Attack) messages. The most effective method is a cascaded two-stage classification architecture, with the multi-class Auxiliary Classifier in the first stage for classification of Normal and Known Attacks, passing Out-of-Distribution (OOD) samples to the binary Real-Fake Classifier in the second stage for detection of the Unknown Attack class. Performance evaluation demonstrates that our method achieves both high classification accuracy and low runtime overhead, making it suitable for deployment in the resource-constrained in-vehicle environment.
引用
收藏
页数:30
相关论文
共 59 条
  • [1] Abualhoul MY, 2016, IEEE INT VEH SYM, P508, DOI 10.1109/IVS.2016.7535434
  • [2] Skip-GANomaly: Skip Connected and Adversarially Trained Encoder-Decoder Anomaly Detection
    Akcay, Samet
    Atapour-Abarghouei, Amir
    Breckon, Toby P.
    [J]. 2019 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2019,
  • [3] GANomaly: Semi-supervised Anomaly Detection via Adversarial Training
    Akcay, Samet
    Atapour-Abarghouei, Amir
    Breckon, Toby P.
    [J]. COMPUTER VISION - ACCV 2018, PT III, 2019, 11363 : 622 - 637
  • [4] Alshammari A., 2018, WIRELESS ENG TECHNOL, V9, P79, DOI DOI 10.4236/WET.2018.94007
  • [5] Novel Deep Learning-Enabled LSTM Autoencoder Architecture for Discovering Anomalous Events From Intelligent Transportation Systems
    Ashraf, Javed
    Bakhshi, Asim D.
    Moustafa, Nour
    Khurshid, Hasnat
    Javed, Abdullah
    Beheshti, Amin
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2021, 22 (07) : 4507 - 4518
  • [6] Bloom G., 2022, PROC NETWORK DISTRIB
  • [7] Bloom G, 2017, 2017 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), P1334, DOI 10.1109/ICIT.2017.7915557
  • [8] Anomalous Example Detection in Deep Learning: A Survey
    Bulusu, Saikiran
    Kailkhura, Bhavya
    Li, Bo
    Varshney, Pramod K.
    Song, Dawn
    [J]. IEEE ACCESS, 2020, 8 : 132330 - 132347
  • [9] Automotive Cyber-Physical Systems: A Tutorial Introduction
    Chakraborty, Samarjit
    Al Faruque, Mohammad Abdullah
    Chang, Wanli
    Goswami, Dip
    Wolf, Marilyn
    Zhu, Qi
    [J]. IEEE DESIGN & TEST, 2016, 33 (04) : 92 - 108
  • [10] Chalapathy R, 2019, Arxiv, DOI arXiv:1901.03407