A Hybrid Approach Toward Efficient and Accurate Intrusion Detection for In-Vehicle Networks

被引:37
作者
Zhang, Linxi [1 ]
Ma, Di [1 ]
机构
[1] Univ Michigan, Dept Comp & Informat Sci, Dearborn, MI 48128 USA
关键词
Intrusion detection; Automotive engineering; Entropy; Automobiles; Protocols; Hidden Markov models; Costs; Automotive security; in-vehicle network; controller area network (CAN); intrusion detection; CONTROLLER-AREA-NETWORK; DEEP LEARNING APPROACH; DETECTION SYSTEM;
D O I
10.1109/ACCESS.2022.3145007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With recent advancements in the automotive world and the introduction of autonomous vehicles, automotive security has become a real and important issue. Modern vehicles have tens of Electronic Control Units (ECUs) connected to in-vehicle networks. As a de facto standard for in-vehicle network communication, the Controller Area Network (CAN) has become a target of cyber attacks. Anomaly-based Intrusion Detection System (IDS) is considered as an effective approach to secure CAN and detect malicious attacks. Currently, there are two primary approaches used for intrusion detection: rule-based and machine learning-based. Rule-based approach is efficient but limited in the detection accuracy while machine learning-based detection has comparably higher detection accuracy but higher computation cost at the same time. In this paper, we propose a novel hybrid IDS that combines the benefits of both rule-based and machine learning-based approaches. More specifically, we use machine learning methods to achieve a high detection rate while keeping the low computational requirement by offsetting the detection with a rule-based component. Our experiments with CAN traces collected from four different vehicle models demonstrate the effectiveness and efficiency of the proposed hybrid IDS.
引用
收藏
页码:10852 / 10866
页数:15
相关论文
共 62 条
[1]  
[Anonymous], 2018, Hands-on Machine Learning with Scikit-Learn and Tensorflow
[2]  
[Anonymous], 1991, C SPECIFICATION VERS, V27
[3]  
Blevins D. H., 2021, P 3 INT WORKSH AUT V
[4]  
Brownlee J., 2019, Generative Adversarial Networks with Python: Deep Learning Generative Models for Image Synthesis and Image Translation
[5]  
Checkoway S., 2011, P 20 USENIX SEC S AU, P6
[6]  
Cho KT, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P911
[7]  
Corrigan S, 2016, SLOA101B HPL
[8]   Controller Area Network (CAN) schedulability analysis: Refuted, revisited and revised [J].
Davis, Robert I. ;
Burns, Alan ;
Bril, Reinder J. ;
Lukkien, Johan J. .
REAL-TIME SYSTEMS, 2007, 35 (03) :239-272
[9]  
DiNatale M, 2012, UNDERSTANDING AND USING THE CONTROLLER AREA NETWORK COMMUNICATION PROTOCOL: THEORY AND PRACTICE, P1, DOI 10.1007/978-1-4614-0314-2
[10]  
Fernandez A., LEARNING IMBALANCED, V10