A Hybrid Approach Toward Efficient and Accurate Intrusion Detection for In-Vehicle Networks

被引:38
作者
Zhang, Linxi [1 ]
Ma, Di [1 ]
机构
[1] Univ Michigan, Dept Comp & Informat Sci, Dearborn, MI 48128 USA
关键词
Intrusion detection; Automotive engineering; Entropy; Automobiles; Protocols; Hidden Markov models; Costs; Automotive security; in-vehicle network; controller area network (CAN); intrusion detection; CONTROLLER-AREA-NETWORK; DEEP LEARNING APPROACH; DETECTION SYSTEM;
D O I
10.1109/ACCESS.2022.3145007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With recent advancements in the automotive world and the introduction of autonomous vehicles, automotive security has become a real and important issue. Modern vehicles have tens of Electronic Control Units (ECUs) connected to in-vehicle networks. As a de facto standard for in-vehicle network communication, the Controller Area Network (CAN) has become a target of cyber attacks. Anomaly-based Intrusion Detection System (IDS) is considered as an effective approach to secure CAN and detect malicious attacks. Currently, there are two primary approaches used for intrusion detection: rule-based and machine learning-based. Rule-based approach is efficient but limited in the detection accuracy while machine learning-based detection has comparably higher detection accuracy but higher computation cost at the same time. In this paper, we propose a novel hybrid IDS that combines the benefits of both rule-based and machine learning-based approaches. More specifically, we use machine learning methods to achieve a high detection rate while keeping the low computational requirement by offsetting the detection with a rule-based component. Our experiments with CAN traces collected from four different vehicle models demonstrate the effectiveness and efficiency of the proposed hybrid IDS.
引用
收藏
页码:10852 / 10866
页数:15
相关论文
共 62 条
[31]  
Marchetti M, 2017, IEEE INT VEH SYM, P1577, DOI 10.1109/IVS.2017.7995934
[32]  
Marchetti M, 2016, 2016 IEEE 2ND INTERNATIONAL FORUM ON RESEARCH AND TECHNOLOGIES FOR SOCIETY AND INDUSTRY LEVERAGING A BETTER TOMORROW (RTSI), P429
[33]  
Miller C., 2013, Def. Con., V21, P15
[34]  
Miller C., 2015, Black Hat USA
[35]  
Miller Charlie, 2014, Black Hat USA, V2014, P1
[36]  
Müter M, 2011, IEEE INT VEH SYM, P1110, DOI 10.1109/IVS.2011.5940552
[37]  
Muter M., 2010, 2010 Sixth International Conference on Information Assurance and Security (IAS 2010), P92, DOI 10.1109/ISIAS.2010.5604050
[38]  
Nair Narayanan S., 2015, arXiv
[39]  
Narayanan SN, 2016, 2016 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP), P276
[40]  
Nie S., 2018, Briefing