Intrusion detection system using deep learning for in-vehicle security

被引:53
作者
Zhang, Jiayan [1 ]
Li, Fei [1 ]
Zhang, Haoxi [1 ]
Li, Ruxiang [1 ]
Li, Yalin [1 ]
机构
[1] Chengdu Univ Informat Technol, Sch Cyberspace Secur, Chengdu, Sichuan, Peoples R China
关键词
Vehicle intelligence; Intrusion detection system; Deep learning; Gradient descent with momentum; Gradient descent with momentum and adaptive gain; NETWORK;
D O I
10.1016/j.adhoc.2019.101974
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of vehicle intelligence technology, the combination of network and vehicle becomes inevitable, which brings much convenience to people. At the same time, hackers can also use technical vulnerabilities to attack vehicles, leading to severe traffic accidents and even vehicle crash. Based on this situation, the vehicle information security protection techniques have drawn great attention from researchers. This paper studies the vehicle intrusion detection system (IDS) based on the neural network algorithm in deep learning, and uses gradient descent with momentum (GDM) and gradient descent with momentum and adaptive gain (GDM/AG) to improve the efficiency and accuracy of IDS. The accuracy and efficiency of the proposed model are validated and evaluated by using real vehicles at the end of the paper. Experiments show that the GDM/AG algorithm can achieve faster convergence in comparison with the GDM algorithm in vehicle anomaly detection, and can detect anomaly data at the level of milliseconds. At the same time, the proposed model can adapt itself to detect unknown attacks. The veracity rate ranges from 97% to 98% in directing the adaptation when facing unknown attack types. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页数:12
相关论文
共 37 条
[1]   A Neural Network-Based Learning Algorithm for Intrusion Detection Systems [J].
Ahmed, Hassan I. ;
Elfeshawy, Nawal A. ;
Elzoghdy, S. F. ;
El-sayed, Hala S. ;
Faragallah, Osama S. .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (02) :3097-3112
[2]  
[Anonymous], 2001, IEEE WORKSH INF ASS
[3]  
[Anonymous], 2014, IEEE T INTELL TRANSP
[4]   Internet of Vehicles: Architecture, Protocols, and Security [J].
Contreras-Castillo, Juan ;
Zeadally, Sherali ;
Antonio Guerrero-Ibanez, Juan .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (05) :3701-3709
[5]   Controller Area Network (CAN) schedulability analysis: Refuted, revisited and revised [J].
Davis, Robert I. ;
Burns, Alan ;
Bril, Reinder J. ;
Lukkien, Johan J. .
REAL-TIME SYSTEMS, 2007, 35 (03) :239-272
[6]   A COMPREHENSIVE SURVEY ON APPROACHES TO INTRUSION DETECTION SYSTEM [J].
Deepa, A. J. ;
Kavitha, V. .
INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 :2063-2069
[7]   An overview of Controller Area Network [J].
Farsi, M ;
Ratcliff, K ;
Barbosa, M .
COMPUTING & CONTROL ENGINEERING JOURNAL, 1999, 10 (03) :113-120
[8]  
[冯志杰 Feng Zhijie], 2017, [信息安全学报, Journal of Cyber Security], V2, P1
[9]   Intrusion detection system using SOEKS and deep learning for in-vehicle security [J].
Gao, Lulu ;
Li, Fei ;
Xu, Xiang ;
Liu, Yong .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 6) :14721-14729
[10]  
Golovko V., 2009, INTELLIGENT DATA ACQ