CANBERT: A Language-based Intrusion Detection Model for In-vehicle Networks

被引:8
作者
Nwafor, Ebelechukwu [1 ]
Olufowobi, Habeeb [2 ]
机构
[1] Villanova Univ, Dept Comp Sci, Villanova, PA 19085 USA
[2] Univ Texas Arlington, Dept Comp Sci & Engn, Arlington, TX 76019 USA
来源
2022 21ST IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS, ICMLA | 2022年
关键词
Transformer-based Model; Controller Area Networks; Intrusion Detection Systems; CONTROLLER AREA NETWORK; ATTACK;
D O I
10.1109/ICMLA55696.2022.00048
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Controller Area networks (CAN) provide a standard means of communicating across vehicular electronic units without a centralized computing unit or complex dedicated wiring. Despite the benefits offered by in-vehicle networks, CAN networks have been susceptible to network attacks such as replay, fuzzing, and denial of service attacks. In addition, the proliferation of internet-connected vehicles motivates the need to build a robust and secure vehicular network system. Deep learning-based language models such as Bidirectional Encoder Representations from Transformers (BERT) models have proven to produce remarkable results for natural language tasks. BERT models provide a deep understanding of the underlying semantics in textual data. In this paper, we propose CANBERT, a language-based intrusion detection model for CAN bus. We leverage the power of transformer models to provide the detection of malicious attacks on the CAN network. We provide a thorough analysis of our approach using a CAN dataset produced in a realistic driving scenario which consists of a combination of normal data and malicious data from various types of attack scenarios such as Denial of Service (DoS), fuzzy, and impersonation attacks. Our approach is able to detect all of the attacks with high precision and accuracy. In addition, we compare our method with other baseline models and state-of-the-art deep learning intrusion detection approach for in-vehicle networks.
引用
收藏
页码:294 / 299
页数:6
相关论文
共 31 条
[1]   In-Vehicle Network Anomaly Detection Using Extreme Gradient Boosting Machine [J].
Anjum, Afia ;
Agbaje, Paul ;
Hounsinou, Sena ;
Olufowobi, Habeeb .
2022 11TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2022, :100-105
[2]   Hardware Trojan Enabled Denial of Service Attack on CAN Bus [J].
Bozdal, Mehmet ;
Randa, Maulana ;
Samie, Mohammad ;
Jennions, Ian .
PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON THROUGH-LIFE ENGINEERING SERVICES, 2018, 16 :47-52
[3]  
Checkoway S., 2011, Comprehensive experimental analyses of automotive attack surfaces
[4]  
Cho KT, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P911
[5]  
Devlin J, 2019, 2019 CONFERENCE OF THE NORTH AMERICAN CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS: HUMAN LANGUAGE TECHNOLOGIES (NAACL HLT 2019), VOL. 1, P4171
[6]   SECURITY SOLUTIONS FOR THE CONTROLLER AREA NETWORK Bringing Authentication to In-Vehicle Networks [J].
Groza, Bogdan ;
Murvay, Pal-Stefan .
IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2018, 13 (01) :40-47
[7]   COIDS: A Clock Offset Based Intrusion Detection System for Controller Area Networks [J].
Halder, Subir ;
Conti, Mauro ;
Das, Sajal K. .
PROCEEDINGS OF THE 21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING (ICDCN 2020), 2020,
[8]  
Iyyer M., 2014, EMNLP, V1, P633, DOI DOI 10.3115/V1/D14-1070
[9]  
Jiao XQ, 2020, Arxiv, DOI arXiv:1909.10351
[10]   Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security [J].
Kang, Min-Joo ;
Kang, Je-Won .
PLOS ONE, 2016, 11 (06)