Conversion of an Unsupervised Anomaly Detection System to Spiking Neural Network for Car Hacking Identification

被引:0
作者
Jaoudi, Yassine [1 ]
Yakopcic, Chris [1 ]
Taha, Tarek [1 ]
机构
[1] Univ Dayton, Dept Elect & Comp Engn, Dayton, OH 45469 USA
来源
2020 11TH INTERNATIONAL GREEN AND SUSTAINABLE COMPUTING WORKSHOPS (IGSC) | 2020年
关键词
Autoencoder; Spiking Neural Network; Intrusion detection; Controller area network; Conversion; Loihi; Neuromorphic processor;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Across industry, there is an increasing availability of streaming, time-varying data, where it is important to detect anomalous behavior. These data are found in an enormous number of sensor-based applications, in cybersecurity (where anomalous behavior could indicate an attack), and in finance. Spiking Neural Networks (SNNs) have come under the spotlight for machine learning applications due to the extreme energy efficiency of their implementation on neuromorphic processors like the Intel Loihi research chip. In this paper we explore the applicability of spiking neural networks for in vehicle cyberattack detection. We show exemplary results by converting an autoencoder model to spiking form. We present a learning model comparison that shows the proposed SNN autoencoder outperforms a One Class Support Vector Machine and an Isolation Forest. Furthermore, only a slight reduction in accuracy is observed when compared to a traditional autoencoder.
引用
收藏
页数:4
相关论文
共 16 条
[1]   Unsupervised real-time anomaly detection for streaming data [J].
Ahmad, Subutai ;
Lavin, Alexander ;
Purdy, Scott ;
Agha, Zuha .
NEUROCOMPUTING, 2017, 262 :134-147
[2]   Loihi: A Neuromorphic Manycore Processor with On-Chip Learning [J].
Davies, Mike ;
Srinivasa, Narayan ;
Lin, Tsung-Han ;
Chinya, Gautham ;
Cao, Yongqiang ;
Choday, Sri Harsha ;
Dimou, Georgios ;
Joshi, Prasad ;
Imam, Nabil ;
Jain, Shweta ;
Liao, Yuyun ;
Lin, Chit-Kwan ;
Lines, Andrew ;
Liu, Ruokun ;
Mathaikutty, Deepak ;
Mccoy, Steve ;
Paul, Arnab ;
Tse, Jonathan ;
Venkataramanan, Guruguhanathan ;
Weng, Yi-Hsin ;
Wild, Andreas ;
Yang, Yoonseok ;
Wang, Hong .
IEEE MICRO, 2018, 38 (01) :82-99
[3]   A review on time series data mining [J].
Fu, Tak-chung .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2011, 24 (01) :164-181
[4]   Real-time big data processing for anomaly detection: A Survey [J].
Habeeb, Riyaz Ahamed Ariyaluran ;
Nasaruddin, Fariza ;
Gani, Abdullah ;
Hashem, Ibrahim Abaker Targio ;
Ahmed, Ejaz ;
Imran, Muhammad .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2019, 45 :289-307
[5]   Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security [J].
Kang, Min-Joo ;
Kang, Je-Won .
PLOS ONE, 2016, 11 (06)
[6]   OTIDS: A Novel Intrusion Detection System for In-vehicle Network by using Remote Frame [J].
Lee, Hyunsung ;
Jeong, Seong Hoon ;
Kim, Huy Kang .
2017 15TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2017, :57-66
[7]  
Miller C., 2013, DEF CON, V21, P15
[8]  
Müter M, 2011, IEEE INT VEH SYM, P1110, DOI 10.1109/IVS.2011.5940552
[9]   Anomaly Detection: A Survey [J].
Chandola, Varun ;
Banerjee, Arindam ;
Kumar, Vipin .
ACM COMPUTING SURVEYS, 2009, 41 (03)
[10]   NengoDL: Combining Deep Learning and Neuromorphic Modelling Methods [J].
Rasmussen, Daniel .
NEUROINFORMATICS, 2019, 17 (04) :611-628